This repo is meant to be a list of companies that hire security people full remote.
☆456May 26, 2025Updated 9 months ago
Alternatives and similar repositories for companies-hiring-security-remote
Users that are interested in companies-hiring-security-remote are comparing it to the libraries listed below
Sorting:
- a Go code to detect leaks in JS files via regex patterns☆151Oct 20, 2021Updated 4 years ago
- Web cache poisoning vulnerability scanner.☆73May 5, 2022Updated 3 years ago
- ☆2,454Feb 2, 2026Updated last month
- ☆20Apr 5, 2023Updated 2 years ago
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆681Aug 7, 2020Updated 5 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,084Jul 29, 2024Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,885Apr 5, 2024Updated last year
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35May 29, 2022Updated 3 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,028Feb 22, 2026Updated 3 weeks ago
- ☆24Jan 26, 2021Updated 5 years ago
- ☆756Jun 26, 2024Updated last year
- ☆32Apr 6, 2021Updated 4 years ago
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,694Jun 20, 2022Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,244Mar 13, 2026Updated last week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Sep 17, 2024Updated last year
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- ☆17Mar 13, 2026Updated last week
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- ☆15May 6, 2023Updated 2 years ago
- Filter and enrich a list of subdomains by level☆210Sep 25, 2023Updated 2 years ago
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,363Sep 30, 2024Updated last year
- BugBountyTips☆413Jul 31, 2025Updated 7 months ago
- ☆437Jun 1, 2021Updated 4 years ago
- A cheatsheet for exploiting server-side SVG processors.☆798Jul 2, 2020Updated 5 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,101Aug 14, 2024Updated last year
- XSS reflector vulnerabilities exploitation extended.☆27Jul 25, 2021Updated 4 years ago
- Electron JS Browser To Find XSS Vulnerabilities Automatically☆748Mar 30, 2021Updated 4 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆951May 21, 2025Updated 10 months ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,063Jan 2, 2024Updated 2 years ago
- Various Payload wordlists☆240Apr 26, 2025Updated 10 months ago
- A collection of hacks and one-off scripts☆2,425Mar 13, 2025Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Dec 29, 2023Updated 2 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,985Sep 5, 2021Updated 4 years ago