Collection of legal threats against good faith Security Researchers; vulnerability disclosure gone wrong. A continuation of work started by @attritionorg
☆322Mar 27, 2026Updated 2 weeks ago
Alternatives and similar repositories for research-threats
Users that are interested in research-threats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆34Mar 20, 2026Updated 3 weeks ago
- 🦊A cloudflare DNS over HTTPs resolver client library.☆12Jan 10, 2023Updated 3 years ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆236Feb 1, 2022Updated 4 years ago
- Tools, data, and contact lists relevant to The disclose.io Project.☆326Mar 20, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 6 months ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 5 years ago
- ☆66Aug 25, 2021Updated 4 years ago
- ☆51Mar 9, 2022Updated 4 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 4 years ago
- ☆23Mar 29, 2022Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Jun 8, 2021Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- ☆449Oct 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Hackers Don't Give A Shit☆16Feb 2, 2020Updated 6 years ago
- ☆18Mar 21, 2022Updated 4 years ago
- DIT is a DTLS MitM proxy implemented in Python 3. It can intercept, manipulate and suppress datagrams between two DTLS endpoints and supp…☆59Jan 28, 2022Updated 4 years ago
- ☆48Nov 13, 2021Updated 4 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Jul 2, 2021Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Jul 28, 2023Updated 2 years ago
- Twenty-twenty, bugs aplenty!☆54Jan 10, 2023Updated 3 years ago
- A pre-DDoS security assessment tool☆119Jun 11, 2021Updated 4 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Fetch the details of assets hosted on AWS.☆88Dec 4, 2023Updated 2 years ago
- Ingest openldap data into bloodhound☆80Apr 1, 2021Updated 5 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover☆853Feb 13, 2023Updated 3 years ago
- Open-source vulnerability disclosure and bug bounty program database☆1,055Mar 28, 2026Updated 2 weeks ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Jul 24, 2025Updated 8 months ago
- Yet Another Sniffer for monitoring network traffic☆84Jun 12, 2021Updated 4 years ago
- fundamental traits to describe an architecture in the yaxpeax project☆17Mar 1, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- WebSocket Connection Smuggler☆47Sep 30, 2022Updated 3 years ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆30Jun 7, 2025Updated 10 months ago
- Accompanying code for blog post "Mapping iOS Persistence Attack Surface using Corellium"☆11Jun 10, 2025Updated 10 months ago
- This repository contains the tools we used in our research on the Google Titan M chip☆206Aug 22, 2022Updated 3 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- JXA and swift code that can perform some macOS situational awareness without generating TCC prompts.☆40Apr 20, 2022Updated 3 years ago
- Take a word list and convert 1337 spellings back to normal☆12Nov 20, 2017Updated 8 years ago