A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.
☆41Aug 2, 2018Updated 7 years ago
Alternatives and similar repositories for h1-cli
Users that are interested in h1-cli are comparing it to the libraries listed below
Sorting:
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 8 months ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- Want to execute command repeatedly without workache? Here is shloop born for it!☆11Mar 2, 2022Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- ☆19Nov 18, 2020Updated 5 years ago
- Code snippets I find useful☆32Sep 25, 2017Updated 8 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Some random scripts. Just trying to be like the cool kids.☆101Jul 1, 2018Updated 7 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆22Sep 8, 2019Updated 6 years ago
- ☆17Sep 15, 2023Updated 2 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆74Dec 4, 2019Updated 6 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆213Mar 31, 2020Updated 5 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Demo server for testing Java deserialization payloads☆15Sep 18, 2016Updated 9 years ago
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- Detect exposed API keys on GitHub commits.☆35Jul 27, 2022Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- My Custom made Nuceli-Templates☆22Aug 5, 2025Updated 7 months ago
- Make concurrent requests with the curl command-line tool☆76Oct 9, 2019Updated 6 years ago
- A script to extract domain names from Content Security Policy(CSP) headers☆113May 13, 2019Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆143Jul 2, 2018Updated 7 years ago
- A permutation generation tool written in golang☆210Jul 15, 2019Updated 6 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Feb 12, 2020Updated 6 years ago
- Get all the CNs from a list of domains☆45Aug 17, 2021Updated 4 years ago
- Collection of HTTP scanners and fuzzers.☆11Jan 23, 2025Updated last year
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- A module for the WiFi Pineapple to facilitate the PMKID attack.☆55Apr 18, 2022Updated 3 years ago
- A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any yea…☆78Mar 8, 2018Updated 8 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- The Bug Bounty Wiki☆173Oct 31, 2018Updated 7 years ago