Skip to content
View Akilax0's full-sized avatar
👹
Working ...
👹
Working ...
  • University of Maryland
  • Maryland, United States of America
  • 09:27 (UTC -04:00)

Organizations

@cepdnaclk

Block or report Akilax0

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

book list

C++ 300 75 Updated Mar 4, 2019

🔈 The React for Voice and Chat: Build Apps for Alexa, Messenger, Instagram, the Web, and more

TypeScript 1,671 303 Updated Apr 24, 2025

Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature

4,159 1,031 Updated Jul 31, 2024

🐛 A list of writeups from the Google VRP Bug Bounty program

Python 1,468 249 Updated Mar 26, 2026

C++ Implementations of Various Machine Learning Algorithms using the MNIST Handwriting Data Set

C++ 72 18 Updated May 10, 2020
Assembly 138 55 Updated Sep 27, 2021

Bug Bounty Roadmaps

1,715 296 Updated Jun 12, 2021

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…

PHP 70,047 24,947 Updated Apr 6, 2026

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 76,666 16,829 Updated Mar 16, 2026

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

Python 5,611 1,138 Updated Aug 6, 2023

A collection of various awesome lists for hackers, pentesters and security researchers

109,772 10,123 Updated Jan 18, 2025

A collection of awesome videos, articles, books and resources about ARM exploitation.

361 44 Updated Jan 4, 2024

The Bug Hunters Methodology

4,270 824 Updated Aug 1, 2023

Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…

Python 5,276 955 Updated Mar 13, 2026

Open source education content for the researcher community

2,761 561 Updated Apr 13, 2022

The class resources for the v3 deauther

Shell 21 2 Updated Jul 27, 2020

A list of resources for those interested in getting started in bug bounties

11,942 2,039 Updated Jul 23, 2024