18F / tts-buy-bug-bounty
Solicitation and acquisition documents created for the TTS Bug Bounty program that can be reused by other government agencies and organizations.
☆19Updated 6 years ago
Alternatives and similar repositories for tts-buy-bug-bounty:
Users that are interested in tts-buy-bug-bounty are comparing it to the libraries listed below
- ☆13Updated 2 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Social Engineering Abusing Google App Scripts☆24Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Scans the typos of candidate election pages for typosquatters☆18Updated 6 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Technical Notes☆16Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 6 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- (Unofficial) Python API for http://namechk.com☆19Updated 9 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Python bindings for Yeti's API☆18Updated last year
- Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocen…☆10Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- ☆46Updated 7 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- A configurable XPath/XML injection testbed☆32Updated 11 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- A BurpSuite plugin to detect Same Origin Method Execution vulnerabilities☆15Updated 8 years ago