A curated list of various bug bounty tools
Updated 2025-11-30 09:14:01 -05:00
👾 a decade of resources for security researchers: pentesting, CTF, wargames, cryptography, forensics, reverse engineering, IoCs, botnets, cloud hacking, linux hacking, steganography, vulnerabilities, etc.
botnets
cryptography
ctf
forensics
gray-hacker-resources
hacking
infosec
iocs
linux
malwares
network
penetration-testing
pentesting
post-exploitation
reverse-engineering
rubber-ducky
steganography
vulnerabilities
wargame
web-security
Updated 2025-11-23 14:07:21 -05:00