This repo is meant to be a list of companies that hire security people full remote.
☆456May 26, 2025Updated 10 months ago
Alternatives and similar repositories for companies-hiring-security-remote
Users that are interested in companies-hiring-security-remote are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- a Go code to detect leaks in JS files via regex patterns☆152Oct 20, 2021Updated 4 years ago
- Web cache poisoning vulnerability scanner.☆75May 5, 2022Updated 3 years ago
- ☆2,459Feb 2, 2026Updated 2 months ago
- ☆20Apr 5, 2023Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,095Jul 29, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆681Aug 7, 2020Updated 5 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,885Apr 5, 2024Updated 2 years ago
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35May 29, 2022Updated 3 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,095Apr 3, 2026Updated last week
- ☆755Jun 26, 2024Updated last year
- ☆31Apr 6, 2021Updated 5 years ago
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,696Jun 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆329Mar 27, 2024Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,274Mar 13, 2026Updated 3 weeks ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,807Sep 17, 2024Updated last year
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆87May 6, 2023Updated 2 years ago
- ☆17Mar 13, 2026Updated 3 weeks ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- ☆15May 6, 2023Updated 2 years ago
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extract domains/subdomains/FQDNs from files and URLs☆19Jun 30, 2020Updated 5 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,366Sep 30, 2024Updated last year
- BugBountyTips☆414Jul 31, 2025Updated 8 months ago
- Public tools, scripts or code snippets that can help when working with our products☆46Mar 12, 2026Updated 3 weeks ago
- ☆437Jun 1, 2021Updated 4 years ago
- A cheatsheet for exploiting server-side SVG processors.☆798Jul 2, 2020Updated 5 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆156Nov 24, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,144Aug 14, 2024Updated last year
- XSS reflector vulnerabilities exploitation extended.☆27Jul 25, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Electron JS Browser To Find XSS Vulnerabilities Automatically☆749Mar 30, 2021Updated 5 years ago
- ☆29Dec 13, 2023Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆957May 21, 2025Updated 10 months ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,067Jan 2, 2024Updated 2 years ago
- Various Payload wordlists☆240Apr 26, 2025Updated 11 months ago
- A collection of hacks and one-off scripts☆2,453Mar 13, 2025Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Dec 29, 2023Updated 2 years ago