List of companies that hire security people full remote.
☆110Mar 7, 2026Updated last month
Alternatives and similar repositories for companies-hiring-security-remote
Users that are interested in companies-hiring-security-remote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- random scripts☆17Nov 10, 2024Updated last year
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 7 months ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 4 years ago
- HackerRank-Python 🐍☆14Nov 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Oct 21, 2024Updated last year
- Golang module exporting general purpose functions I get tired of rewriting every time☆24Nov 10, 2024Updated last year
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 7 months ago
- ☆28Aug 7, 2024Updated last year
- Downlaod all the nuclei Templates created from many Bug Hunters☆29May 25, 2023Updated 2 years ago
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆39Feb 14, 2026Updated 2 months ago
- CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing…☆47Feb 26, 2026Updated 2 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆87Jan 29, 2025Updated last year
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- Will Boyd, 1124, Kubernetes and Cloud Native Associate (KCNA)☆21Dec 16, 2022Updated 3 years ago
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- An open-source DNS resolver written in Go that can resolve IP addresses for domain names. This command-line tool allows users to easily l…☆26Apr 8, 2023Updated 3 years ago
- This repo is meant to be a list of companies that hire security people full remote.☆457May 26, 2025Updated 11 months ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆125Nov 10, 2024Updated last year
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Generate customized Password/Passphrase wordlist based on target information☆104Feb 27, 2026Updated 2 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆49May 22, 2025Updated 11 months ago
- University Java project. It's a lightweight tool specialized in tweets analysis.☆11Nov 10, 2024Updated last year
- ☆15Mar 21, 2025Updated last year
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Nov 10, 2024Updated last year
- Little Bug Bounty & Hacking Tools⚔️☆376Mar 30, 2026Updated last month
- Field guide to gather low-hanging fruits☆15Mar 20, 2025Updated last year
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆15Mar 21, 2018Updated 8 years ago
- Two-factor authentication on the command line using the OS keychain☆13Aug 26, 2019Updated 6 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆18Apr 30, 2020Updated 6 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆51Dec 10, 2025Updated 4 months ago
- HackerRank-LinuxShell Solutions☆46Nov 10, 2024Updated last year