Guidelines for writing secure code for Python developers.
☆22Apr 23, 2017Updated 9 years ago
Alternatives and similar repositories for hunter
Users that are interested in hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 9 months ago
- A collection of response templates for invalid bug bounty reports.☆90Feb 26, 2018Updated 8 years ago
- Some random scripts. Just trying to be like the cool kids.☆99Jul 1, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This version touches disk for registry persistence.☆26Oct 6, 2015Updated 10 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆472Nov 10, 2022Updated 3 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 8 years ago
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 9 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- We remember his diary, a static blogging tool.☆11Nov 20, 2021Updated 4 years ago
- ☆15Mar 21, 2025Updated last year
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- html5 port of earf (software terrain renderer)☆21Feb 21, 2014Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- using gpuz to load driver☆36Mar 14, 2019Updated 7 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 4 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Pentesting resources☆23May 3, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- A catalog of cursors and icons from Windows 98, in original and modern formats☆17Jun 25, 2024Updated last year
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆48Mar 26, 2026Updated last month
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 4 months ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 7 years ago