Lists (1)
Sort Name ascending (A-Z)
Stars
Open source Claude Artifacts – built with Llama 3.1 405B
Make websites accessible for AI agents
Qwen2.5-Coder is the code version of Qwen2.5, the large language model series developed by Qwen team, Alibaba Cloud.
A Docker-powered service for PDF document layout analysis. This service provides a powerful and flexible PDF analysis service. The service allows for the segmentation and classification of differen…
Top disclosed reports from HackerOne
A collection of awesome penetration testing resources, tools and other shiny things
A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms currently active on the Internet.
Auto_Jobs_Applier_AI_Agent aims to easy job hunt process by automating the job application process. Utilizing artificial intelligence, it enables users to apply for multiple jobs in an tailored way.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
Set of tools to assess and improve LLM security.
This Python script automates the bug bounty recon process using various open-source tools for subdomain enumeration, directory scanning, port scanning, vulnerability scanning, and other techniques.…
Opspack (Open Source Security Package) is a simple package manager for bug bounty/offensive. Using command line interface that can be used to install,update and upgrade tools easily with lots of op…
Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation
I have collected different open source tools for my bug-bounty. So in this repo i have organized them in a systematic way. So whenever i need something i can easily find required tools
An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.
Random tools I've written for bug bounties
Automatically install some web hacking/bug bounty tools.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
All about bug bounty (bypasses, payloads, and etc)
🎓 Path to a free self-taught education in Computer Science!