CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.
☆36Sep 14, 2025Updated 7 months ago
Alternatives and similar repositories for report-extractor
Users that are interested in report-extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 9 months ago
- A simple browser extension to quickly find interesting security-related information on a webpage.☆175Mar 26, 2026Updated 3 weeks ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 5 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated last month
- H0tmCheck: email checking sin ruido, sin basura, solo resultados.☆18Dec 14, 2025Updated 4 months ago
- An advanced networking tool for penetration testing... A place where floats and integers always win.☆31Aug 18, 2025Updated 7 months ago
- OSCP prep checklist - study plan, exam structure, tools, and methodology☆57Feb 4, 2026Updated 2 months ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆42Jun 16, 2025Updated 10 months ago
- Comunidade Brasileira de Cibersegurança☆24Oct 6, 2025Updated 6 months ago
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆125Mar 2, 2026Updated last month
- cli for iTerm2☆27Mar 25, 2026Updated 3 weeks ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆14May 27, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- ✨ Open-source AI hackers for your apps 👨🏻💻☆34Sep 9, 2025Updated 7 months ago
- Mastering Linux Command Line by Packt Publishing☆16Jan 30, 2023Updated 3 years ago
- Free BugBounty KrazePlanetTraining☆57Dec 17, 2025Updated 3 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 6 months ago
- Barcha is your Swiss‑Army knife for SQL Injection reconnaissance 🔍. Written in Go, it automates: Shodan enumeration of SSL hosts 🕵️♂️…☆30Apr 18, 2025Updated 11 months ago
- Linkfinder by Rdzsp is a browser extension that automatically scans and collects endpoints from JavaScript files on websites☆33Aug 22, 2024Updated last year
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Personal deploy of github streak stats forked from denvercoder's streak stats☆20Mar 24, 2026Updated 3 weeks ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆89Nov 5, 2023Updated 2 years ago
- Django middleware and signals for handling security events☆13Apr 14, 2021Updated 5 years ago
- setup wazuh to serve multiple organizations on a single instance.☆12Dec 29, 2023Updated 2 years ago
- Data, analytic code, and findings supporting BuzzFeed News's analysis of diversity in the dialogue of Best Picture–nominated films☆10Jun 21, 2022Updated 3 years ago
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- A MCP Server that provides browser access through playwright with "stealth mode" enabled.☆22Jun 29, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- ☆53Oct 1, 2025Updated 6 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- 🧅 An Angular scaffold with a clean architecture that is easy to understand.☆16Jan 28, 2025Updated last year
- Collection of over 9000 xss payloads | heavy xss collection☆13Dec 6, 2022Updated 3 years ago
- ☆28Jul 28, 2018Updated 7 years ago