AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.
☆57Feb 12, 2022Updated 4 years ago
Alternatives and similar repositories for AutoTriageBot
Users that are interested in AutoTriageBot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Node.js middleware for Express that implements Security.txt - A Method for Web Security Policies☆18Updated this week
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- ☆10Apr 8, 2018Updated 8 years ago
- ☆15Nov 11, 2015Updated 10 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of response templates for invalid bug bounty reports.☆90Feb 26, 2018Updated 8 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- ☆30Jul 24, 2025Updated 9 months ago
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆164Apr 24, 2025Updated last year
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 7 years ago
- 🔐 Identify and Parse Web Security Policies Files in R☆11Aug 18, 2019Updated 6 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- ☆334Jan 8, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- iOS 11.3.1 exploit☆48Dec 26, 2018Updated 7 years ago
- A Rails application containing multiple vulnerabilities used for demonstration purposes☆20Mar 26, 2015Updated 11 years ago
- GitHub Action adding a comment with information about new npm dependencies detected in a pull request☆17Mar 30, 2024Updated 2 years ago
- Security challenges and CTFs created by the Penultimate team.☆14Feb 22, 2018Updated 8 years ago
- ☆27Feb 19, 2026Updated 3 months ago
- A toolset to track and organize output of reconnaissance tools☆347Jan 3, 2018Updated 8 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- LSB-test☆12Jul 18, 2017Updated 8 years ago
- Proof of Concepts for CVE-2016–3714☆495May 23, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆277Oct 19, 2021Updated 4 years ago
- Office for Mac Macro Payload Generator☆243Sep 25, 2025Updated 7 months ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- A modular, scalable, fast and reliable phishing detection framework☆11Dec 1, 2018Updated 7 years ago
- A package for serving `security.txt` in Laravel 5.5+, based on configuration settings. https://securitytext.org/☆10Mar 21, 2019Updated 7 years ago
- The vulnerability disclosure policy for 18F and GSA's Technology Transformation Service.☆26Aug 6, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Keylogger using FTP server as an intermediate with some cool additional functions☆22Apr 15, 2017Updated 9 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- ☆29May 4, 2016Updated 10 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆601Feb 12, 2022Updated 4 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Sep 24, 2018Updated 7 years ago