awesome-list: A Curated Collection of Cybersecurity Resources

awesome-list: A Curated Collection of Cybersecurity Resources

Summary

The 0xor0ne/awesome-list repository is a comprehensive, cybersecurity-oriented collection of valuable resources. It features an extensive compilation of blog posts, write-ups, and papers, meticulously organized by year. This list serves as an excellent starting point for anyone looking to delve deeper into various aspects of cybersecurity, from exploitation to reverse engineering.

Repository Info

Updated on October 12, 2025
View on GitHub

Introduction

The 0xor0ne/awesome-list is a highly-regarded GitHub repository, boasting over 2,400 stars. It serves as a personal, yet publicly valuable, collection of curated resources focused on cybersecurity. This list is an invaluable asset for researchers, students, and professionals seeking in-depth knowledge on topics such as exploitation, reverse engineering, and general information security. The repository is continuously updated, offering insights into the latest trends and historical context within the cybersecurity landscape.

How to Use

Accessing the wealth of information within the awesome-list is straightforward. The repository's README.md file, which is the main entry point, organizes content chronologically by year, making it easy to browse recent additions or historical archives. Each entry is a direct link to a blog post, write-up, or paper. For those interested in tools, a dedicated Cybersecurity Tools list is also referenced within the repository.

Examples

The awesome-list covers a broad spectrum of cybersecurity topics. Here are a few examples of the diverse content you can find:

  • Kernel Exploitation: Delve into advanced techniques with entries like "CVE-2025-37752 Two Bytes Of Madness: Pwning The Linux Kernel With A 0x0000 Written 262636 Bytes Out-Of-Bounds" or "Kernel Exploitation Techniques: Turning The (Page) Tables".
  • Hardware Hacking: Explore the physical side of security with articles such as "Laser Fault Injection on a Budget: RP2350 Edition" or "Hacking the XBox 360 Hypervisor".
  • Web Security: Understand vulnerabilities in web applications through posts like "CVE-2025-23016 - EXPLOITING THE FASTCGI LIBRARY".
  • Reverse Engineering: Learn the art of dissecting software with "Disassembling a binary: linear sweep and recursive traversal" or "How I ruined my vacation by reverse engineering WSC".

Why Use This List

This awesome-list stands out due to its comprehensive and well-organized nature. It provides a centralized hub for high-quality cybersecurity content, saving countless hours of searching. The chronological organization allows users to track the evolution of attack techniques and defensive strategies over time. Whether you're looking for specific exploit write-ups, reverse engineering tutorials, or general cybersecurity knowledge, this repository is an indispensable resource for continuous learning and research in the field.

Links

You can explore the 0xor0ne/awesome-list repository and its extensive collection of resources here: