A list of universities with vulnerability disclosure policies
☆13Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for hack-your-university
Users that are interested in hack-your-university are comparing it to the libraries listed below
Sorting:
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Oct 25, 2019Updated 6 years ago
- A list of universities with vulnerability disclosure policies☆53Jul 13, 2021Updated 4 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- Static website for security.txt.☆68Sep 16, 2025Updated 6 months ago
- A modern-designed android terminal emulator for the 21st century.☆14Nov 24, 2017Updated 8 years ago
- PowerShell script that will enumerate the methods and properties on all WMIObjects☆11Jul 18, 2018Updated 7 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- Simple terminal text message written in java☆14Apr 18, 2018Updated 7 years ago
- https-server for Termux ( Node.js )☆16Jul 10, 2018Updated 7 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- RedirectHunter is a powerful open redirect vulnerability scanner that helps you quickly identify and mitigate potential security risks in…☆12Apr 21, 2023Updated 2 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- A tool for reverse engineering Android apk files☆19Jun 2, 2019Updated 6 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- mdbook preprocessor for generating checklists and indexes☆14Nov 29, 2022Updated 3 years ago
- Jupiter Brain manages servers☆14Mar 29, 2019Updated 6 years ago
- ☆12Dec 18, 2020Updated 5 years ago
- Second Edition Metasploit For Termux☆21Oct 30, 2017Updated 8 years ago
- Cryptocurrencies related Security resources☆14May 24, 2023Updated 2 years ago
- sqlmap cheat sheet☆15Apr 6, 2023Updated 2 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- Brute force otp on has no rate limit☆13Aug 1, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- Postman collection to interact with the Shodan API☆25Nov 8, 2023Updated 2 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 8 months ago
- Web service to receive SMS online anonymously.☆12May 21, 2017Updated 8 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- 顾名思义,收集国内外各大佬的奇淫技巧☆47Sep 23, 2020Updated 5 years ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆24Feb 16, 2026Updated last month
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago