Skip to content

😎 A curated list of the awesome resources about the security research

License

Notifications You must be signed in to change notification settings

g3rzi/awesome-security-research

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

149 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

awesome-security-research Awesome

😎 A curated list of awesome resources for security research:
vulnerability discovery, exploit development, reversing, containers, Kubernetes, and more.


πŸ“š Table of Contents


Legend

  • πŸ”₯ – Highly recommended / must-watch
  • πŸ’΅ – Paid or has a paid tier

🌱 How to Use This List

If you're new to security research:

  1. Start with a few talks from Talks & Videos (marked πŸ”₯).
  2. Pick a domain (Web, Windows, Kubernetes, etc.) and read through the matching section in Articles.md.
  3. Choose 1–2 tools from Tools in that domain and actually use them on a test target or lab.
  4. Repeat in cycles: Watch β†’ Read β†’ Experiment β†’ Take notes.

Articles

A curated collection of vulnerability research articles and blog posts.
➑️ See the full list here: articles.md


Talks & Videos

Kubernetes

Containers

Identity


Tools

Web

AI

Skills

Network

Mobile

Windows

PE

  • PE-sieve - Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-memory patches) by hasherezade.
  • PE-bear - Portable Executable reversing tool with a friendly GUI by hasherezade.
  • Detect It Easy (DiE) - Program for determining types of files for Windows, Linux and MacOS.

Namedpipes

RPC

Reversing

Linux

Containers

  • Edgeshark - Discover and capture container network traffic.
  • deepce (πŸ”₯) - Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE).

Kubernetes

  • KubiScan - Scan Kubernetes cluster for risky permissions by Eviatar Gerzi
  • kubeletctl - A client for kubelet by Eviatar Gerzi
  • kubesploit - Offensive tool by Eviatar Gerzi
  • kubestriker - Security Auditing tool by vasant chinnipilli
  • aad-pod-identity - Assign Azure AD identities to pods in Kubernetes, in order to access Azure resources
  • audit2rbac - Autogenerate RBAC policies based on Kubernetes audit logs
  • CDK - Zero Dependency Container Penetration Toolkit
  • Deepfence ThreatMapper - Apache v2, powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless
  • cnspec - Scan Kubernetes clusters, containers, and manifest files for vulnerabilities and misconfigurations
  • falco - Container Native Runtime Security
  • KBOM - Kubernetes Bill of Materials Toolkit
  • kdigger - Kubernetes focused container assessment and context discovery tool for penetration testing
  • kiam - Integrate AWS IAM with Kubernetes
  • kube-bench - Check whether Kubernetes is deployed according to security best practices
  • kube-hunter - Hunt for security weaknesses in Kubernetes clusters
  • kube-psp-advisor - Help building an adaptive and fine-grained pod security policy
  • kube-scan - k8s cluster risk assessment tool
  • kubescape - k8s risk analysis, security compliance, and misconfiguration scanning.
  • kubelight - WIP but promising - OWASP project to scan your Kubernetes Cluster for Security & Compliance.
  • Kubei - Vulnerabilities scanner for Kubernetes clusters
  • kube2iam - Provide different AWS IAM roles for pods running on Kubernetes
  • kubeaudit - Audit your Kubernetes clusters against common security controls
  • kubectl-bindrole - Find Kubernetes roles bound to a specified ServiceAccount, Group or User
  • kubectl-dig - Deep Kubernetes visibility from the kubectl
  • kubectl-kubesec - Scan Kubernetes pods, deployments, daemonsets and statefulsets with kubesec.io
  • kubectl-who-can - Show who has permissions to <verb> <resource> in Kubernetes
  • OWASP Top Ten for Kubernetes - The Top Ten is a prioritized list of these risks backed by data collected from organizations varying in maturity and complexity
  • terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure
  • kyverno - Kubernetes Native Policy Management
  • netchecks - Tool to validate assumptions about the network
  • rakkess - Review access matrix for Kubernetes server resources
  • rback - RBAC in Kubernetes visualizer
  • red-kube - K8S Adversary Emulation Based on kubectl
  • steampipe - Use SQL to query your cloud services (AWS, Azure, GCP and more) running Kubernetes
  • steampipe-kubernetes - Use SQL to query your Kubernetes resources
  • steampipe-kubernetes-compliance - Kubernetes compliance scanning tool for CIS, NSA & CISA Cybersecurity technical report for Kubernetes hardening.
  • trivy - A Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI
  • trivy-operator - Kubernetes-native security (Vulnerabilities, IaC Misconfig, exposed secrets, RBAC assessment, compliance, and more) toolkit for kubernetes
  • kubernetes-rbac-audit - Tool for auditing RBACs in Kubernetes
  • kubernetes-external-secrets - Tool to get External Secrets from Hashicorp Vault and AWS SSM
  • vault-secrets-operator - An operator to create Kubernetes secrets from Vault for a secure GitOps based workflow

*Most of the tools are taken from awesome-kubernetes-security


CTFs

A (very small) selection of CTFs and platforms that are especially good for learning real-world vulnerability research:


Contributing

Contributions are welcome! πŸŽ‰

Before opening a PR:

  • Make sure the resource is high quality and focused on security research
    (vuln discovery, root cause analysis, exploitation, etc. – not generic β€œhow to hack”).
  • Place it in the right section and keep the list alphabetically sorted.
  • Prefer original research and deep-dive content over shallow summaries.

If you're unsure, open an issue and we can discuss it.


License

This list is licensed under CC0 1.0 Universal.

To the extent possible under law, I waive all copyright and related rights to
the content of this repository. See the LICENSE file for details.


Disclaimer

All tools and resources are listed for educational and defensive purposes only.
Use them responsibly and follow the laws in your jurisdiction.


⭐ If you find this project useful, consider giving it a star!

About

😎 A curated list of the awesome resources about the security research

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published