EdOverflow / hack-your-universityLinks
A list of universities with vulnerability disclosure policies
☆12Updated 4 years ago
Alternatives and similar repositories for hack-your-university
Users that are interested in hack-your-university are comparing it to the libraries listed below
Sorting:
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Exploitdb website search module written in python to ease you task ... No local db for exploitdb is need ...It just uses google dorks an…☆12Updated 5 years ago
- This repository contains all the XSS cheatsheet data to allow contributions from the community.☆10Updated 5 years ago
- Just a bunch of useful scripts for netsec/admin/others☆14Updated 5 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 8 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Open Redirect Vulnerability scanner (Pwn0sec-Project)☆16Updated 4 years ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 4 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Updated 2 years ago
- ☆18Updated last year
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆23Updated 5 years ago
- Reconnaissance tool of Penetration test & Bug Bounty☆25Updated 6 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- ☆33Updated 5 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆19Updated 5 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- It is a script written in Python that performs brute force on workers' payroll files through the use of their DNI (National Identity Docu…☆12Updated 4 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Automated Google dorking with custom search engines☆27Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23Updated 3 years ago
- Intelligence gathering framework☆15Updated 9 years ago