Skip to content
View Akilax0's full-sized avatar
👹
Working ...
👹
Working ...
  • University of Maryland
  • Maryland, United States of America
  • 19:47 (UTC -04:00)

Organizations

@cepdnaclk

Block or report Akilax0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

book list

C++ 299 75 Updated Mar 4, 2019

🔈 The React for Voice and Chat: Build Apps for Alexa, Messenger, Instagram, the Web, and more

TypeScript 1,671 303 Updated Apr 24, 2025

Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature

4,080 1,013 Updated Jul 31, 2024

🐛 A list of writeups from the Google VRP Bug Bounty program

Python 1,464 247 Updated Feb 7, 2026

C++ Implementations of Various Machine Learning Algorithms using the MNIST Handwriting Data Set

C++ 72 18 Updated May 10, 2020
Assembly 138 55 Updated Sep 27, 2021

Bug Bounty Roadmaps

1,716 296 Updated Jun 12, 2021

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 69,722 24,928 Updated Mar 25, 2026

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 76,349 16,782 Updated Mar 16, 2026

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

Python 5,585 1,132 Updated Aug 6, 2023

A collection of various awesome lists for hackers, pentesters and security researchers

109,053 10,087 Updated Jan 18, 2025

A collection of awesome videos, articles, books and resources about ARM exploitation.

361 44 Updated Jan 4, 2024

The Bug Hunters Methodology

4,267 827 Updated Aug 1, 2023

Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…

Python 5,257 958 Updated Mar 13, 2026

Open source education content for the researcher community

2,759 564 Updated Apr 13, 2022

The class resources for the v3 deauther

Shell 21 2 Updated Jul 27, 2020

A list of resources for those interested in getting started in bug bounties

11,914 2,041 Updated Jul 23, 2024