h4cker
by The-Art-of-Hacking
A comprehensive, curated repository of cybersecurity resources and tools for ethical hacking, DFIR, AI security, and vulnerability research.
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. 🔥 Also check: https://hackertraining.org
Primary Use Case
This repository serves as an extensive educational resource for cybersecurity professionals and enthusiasts seeking to enhance their skills in offensive and defensive security domains. It is ideal for penetration testers, red teamers, incident responders, and researchers looking for practical tools, references, and training materials across multiple security disciplines.
- Thousands of curated resources covering ethical hacking, bug bounties, and exploit development
- In-depth materials on reverse engineering and malware analysis
- Extensive threat intelligence and threat hunting references
- Digital forensics and incident response (DFIR) tools and reports
- AI security research including adversarial machine learning and AI-driven threat detection
- Supplemental materials aligned with books, video courses, and live training by Omar Santos
- Organized directories covering offensive, defensive, cloud, hardware, and IoT security
- Open source under MIT License with community contribution guidelines
Installation
- Clone the repository using: git clone https://github.com/The-Art-of-Hacking/h4cker.git
- Navigate into the cloned directory: cd h4cker
- Download or explore specific folders/resources as needed
- Refer to accompanying books, video courses, or training for detailed usage
- Follow CONTRIBUTING.md for contributing guidelines
- Leverage AI security research materials to develop adversarial testing frameworks for red team simulations.
- Integrate threat hunting resources with AI-driven anomaly detection tools to enhance blue team detection capabilities.
- Use curated exploit development and reverse engineering tools to automate vulnerability discovery pipelines.
- Combine DFIR resources with AI-based incident response playbooks to accelerate threat mitigation.
- Employ the repository as a knowledge base to facilitate purple team exercises that bridge offensive and defensive tactics.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about h4cker. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
3 free chats per tool • Instant responses • No credit card
Related Tools
Awesome-Hacking
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
hackingtool
Z4nzu/hackingtool
ALL IN ONE Hacking Tool For Hackers
mitmproxy
mitmproxy/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
sqlmap
sqlmapproject/sqlmap
Automatic SQL injection and database takeover tool
metasploit-framework
rapid7/metasploit-framework
Metasploit Framework
SWE-agent
SWE-agent/SWE-agent
SWE-agent takes a GitHub issue and tries to automatically fix it, using your LM of choice. It can also be employed for offensive cybersecurity or competitive coding challenges. [NeurIPS 2024]
