awesome-list: A Curated Collection of Cybersecurity Resources

Summary
The 0xor0ne/awesome-list repository is a comprehensive, cybersecurity-oriented collection of valuable resources. It features an extensive compilation of blog posts, write-ups, and papers, meticulously organized by year. This list serves as an excellent starting point for anyone looking to delve deeper into various aspects of cybersecurity, from exploitation to reverse engineering.
Repository Info
Tags
Click on any tag to explore related repositories
Introduction
The 0xor0ne/awesome-list
is a highly-regarded GitHub repository, boasting over 2,400 stars. It serves as a personal, yet publicly valuable, collection of curated resources focused on cybersecurity. This list is an invaluable asset for researchers, students, and professionals seeking in-depth knowledge on topics such as exploitation, reverse engineering, and general information security. The repository is continuously updated, offering insights into the latest trends and historical context within the cybersecurity landscape.
How to Use
Accessing the wealth of information within the awesome-list
is straightforward. The repository's README.md
file, which is the main entry point, organizes content chronologically by year, making it easy to browse recent additions or historical archives. Each entry is a direct link to a blog post, write-up, or paper. For those interested in tools, a dedicated Cybersecurity Tools
list is also referenced within the repository.
Examples
The awesome-list
covers a broad spectrum of cybersecurity topics. Here are a few examples of the diverse content you can find:
- Kernel Exploitation: Delve into advanced techniques with entries like "CVE-2025-37752 Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds" or "Kernel Exploitation Techniques: Turning The (Page) Tables".
- Hardware Hacking: Explore the physical side of security with articles such as "Laser Fault Injection on a Budget: RP2350 Edition" or "Hacking the XBox 360 Hypervisor".
- Web Security: Understand vulnerabilities in web applications through posts like "CVE-2025-23016 - EXPLOITING THE FASTCGI LIBRARY".
- Reverse Engineering: Learn the art of dissecting software with "Disassembling a binary: linear sweep and recursive traversal" or "How I ruined my vacation by reverse engineering WSC".
Why Use This List
This awesome-list
stands out due to its comprehensive and well-organized nature. It provides a centralized hub for high-quality cybersecurity content, saving countless hours of searching. The chronological organization allows users to track the evolution of attack techniques and defensive strategies over time. Whether you're looking for specific exploit write-ups, reverse engineering tutorials, or general cybersecurity knowledge, this repository is an indispensable resource for continuous learning and research in the field.
Links
You can explore the 0xor0ne/awesome-list
repository and its extensive collection of resources here: