Guidelines for writing secure code for Python developers.
☆22Apr 23, 2017Updated 8 years ago
Alternatives and similar repositories for hunter
Users that are interested in hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 8 months ago
- A collection of response templates for invalid bug bounty reports.☆90Feb 26, 2018Updated 8 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- This version touches disk for registry persistence.☆27Oct 6, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆472Nov 10, 2022Updated 3 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- Data Structures And Algorithms☆11Feb 9, 2022Updated 4 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆166Nov 6, 2019Updated 6 years ago
- Obfuscated Invoke-Mimikatz☆52Oct 23, 2018Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Attacks against weak 802.11 Random Number Generators☆25Feb 8, 2017Updated 9 years ago
- List all tracks of an artist ranked by poularity at http://localhost:3000/tracks/{artistName}☆10Sep 24, 2015Updated 10 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- This is an education App built with React, Redux, Node.js and MongoDB.☆27Dec 5, 2018Updated 7 years ago
- Coding interviews are getting tougher every day. A few years back, brushing up on key data structures and going through 50-75 coding inte…☆12Aug 15, 2024Updated last year
- Anti live forensic linux LKM rootkit☆18Apr 15, 2017Updated 8 years ago
- ☆16Feb 23, 2021Updated 5 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆74Dec 4, 2019Updated 6 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Universal LAN-based SSRF Attack Primitive☆19Aug 10, 2019Updated 6 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Mar 30, 2019Updated 7 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆25Mar 20, 2026Updated 2 weeks ago
- Code listings for Learn Enough Ruby to Be Dangerous☆11Oct 19, 2022Updated 3 years ago
- We remember his diary, a static blogging tool.☆11Nov 20, 2021Updated 4 years ago
- Algo Trading on zerodha Kite☆11Dec 16, 2017Updated 8 years ago
- [+]An Automation Tool Based on [ securitytrails.com ]☆17Jun 3, 2021Updated 4 years ago
- Purge plugin for DNF☆11Mar 8, 2026Updated last month
- Look at https://kushaldas.in for the result☆12Sep 10, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- This project clones the popular communication app, Slack, using the MERN stack.☆11Jan 24, 2023Updated 3 years ago
- Stratosphere uses password generation algorithms to discover publicly accessible cloud storage buckets.☆30Jul 15, 2021Updated 4 years ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- The Bug Bounty Wiki☆173Oct 31, 2018Updated 7 years ago