Statistics for topic bug-bounty
RepositoryStats tracks 591,869 Github repositories, of these 185 are tagged with the bug-bounty topic. The most common primary language for repositories using this topic is Python (41). Other languages include: Go (31), Shell (28)
Stargazers over time for topic bug-bounty
Most starred repositories for topic bug-bounty (view more)
Trending repositories for topic bug-bounty (view more)
A collection of various awesome lists for hackers, pentesters and security researchers
A list of resources for those interested in getting started in bug bounties
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
A living document for penetration testing and offensive security.
A collection of various awesome lists for hackers, pentesters and security researchers
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous mon...
My useful files for penetration tests, security assessments, bug bounty and other security related stuff
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
A collection of various awesome lists for hackers, pentesters and security researchers
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous mon...
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
"Essential Kali Linux commands for ethical hackers and penetration testers."
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
Open source templates you can use to bootstrap your security programs
Cyber-Security Bible! Theory and Tools, Kali Linux, Penetration Testing, Bug Bounty, CTFs, Malware Analysis, Cryptography, Secure Programming, Web App Security, Cloud Security, Devsecops, Ethical Hack...
Status Checker is a Python tool for swiftly checking the status of URLs. It categorizes responses by HTTP status codes, offering clear insights into website health. With async requests, color-coded ou...
A collection of various awesome lists for hackers, pentesters and security researchers
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous mon...
A list of resources for those interested in getting started in bug bounties
Stalker, the Extensible Attack Surface Management tool.
Official (pkgforge-edge) Repo 📦📀 & The Largest Collection of Pre-Compiled (+ UPXed) Linux Static Binaries (incl. Build Scripts) & Package Manager (rust) :: https://github.com/pkgforge/soar
Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets!
An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.
"Essential Kali Linux commands for ethical hackers and penetration testers."