This repo is meant to be a list of companies that hire security people full remote.
☆457May 26, 2025Updated 11 months ago
Alternatives and similar repositories for companies-hiring-security-remote
Users that are interested in companies-hiring-security-remote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a Go code to detect leaks in JS files via regex patterns☆152Oct 20, 2021Updated 4 years ago
- Web cache poisoning vulnerability scanner.☆75May 5, 2022Updated 4 years ago
- ☆2,619Feb 2, 2026Updated 3 months ago
- ☆20Apr 5, 2023Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,120Jul 29, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆683Aug 7, 2020Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,894Apr 5, 2024Updated 2 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35May 29, 2022Updated 3 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- ☆754Jun 26, 2024Updated last year
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,166Apr 3, 2026Updated last month
- ☆32Apr 6, 2021Updated 5 years ago
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,701Jun 20, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,336Mar 13, 2026Updated 2 months ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,818Apr 6, 2026Updated last month
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 3 years ago
- ☆18May 12, 2026Updated last week
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- ☆15May 6, 2023Updated 3 years ago
- Filter and enrich a list of subdomains by level☆214Sep 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extract domains/subdomains/FQDNs from files and URLs☆20Jun 30, 2020Updated 5 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,373Sep 30, 2024Updated last year
- BugBountyTips☆413Jul 31, 2025Updated 9 months ago
- ☆435Jun 1, 2021Updated 4 years ago
- A cheatsheet for exploiting server-side SVG processors.☆800Jul 2, 2020Updated 5 years ago
- Public tools, scripts or code snippets that can help when working with our products☆48Mar 12, 2026Updated 2 months ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆158Nov 24, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,233Aug 14, 2024Updated last year
- XSS reflector vulnerabilities exploitation extended.☆28Jul 25, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Electron JS Browser To Find XSS Vulnerabilities Automatically☆749Mar 30, 2021Updated 5 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆969May 21, 2025Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,075Jan 2, 2024Updated 2 years ago
- Various Payload wordlists☆242Apr 26, 2025Updated last year
- A collection of hacks and one-off scripts☆2,464Mar 13, 2025Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆188Dec 29, 2023Updated 2 years ago