🚀 A curated list of cutting-edge cybersecurity tools showcased at the Black Hat Arsenal events — covering offensive, defensive, and research-focused security utilities.
Whether you're in red teaming, blue teaming, appsec, or OSINT — this list helps you explore and leverage the best tools demonstrated live by security professionals across the world.
📌 How This List is Organized
- The tools are grouped by the location of the Black Hat event (e.g., USA, Europe, Asia).
- Under each location, tools are further organized by year.
- Inside each year’s section, you’ll find the tools organized by track category, each with descriptions, authors, and GitHub links (where available).
We welcome community contributions to make this list better!
- 📁 Tools are grouped by Black Hat event location (
USA
,Europe
, etc.) and year insideoutput_by_location/
. - 🧠 Inside each year's folder, tools are organized by track categories such as
Red Teaming
,OSINT
,Reverse Engineering
, etc. - 📝 Each tool is defined by a structured
.json
file including:- Tool Name
- Description
- GitHub URL (if available)
- Tracks
- Speaker(s)
- Create a JSON file inside the appropriate folder:
output_by_location/{LOCATION}/{YEAR}/tool-name.json
- Follow the CONTRIBUTING.md for format guidelines.
- Submit a pull request.
⚠️ Keep content concise and correctly categorized. Badges and README entries are auto-generated.
Inspired by Awesome Lists and powered by the Black Hat Arsenal community.