CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.
☆36Sep 14, 2025Updated 6 months ago
Alternatives and similar repositories for report-extractor
Users that are interested in report-extractor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains all the GF-Patterns Repositories. All we have to do is just to run the given Shell File and it's Done !!☆21Jun 28, 2025Updated 8 months ago
- A simple browser extension to quickly find interesting security-related information on a webpage.☆173Mar 17, 2026Updated last week
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 4 months ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- A CLI utility to scan S3 buckets permissions☆14May 14, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- EnumDNS is a modular DNS reconnaissance tool capable of resolving hosts from various sources, including wordlists, BloodHound files, and …☆21Mar 9, 2026Updated 2 weeks ago
- An advanced networking tool for penetration testing... A place where floats and integers always win.☆31Aug 18, 2025Updated 7 months ago
- BookMark and Find Subdomains, Endpoints, External Domains in your web browser.☆28Aug 1, 2025Updated 7 months ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆11May 12, 2022Updated 3 years ago
- Simple web app to track OWASP WSTG security testing progress☆27Sep 12, 2025Updated 6 months ago
- Comunidade Brasileira de Cibersegurança☆23Oct 6, 2025Updated 5 months ago
- WiFisploit is a tool designed to scan and attack Wi-Fi networks using variety of powerful and effective attacks. It contains numerous com…☆42Jun 16, 2025Updated 9 months ago
- A resource full of Crypto/OSINT tools, techniques and training courses for CTI, AML, and forensic investigations.☆126Mar 2, 2026Updated 3 weeks ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆14May 27, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- Free BugBounty KrazePlanetTraining☆56Dec 17, 2025Updated 3 months ago
- This toolkit useful in profiling, research and digital investigations built for me and my trainees. Working and necessary tools only. All…☆42Nov 22, 2025Updated 4 months ago
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆46Aug 13, 2025Updated 7 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 5 months ago
- Barcha is your Swiss‑Army knife for SQL Injection reconnaissance 🔍. Written in Go, it automates: Shodan enumeration of SSL hosts 🕵️♂️…☆30Apr 18, 2025Updated 11 months ago
- Linkfinder by Rdzsp is a browser extension that automatically scans and collects endpoints from JavaScript files on websites☆32Aug 22, 2024Updated last year
- Find subdomains by searching public certificate records☆16Jun 11, 2024Updated last year
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆39Feb 3, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Personal deploy of github streak stats☆20Dec 29, 2025Updated 2 months ago
- Unofficial Acunetix CLI tool for automated pentesting and bug hunting across large scopes.☆86Nov 5, 2023Updated 2 years ago
- SecureEye is an AI tool for secure code review. It assesses code for vulnerabilities, and common attack vectors☆14May 21, 2024Updated last year
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆29May 10, 2024Updated last year
- ☆29Jan 19, 2026Updated 2 months ago
- setup wazuh to serve multiple organizations on a single instance.☆11Dec 29, 2023Updated 2 years ago
- a WebSocket cat.☆14Aug 5, 2017Updated 8 years ago
- This is a smart contract tutorial, this tutorial guide you how to compile & deploy a mintable ERC20 token smart contract using client sid…☆13Oct 6, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Data, analytic code, and findings supporting BuzzFeed News's analysis of diversity in the dialogue of Best Picture–nominated films☆10Jun 21, 2022Updated 3 years ago
- A MCP Server that provides browser access through playwright with "stealth mode" enabled.☆21Jun 29, 2025Updated 8 months ago
- ☆52Oct 1, 2025Updated 5 months ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆11Jul 14, 2023Updated 2 years ago
- php7.4.26-internalog☆13Oct 13, 2022Updated 3 years ago
- Base OKE automated deployment with extras, to be used alone or by other Quickstarts☆13Jun 20, 2025Updated 9 months ago