security.txt collection of most popular world-wide domains
☆56Sep 25, 2023Updated 2 years ago
Alternatives and similar repositories for safe-harbour
Users that are interested in safe-harbour are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Turns a list of URLs into hostnames.☆16Feb 9, 2026Updated last month
- List all public repositories for (valid) GitHub usernames☆77Sep 25, 2023Updated 2 years ago
- Archive of Potential Insider Threats☆153Sep 25, 2023Updated 2 years ago
- Just some bash scripting to help your recon.☆16Feb 4, 2026Updated last month
- Generate tens of thousands of subdomain combinations in a matter of seconds☆273Sep 25, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Combine words from two wordlist files and concatenate them with an optional delimiter☆39Sep 25, 2023Updated 2 years ago
- Make URL path combinations using a wordlist☆171Sep 25, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- A very simple AEM detector written in rust.🦀☆20Jun 27, 2023Updated 2 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Feb 16, 2022Updated 4 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- ☆18Apr 7, 2022Updated 3 years ago
- List of bug bounty programs of companies/organisations in Switzerland☆13Oct 28, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- Paramix is a command-line tool for modifying the parameters of a list of URLs from stdin and returns them in stdout.☆17Aug 23, 2024Updated last year
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- A Go tool that gets the newest PRs from projectdiscovery/nuclei-templates.☆55Jun 13, 2023Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- Find related domains of a given domain.☆104Aug 5, 2023Updated 2 years ago
- Check List☆80Jul 16, 2022Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Asset inventory of over 800 public bug bounty programs.☆1,526Feb 14, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- The most exhaustive list of reliable DNS resolvers.☆971Updated this week
- Vulnerability Cheatsheet☆54Apr 22, 2022Updated 3 years ago
- Filter and enrich a list of subdomains by level☆213Sep 25, 2023Updated 2 years ago
- basic bbtools , buggy , not recommended to use☆35Jan 22, 2025Updated last year
- Tools for understanding other people's code☆145Sep 7, 2023Updated 2 years ago
- Script that download 37+ open source nuclei templates☆45Sep 2, 2022Updated 3 years ago
- ☆26Feb 28, 2023Updated 3 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆52Sep 30, 2022Updated 3 years ago
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆18Nov 18, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Icahn Graduate School of Medicine: Systems Biology & Biotechnology Specialization☆14Jun 17, 2017Updated 8 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆58Mar 2, 2022Updated 4 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- ☆13Mar 1, 2024Updated 2 years ago