List of companies that hire security people full remote.
☆109Mar 7, 2026Updated last month
Alternatives and similar repositories for companies-hiring-security-remote
Users that are interested in companies-hiring-security-remote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 7 months ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- ☆13Oct 21, 2024Updated last year
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Useful material for learning Python, start coding and learn how to logically solve real world problems.☆27Nov 10, 2024Updated last year
- Barebones RAT which provides a shell over TLS☆12Apr 10, 2021Updated 5 years ago
- ☆28Aug 7, 2024Updated last year
- Downlaod all the nuclei Templates created from many Bug Hunters☆29May 25, 2023Updated 2 years ago
- This script is used to automatically start/stop ec2 instance to match target ip in aws ip pool to takeover subdomain..☆17Oct 8, 2023Updated 2 years ago
- Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more☆57Nov 10, 2024Updated last year
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 3 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆39Feb 14, 2026Updated last month
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing…☆40Feb 26, 2026Updated last month
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆84Jan 29, 2025Updated last year
- Simple C file decrypter☆12Nov 10, 2024Updated last year
- InfoSec OpenAI Examples☆19Nov 26, 2023Updated 2 years ago
- An open-source DNS resolver written in Go that can resolve IP addresses for domain names. This command-line tool allows users to easily l…☆26Apr 8, 2023Updated 3 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- 🏴☠️ tools (py3 version) of Black Hat Python book 🏴☠️☆125Nov 10, 2024Updated last year
- Wayfiles is a tool designed to search for juicy files and URLs within a folder/file with results of tools like gau, waymore, waybackurls,…☆16Feb 22, 2026Updated last month
- Generate customized Password/Passphrase wordlist based on target information☆97Feb 27, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆49May 22, 2025Updated 10 months ago
- Files with examples that meet expectations☆10Jan 23, 2023Updated 3 years ago
- University Java project. It's a lightweight tool specialized in tweets analysis.☆11Nov 10, 2024Updated last year
- ☆15Mar 21, 2025Updated last year
- Little Bug Bounty & Hacking Tools⚔️☆375Mar 30, 2026Updated last week
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- An another JWT cracker but really fast!☆12Jan 26, 2023Updated 3 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Proof-Of-Concept SSH Worm. Not for illegal use.☆14Mar 21, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- ATT&CK Models of the Threat Actor "Phineas Fisher"☆18Apr 30, 2020Updated 5 years ago
- This repository contains all the examples related to a series of tutorials that demonstrate how to use the new Montoya API of Burp Suite …☆50Dec 10, 2025Updated 4 months ago
- HackerRank-LinuxShell Solutions☆47Nov 10, 2024Updated last year
- Response Filter Denial of Service (RFDoS) Experimental Scanner☆16Nov 10, 2024Updated last year
- Tool to fuzz for interesting vhost.☆24Jan 8, 2025Updated last year