Guidelines for writing secure code for Python developers.
☆22Apr 23, 2017Updated 9 years ago
Alternatives and similar repositories for hunter
Users that are interested in hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 10 months ago
- A collection of response templates for invalid bug bounty reports.☆90Feb 26, 2018Updated 8 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Some random scripts. Just trying to be like the cool kids.☆100Jul 1, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆473Nov 10, 2022Updated 3 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 8 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆75Dec 4, 2019Updated 6 years ago
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆43Mar 30, 2019Updated 7 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆25Mar 20, 2026Updated last month
- Use normal web pentest tools to hack Websockets☆18Sep 23, 2019Updated 6 years ago
- ☆15Mar 21, 2025Updated last year
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- Look at https://kushaldas.in for the result☆12Sep 10, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- html5 port of earf (software terrain renderer)☆21Feb 21, 2014Updated 12 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- The Bug Bounty Wiki☆173Oct 31, 2018Updated 7 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆19May 20, 2020Updated 5 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Pentesting resources☆23May 3, 2019Updated 7 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago