1. Contact.shAn OSINT tool to find contacts in order to report security vulnerabilities.
2. Can I Take Over Xyz"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
3. Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
4. CspGiven a list of hosts, this small utility fetches all whitelisted domains from the hosts' CSPs.
6. Legal Bug Bounty#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
7. BugbountyguideBug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
9. MegplusAutomated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]
11. h1-cliA CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.