Bug-Bounty
Last updated
Last updated
בס״ד
⫷ HacKingPro
⫸
⫷ TryHackMe
| KoTH
⫸
⫷ Privilege-Escalation
⫸
⫷ ScanPro
| Linfo
| Diablo
⫸
⫷ Offensive-Security
| PenTest
⫸
⫷ Goals
| Studies
| HacKing
| AnyTeam
⫸
GitHub Security Bug Bounty
Software security researchers are increasingly engaging with internet companies to hunt down vulnerabilities.
Our bounty program gives a tip of the hat to these researchers and provides rewards of $30,000 or more for critical vulnerabilities.
A curated list of various bug bounty toolshttps://github.com/vavkamil/awesome-bugbounty-tools
A comprehensive curated list of Bug Bounty Programs and write-ups from the Bug Bounty hunters.
A curated list ofCapture The Flag
(CTF
) frameworks, libraries, resources, softwares and tutorials. This list aims to help starters as well as seasoned CTF players to find everything related to CTFs at one place.
Awesome Bug bounty builder Project - ALL common Tools for find your Vulnerabilities.
The Threat Hunter Playbook is a community-driven, open source project to share detection logic, adversary tradecraft and resources to make detection development more efficient. All the detection documents in this project follow the structure of MITRE ATT&CK categorizing post-compromise adversary behavior in tactical groups and are available in the form of interactive notebooks. The use of notebooks not only allow us to share text, queries and expected output, but also code to help others run detection logic against pre-recorded security datasets locally or remotely through BinderHub cloud computing environments.
A list of interesting payloads, tips and tricks for bug bounty hunters.
A list of interesting payloads, tips and tricks for bug bounty hunters.
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Here are some of the tools that we use when we perform Live Recon Passive ONLY on Twitch:
Recon-ng https://github.com/lanmaster53/recon-ng
httpx https://github.com/projectdiscovery/httpx
isup.sh https://github.com/gitnepal/isup
Arjun https://github.com/s0md3v/Arjun
jSQL https://github.com/ron190/jsql-injection
Smuggler https://github.com/defparam/smuggler
Sn1per https://github.com/1N3/Sn1per
Spiderfoot https://github.com/smicallef/spiderfoot
Nuclei https://github.com/projectdiscovery/nuclei
Jaeles https://github.com/jaeles-project/jaeles
ChopChop https://github.com/michelin/ChopChop
Inception https://github.com/proabiral/inception
Eyewitness https://github.com/FortyNorthSecurity/EyeWitness
Meg https://github.com/tomnomnom/meg
Gau - Get All Urls https://github.com/lc/gau
Snallygaster https://github.com/hannob/snallygaster
NMAP https://github.com/nmap/nmap
Waybackurls https://github.com/tomnomnom/waybackurls
Gotty https://github.com/yudai/gotty
GF https://github.com/tomnomnom/gf
GF Patterns https://github.com/1ndianl33t/Gf-Patterns
Paramspider https://github.com/devanshbatham/ParamSpider
XSSER https://github.com/epsylon/xsser
UPDOG https://github.com/sc0tfree/updog
JSScanner https://github.com/dark-warlord14/JSScanner
Takeover https://github.com/m4ll0k/takeover
Keyhacks https://github.com/streaak/keyhacks
S3 Bucket AIO Pwn https://github.com/blackhatethicalhacking/s3-buckets-aio-pwn
BHEH Sub Pwner Recon https://github.com/blackhatethicalhacking/bheh-sub-pwner
GitLeaks https://github.com/zricethezav/gitleaks
Domain-2IP-Converter https://github.com/blackhatethicalhacking/Domain2IP-Converter
Dalfox https://github.com/hahwul/dalfox
Log4j Scanner https://github.com/Black-Hat-Ethical-Hacking/log4j-scan
Osmedeus https://github.com/j3ssie/osmedeus
getJS https://github.com/003random/getJS
A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during my BUG Hunting Rest You can add Your CUSTOM payloads too ;)
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
hack-pet is collection of command snippets that are useful to hackers/bug bounty hunters.
It is similar to the recon_profile, but it uses the pet. pet can manage the command set more progressively.
A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.
Here you can find a list of differents tools that you can use in bug bounty or pentesting.Some categories and tools will be added as we go.
If you have questions or suggestions, don't hesitate to contact me on twitter (https://twitter.com/sehno)
This Is A Tool For Bug Hunters in this tool i have included the tools which bug hunters use
Recon Automation for BugBounties
Bug Bounty Vps Setup Tools InstallerWith these tools you can install most of the bug bounty tools with just one command and The tool has been modified and spelled many tools ## special thanks @supr4s Because most of these tools modify his tools
Kali Linux containers for bug bounty and CTFs
Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.You will be notified when your task(command line) is finished with results. This bot make long time tasks by you, taking off the need of your attention if it's finished.
A repository that includes all the important wordlists used while bug hunting.
this contain the burp pack
FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses.
A set of tools for making life easier with wordlists
related to web application security assessments and more specifically towards bug hunting in bug bounties.
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Tutorials and Things to Do while Hunting Vulnerability.
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
All about bug bounty (bypasses, payloads, and etc)
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
###A list of resources for those interested in getting started in bug bounties
Table of Contents