Skip to content
View securi3ytalent's full-sized avatar

Block or report securi3ytalent

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Check if a phone number exists on Whatsapp

JavaScript 112 23 Updated Jul 4, 2021
TypeScript 2 Updated Apr 13, 2024

Functional enhancement based on nuclei. 基于 nuclei 的功能增强。

Java 361 36 Updated May 22, 2025

Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!

Go 966 118 Updated Jan 12, 2024

Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…

Python 1 Updated Oct 31, 2023

A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and control.

Python 40 8 Updated Nov 12, 2023

crt.sh

Shell 2 Updated Aug 6, 2023

bug bounty tools list

4 Updated Apr 7, 2023

A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

Python 5,390 1,102 Updated Aug 6, 2023

A powerful and open-source toolkit for hackers and security automation - 安全行业从业者自研开源扫描器合辑

8,678 2,411 Updated Oct 9, 2025

Ultimate Package Of 50 Bug Bounty Hunting Tools

Python 46 10 Updated Oct 3, 2025

A list of public penetration test reports published by several consulting firms and academic security groups.

HTML 9,197 2,094 Updated Oct 1, 2025
Python 31 10 Updated Apr 6, 2021

Track web page scrolling with JS. No dependencies. Callbacks based

HTML 3 1 Updated Sep 21, 2017

Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…

Go 4,762 875 Updated Jan 23, 2025

A list of useful payloads and bypass for Web Application Security and Pentest/CTF

Python 71,413 16,180 Updated Nov 2, 2025