jaegeral / companies-hiring-security-remoteView external linksLinks
This repo is meant to be a list of companies that hire security people full remote.
☆454May 26, 2025Updated 8 months ago
Alternatives and similar repositories for companies-hiring-security-remote
Users that are interested in companies-hiring-security-remote are comparing it to the libraries listed below
Sorting:
- Web cache poisoning vulnerability scanner.☆72May 5, 2022Updated 3 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,074Jul 29, 2024Updated last year
- ☆2,431Feb 2, 2026Updated 2 weeks ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,881Apr 5, 2024Updated last year
- a Go code to detect leaks in JS files via regex patterns☆150Oct 20, 2021Updated 4 years ago
- A collection of special paths linked to common sensitive APIs, devops internals, frameworks conf, known misconfigurations, juicy APIs ..e…☆1,021Jun 24, 2024Updated last year
- Some of the questions which i was asked when i was giving interviews for Application/Product Security roles. I am sure this is not an exh…☆676Aug 7, 2020Updated 5 years ago
- ☆24Jan 26, 2021Updated 5 years ago
- ☆20Apr 5, 2023Updated 2 years ago
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,691Jun 20, 2022Updated 3 years ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- All the members of bugbounty and infosec. If you don't know who to follow, see!☆35May 29, 2022Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆325Mar 27, 2024Updated last year
- A cheatsheet for exploiting server-side SVG processors.☆790Jul 2, 2020Updated 5 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,201Jan 31, 2026Updated 2 weeks ago
- ☆755Jun 26, 2024Updated last year
- Electron JS Browser To Find XSS Vulnerabilities Automatically☆746Mar 30, 2021Updated 4 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,346Sep 30, 2024Updated last year
- Laravel PHP framework black-box vulnerability scanner☆34Sep 3, 2024Updated last year
- sub domain wild card filtering tool☆40Apr 18, 2020Updated 5 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Dec 29, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,057Aug 14, 2024Updated last year
- Filter and enrich a list of subdomains by level☆210Sep 25, 2023Updated 2 years ago
- ☆31Apr 6, 2021Updated 4 years ago
- List of Awesome Asset Discovery Resources☆2,320Jan 22, 2025Updated last year
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 4 years ago
- Write-ups of my findings.☆122Sep 2, 2023Updated 2 years ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,059Jan 2, 2024Updated 2 years ago
- A collection of hacks and one-off scripts☆2,418Mar 13, 2025Updated 11 months ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,285Aug 7, 2024Updated last year
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆155Nov 24, 2023Updated 2 years ago
- ☆1,201Sep 2, 2022Updated 3 years ago
- Mind-Maps of Several Things☆2,623Jun 29, 2023Updated 2 years ago
- ☆435Jun 1, 2021Updated 4 years ago
- BugBountyTips☆414Jul 31, 2025Updated 6 months ago
- The format of various s3 buckets is convert in one format. for bugbounty and security testing.☆86May 6, 2023Updated 2 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Nov 8, 2021Updated 4 years ago