18F / tts-buy-bug-bounty
Solicitation and acquisition documents created for the TTS Bug Bounty program that can be reused by other government agencies and organizations.
☆19Updated 6 years ago
Related projects: ⓘ
- Burp extension for decoding WCF-gzipped requests.☆12Updated 8 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 6 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 7 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- An incomplete listing of `.mil` domains and the code for the scraper used to build the list☆48Updated 9 years ago
- Dig through Git commits and logs☆21Updated 5 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 3 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 2 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 2 years ago
- Fun with Amazon AWS and Maltego☆28Updated 7 years ago
- Maltego Transforms to Query Traffic Records☆33Updated 8 years ago
- ☆46Updated 6 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Scans the typos of candidate election pages for typosquatters☆18Updated 5 years ago
- Run DependencyCheck Against Your Orgs GitHub Repos.☆14Updated 6 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- ☆16Updated this week
- A repo to make our changes more transparent to bug bounty researchers in our program (so they can see commits, etc).☆29Updated 4 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Static Code Analysis tool. Platform and language agnostic. Provides reporting and custom signatures.☆12Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆10Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- ☆18Updated this week
- Python bindings for Yeti's API☆18Updated last year
- DNS Enumeration and Reconnaissance Tool☆37Updated 8 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- Virtual host brute forcer☆22Updated 10 years ago