List of companies that hire security people full remote.
☆109Mar 7, 2026Updated last week
Alternatives and similar repositories for companies-hiring-security-remote
Users that are interested in companies-hiring-security-remote are comparing it to the libraries listed below
Sorting:
- random scripts☆17Nov 10, 2024Updated last year
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 6 months ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- HackerRank-Python 🐍☆14Nov 10, 2024Updated last year
- ☆12Oct 21, 2024Updated last year
- Golang module exporting general purpose functions I get tired of rewriting every time☆23Nov 10, 2024Updated last year
- Useful material for learning Python, start coding and learn how to logically solve real world problems.☆27Nov 10, 2024Updated last year
- ☆28Aug 7, 2024Updated last year
- Downlaod all the nuclei Templates created from many Bug Hunters☆29May 25, 2023Updated 2 years ago
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆39Feb 14, 2026Updated last month
- CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing…☆33Feb 26, 2026Updated 3 weeks ago
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆81Jan 29, 2025Updated last year
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- A list of awesome penetration testing tools and resources.☆83Oct 19, 2023Updated 2 years ago
- An open-source DNS resolver written in Go that can resolve IP addresses for domain names. This command-line tool allows users to easily l…☆26Apr 8, 2023Updated 2 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆125Nov 10, 2024Updated last year
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 27, 2026Updated 2 weeks ago
- A simple script for plotting the flight path of aircraft from ADS-B packet data☆12Jan 25, 2018Updated 8 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆47May 22, 2025Updated 9 months ago
- University Java project. It's a lightweight tool specialized in tweets analysis.☆11Nov 10, 2024Updated last year
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Nov 10, 2024Updated last year
- Little Bug Bounty & Hacking Tools⚔️☆372Updated this week
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Mar 21, 2018Updated 7 years ago
- Two-factor authentication on the command line using the OS keychain☆13Aug 26, 2019Updated 6 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- HackerRank-LinuxShell Solutions☆47Nov 10, 2024Updated last year
- Show Exploit-Database With Static HTML Automatic Generate Everyday.☆13Jun 13, 2021Updated 4 years ago
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Nov 10, 2024Updated last year
- Tool to fuzz for interesting vhost.☆24Jan 8, 2025Updated last year
- OWASP Foundation Web Respository☆26Oct 11, 2025Updated 5 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Following OWASP TOP 10 (the top ten most critical web application security risk) I decided to build an XSS Scanner.☆12Dec 12, 2022Updated 3 years ago