Found 554 repositories(showing 30)
shuvonsec
AI-powered bug bounty hunting from your terminal - recon, 20 vuln classes, autonomous hunting, and report generation. All inside Claude Code.
marcosd4h
Live hunting of code injection techniques
GaloisInc
MATE is a suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code using Code Property Graphs.
duo-labs
The code used in the "Don't @ Me: Hunting Twitter Bots at Scale" Black Hat presentation
transilienceai
Open-source Claude Code skills, agents, and slash commands for AI-powered penetration testing, bug bounty hunting, and security research
danpeg
Adversarial bug hunting skill for Claude Code. 3 isolated agents (Hunter, Skeptic, Referee) find and verify real bugs.
spaceraccoon
A web CTF for training developers in bug hunting and secure coding!
M4xSec
A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during my BUG Hunting Rest You can add Your CUSTOM payloads too ;)
apatrascu
Files associated to the "Hunting Performance in Python Code" blog series - https://pythonfiles.wordpress.com/2017/05/15/hunting-python-performance-setup/
alimirjalili
The GWO algorithm mimics the leadership hierarchy and hunting mechanism of grey wolves in nature. Four types of grey wolves such as alpha, beta, delta, and omega are employed for simulating the leadership hierarchy. In addition, three main steps of hunting, searching for prey, encircling prey, and attacking prey, are implemented to perform optimization. This is the source codes of the paper: S. Mirjalili, S. M. Mirjalili, A. Lewis, Grey Wolf Optimizer, Advances in Engineering Software, Volume 69, March 2014, Pages 46-61, ISSN 0965-9978, http://dx.doi.org/10.1016/j.advengsoft.2013.12.007. More information can be found in: http://www.alimirjalili.com/GWO.html
andrestoga
This repository contains all the take-home coding tests I've done during my job hunting in Robotics.
Hazrat-Ali9
⚽ Hunting ⚾ Coder 🥎 is a sleek 🏀 blazing 🏐 fast and 🏈 fully 🎳 responsive 🎮 developer 🏘 blog and 🕍 portfolio 🏰 platform 🚋 built coders 🚌 who love 🚞 to write 🛼 share and 🚁 showcase ✈ their work 🚀 you're a 🚠 full stack 🚟 ninja a tech ⛴ blogger or 🛬 a CS student 🛸 this is your 🚢 home ⛱ on ☂ the ☄ web 🚝
0xHunterr
The Nen Book is a list of personal notes and tips collected from a lot of recourses in different categories like: WebApp Security, API Security, Cloud Security, Network Pentesting, Code Review, Threat Hunting.
jantonakos
Code, commands, and chatter about Threat Hunting.
ShreeshaBhat1004
Job-Scout is completely open-source, and we'd love your help! Right now, it fetches jobs from Twitter (X) and Hacker News, but with your contributions, we can expand it to cover more job sites. Whether you’re passionate about coding, improving job-hunting tools, or adding new job sources, your contributions are welcome
webpro255
A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.
puntorigen
Light up your lost JS/TS source code with Recover-Source! 🚀 This handy CLI tool recovers and revives your original source code from a directory packed with minified/uglified .js or .ts files, including their respective sourcemap files. Reveal the original beauty of your code, just as it was before the compilation process. Happy code hunting! 🕵️♂
ByamB4
CVE hunting harness for Claude Code - 20 skills, 5-agent team, systematic vulnerability research with false positive elimination
krrm1
hunting script fork form dox script to make it better with my new code
thieveshkar
A portfolio demonstrating advanced blue and red team skills, including: SSH MFA implementation, Volatility-based memory forensics to detect code injection, Splunk threat hunting (BOTS v3), Wireshark C2 analysis, and kernel exploitation walkthroughs (LinPEAS, VulnHub).
sabir789
Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypass 403 and 401 HTTP response codes, along with various tips and tricks for bug bounty hunting. If you're passionate about finding vulnerabilities and improving security, this is the right place for you!
intelliroot-tech
“Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract possibly injected code from the processes on a LIVE windows system. The tool can be used for Threat Hunting, Malware Analysis and Incident Response.
HuXiaoling
Codes for the ICLR 2022 paper: Trigger Hunting with a Topological Prior for Trojan Detection
bunnyhp
Production-ready SOC implementation with Splunk, SOAR automation, and MITRE ATT&CK detection rules splunk, phantom, zeek, incident-response, threat-hunting, detection-rules, blue-team, security-orchestration, aws, cloud-security, devops, infrastructure-as-code
CaptainSpaceCat
Code for an Arduino Micro running a shiny hunting device for use with the Old 3DS XL
machine1337
An Efficent tool to find juicy secrets in javascript source code. Automate Your Javascript hunting using this tool.
kraven-security
Code to create, manage, and deploy testing environments using Terraform and Ansible. This includes environments for Kubernetes clusters, malware analysis, and threat hunting.
tariktesfa
Bug hunting exercise for finding error from the code
CodeMOOC
Telegram bot for the “Code Hunting Games” at the Urbino CodeMOOC Summer School.
ant4g0nist
A Ralph Wiggum-style Claude Code plugin for iterative vulnerability hunting...