A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.
☆41Aug 2, 2018Updated 7 years ago
Alternatives and similar repositories for h1-cli
Users that are interested in h1-cli are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 8 months ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 4 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 5 months ago
- ☆19Nov 18, 2020Updated 5 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Some random scripts. Just trying to be like the cool kids.☆101Jul 1, 2018Updated 7 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆22Sep 8, 2019Updated 6 years ago
- ☆17Sep 15, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆74Dec 4, 2019Updated 6 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated 11 months ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- Detect exposed API keys on GitHub commits.☆35Jul 27, 2022Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 8 months ago
- Make concurrent requests with the curl command-line tool☆76Oct 9, 2019Updated 6 years ago
- A script to extract domain names from Content Security Policy(CSP) headers☆113May 13, 2019Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Jul 2, 2018Updated 7 years ago
- A permutation generation tool written in golang☆211Jul 15, 2019Updated 6 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- Get all the CNs from a list of domains☆45Aug 17, 2021Updated 4 years ago
- Collection of HTTP scanners and fuzzers.☆11Jan 23, 2025Updated last year
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆78Mar 8, 2018Updated 8 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- Pastebin API wrapper for Python☆18Mar 8, 2025Updated last year