Skip to content
View topscoder's full-sized avatar
💭
01100011 01101111 01100100 01101001 01101110 01100111
💭
01100011 01101111 01100100 01101001 01101110 01100111
  • Stuttgart
  • 12:03 (UTC +01:00)

Block or report topscoder

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
topscoder/README.md

Hi there 👋

Developing in whatever language fits the most. Not speaking all of them though. Most of the time Python, PHP, Golang, Node.js (TypeScript), C++. Here you will find some applications and tools I built. Mostly for bug bounty hunting ...

Pinned Loading

  1. nuclei-wordfence-cve nuclei-wordfence-cve Public

    60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒

    Python 1.1k 147

  2. subgomain subgomain Public

    A high-performance tool for identifying domain takeovers with support for custom fingerprints and resolver lists.

    Go 7

  3. fourohme fourohme Public

    FourOhMe is a tool for testing HTTP headers on a website in order to try to bypass 40* HTTP codes. Written in Go, so easy to install and fast out of the box.

    Go 23 4

  4. oldhost oldhost Public

    oldhost is a tool for bug bounty hunters to discover old hosts that are no longer available, but might still be present on different known and related servers.

    Go 5 2

  5. domainer domainer Public

    Domainer is a Go script that allows you to extract the root domains from a list of domains based on the ARPANET RFC's for (top-level) domains (TLDs). It removes the scheme (if present) from the inp…

    Go 1

  6. aisubs aisubs Public

    Leverage the power of AI to find hard to find subdomains.

    Go 2