Skip to content
View blindhacker99's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report blindhacker99

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

SupplyShield is an open-source application security orchestration framework designed to secure your software supply chain from vulnerabilities.

Python 2 1 Updated Nov 14, 2024

OWASP Kubernetes security and compliance tool [WIP]

Python 103 16 Updated Jun 6, 2023

🔥 Web-application firewalls (WAFs) from security standpoint.

Python 6,324 1,062 Updated Oct 28, 2024

RCE 0-day for GhostScript 9.50 - Payload generator

Python 540 109 Updated Sep 8, 2021

A collection of smart contract vulnerabilities along with prevention methods

1,969 266 Updated Oct 30, 2024

An advanced real time threat intelligence framework to identify threats and malicious web traffic on the basis of IP reputation and historical data.

Python 236 34 Updated Dec 8, 2022

Android Security Suite for in-depth reconnaissance and static bytecode analysis based on Ghera benchmarks.

JavaScript 538 129 Updated Jan 6, 2023

A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.

4,663 918 Updated Jan 15, 2024

Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature

3,755 988 Updated Jul 31, 2024

30 days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge may take more than100 days, follow your own pace. These videos ma…

Python 42,691 8,145 Updated Oct 9, 2024

Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.

5,096 1,049 Updated Aug 14, 2024

Collection of methodology and test case for various web vulnerabilities.

6,129 1,745 Updated Aug 4, 2024