A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.
☆24Oct 30, 2020Updated 5 years ago
Alternatives and similar repositories for APAC-Firms
Users that are interested in APAC-Firms are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A community contributed consolidated list of InfoSec meetups in the Asia Pacific region.☆73Jul 23, 2025Updated 8 months ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- Configuration as code to enable support for the Australian Government's Email Protective Marking Standard (EPMS) within Microsoft 365.☆14May 31, 2022Updated 3 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Shodan Port Scanner☆43Sep 30, 2020Updated 5 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆163Apr 24, 2025Updated 10 months ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Aug 22, 2019Updated 6 years ago
- ❄️ Research project for SubFinder core API V2☆34Dec 30, 2018Updated 7 years ago
- The Monty Hall problem, in JavaScript☆13Oct 1, 2017Updated 8 years ago
- A hex/binary black box analysis tool☆13Aug 31, 2016Updated 9 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Your best is still an idiot.☆10Sep 24, 2021Updated 4 years ago
- SecTalks socially authored website☆20Jul 23, 2025Updated 8 months ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- ☆14Jul 29, 2024Updated last year
- ☆26Sep 1, 2017Updated 8 years ago
- ☆38Feb 27, 2026Updated 3 weeks ago
- InfiniteWP Client < 1.9.4.5 - Authentication Bypass☆21Jul 28, 2021Updated 4 years ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆216Oct 31, 2019Updated 6 years ago
- Python library for grayhatwarfare.com with small hacks☆16Aug 5, 2020Updated 5 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- Extract domains/subdomains from URLs en masse☆139Jul 8, 2023Updated 2 years ago
- E-mails, subdomains and names Harvester - OSINT☆11Jan 17, 2020Updated 6 years ago
- ☆10Nov 30, 2020Updated 5 years ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- A composite score for one's GitHub quality.☆22May 1, 2022Updated 3 years ago
- A PowerShell Module for OneTimeSecret.com☆10Jun 19, 2021Updated 4 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- Ucki's Recon & Enumeration Pack☆39May 9, 2016Updated 9 years ago
- Documentation for connecting Microsoft Sentinel and the ACSC CTIS platform☆10Jan 23, 2024Updated 2 years ago
- ☆11Mar 27, 2024Updated last year
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆10Jan 27, 2014Updated 12 years ago
- Tracking DJI No Fly Zones☆12Jul 16, 2024Updated last year
- Python implementation of a Bugcrowd api client.☆11Nov 20, 2025Updated 4 months ago