ReconDock By Kdairatchi
Go To ReconDock
MyRepo
MyRepo
  • Pastebin Services
  • Awesome Ai Talk
  • Bug Bounty Testing, Techniques, and Tools
  • Cybersources
  • Targets
  • Bug checklist
  • Bug Bounty Platforms
  • Awesome Bug Bounty Tips Awesome
    • CVE Exploits and PoC Collection
  • ============ Awesome Bugs
    • Awesome One-liner Bug Bounty
  • Awesome CS Courses
  • Awesome Cyber Co
  • Awesome Dev
  • Awesome Free Certs
  • Awesome Git
  • Awesome Github
  • Awesome Go
  • Awesome Interviews
  • Awesome Keys
  • Awesome Mac OpenSource
  • Awesome Mac
  • Awesome Python
    • Awesome Tool
  • Awesome-Selfhosted
    • Awesome Hacker Search Engines
  • Awesome Shell
  • Awesome Shodan Search Queries
  • Awesome Static Website Services Awesome
  • Awesome Vulnerable Applications
  • Awesome WAF
  • Awesome First PR Opportunities
  • Awesome-Bugbounty-Writeups
  • Awesome-web3-Security awesome
  • Bug-Bounty
  • CTF Tools
  • Awesome Blockchain Bug Bounty
  • Awesome Bug Bounty
  • awesome-design-systems
  • Awesome Google VRP Writeups
  • Web Scraping
  • awesome
  • bug-bounty-reference
  • the-book-of-secret-knowledge
  • APACHE
  • AWS
  • AZURE
  • CISCO
  • CLOUDFLARE
  • Cross Origin Resource Sharing (CORS)
  • CRLF Injection || HTTP Response Splitting
  • CSV Injection
  • Content Injection
  • CRLF Injection || HTTP Response Splitting
  • JENKINS
  • JIRA
  • LFI
  • OR
  • PostgreSQL Environment Variable Manipulation Vulnerability
  • RCE
  • Recon
  • SSRF
  • Proof OF Concept (POC): SharePoint Vulnerability Detection
  • Template Injection
  • WORDPRESS
  • XSLT Injection
  • XSS
  • XXE
  • Books
  • Firebase Subdomain Enumeration & PoC Testing
  • SQLI
  • Special Tools
  • Account Takeover
  • Authentication
  • Broken Link Hijacking
  • Business Logic Errors
  • Default Credentials
  • Email Spoofing
  • ExposedAPIkeys
  • ForgotPasswordFunctionality
  • JWT Vulnerabilities
  • OWASPTestingChecklist1
  • Tabnabbing
  • Web Cache Poisoning
  • Wordpress Endpoints to look
  • lfi_vulnerble_targets
  • (LFI)passwrd
  • LostSec
  • POCS
    • CVES
      • CVE-2021-36873
      • BreadcrumbsSQL_Injection_cve_2024
      • CVE-2024-0195
      • CVE-2024-29269 Exploit
  • 403-ByPass
  • Chat-bot_xss_payloads
  • burp
    • Match & Replace
    • Zap
  • cloudflare-waf-bypass
  • infosec
    • Customize the bash shell environments
    • automation
    • Website Ideas
  • 2FA bypass
  • Account Takeover
  • OWASP Web Application Security Testing Checklist
  • Projects
  • OWASP Top Ten
  • links
  • Bug Bounty Builder ¯\(ツ)/¯
  • Awesome
    • AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
  • Cheatsheets
  • Checklists
    • Here’s a clear, step by step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy to follow commands, explanations, and examples where applicable.
  • Dorks
  • Scripts
  • Loads
  • OWASP
    • Checklist
  • ai
    • Ai Best for Information and Coding
  • Medium Recent Writeups
  • 🌟 Useful Extensions for Bug Bounty Hunting 🌟
  • Customize the bash shell environments
  • Fabric
    • Test Application Platform Configuration
  • Docker
  • Git auto
  • Bug Bounty Beginner's Roadmap
  • Methodology 2025
    • Advanced Recon Methodology
Powered by GitBook
On this page
  • ⚜️ Aภl๏miuภuຮ ⚜️
  • Bug Bounty
  • GitHub Bounty
  • Awesomes
  • Books
  • Cheatsheets
  • Cheacklists
  • Tools
  • Wordlists
  • More
  • ^ Back to TOP ^

Bug-Bounty

PreviousAwesome-web3-Security awesomeNextCTF Tools

Last updated 4 months ago

בס״ד

⫷ ⫸ ⫷ | ⫸ ⫷ ⫸ ⫷ | | ⫸ ⫷ | ⫸ ⫷ | | | ⫸

image

Bug Bounty


GitHub Security Bug Bounty

Software security researchers are increasingly engaging with internet companies to hunt down vulnerabilities.

Our bounty program gives a tip of the hat to these researchers and provides rewards of $30,000 or more for critical vulnerabilities.

Awesomes

  • A curated list of various bug bounty tools

    https://github.com/vavkamil/awesome-bugbounty-tools

  • A comprehensive curated list of Bug Bounty Programs and write-ups from the Bug Bounty hunters.

  • A curated list of Capture The Flag (CTF) frameworks, libraries, resources, softwares and tutorials. This list aims to help starters as well as seasoned CTF players to find everything related to CTFs at one place.

  • Awesome Bug bounty builder Project - ALL common Tools for find your Vulnerabilities.


Books

  • The Threat Hunter Playbook is a community-driven, open source project to share detection logic, adversary tradecraft and resources to make detection development more efficient. All the detection documents in this project follow the structure of MITRE ATT&CK categorizing post-compromise adversary behavior in tactical groups and are available in the form of interactive notebooks. The use of notebooks not only allow us to share text, queries and expected output, but also code to help others run detection logic against pre-recorded security datasets locally or remotely through BinderHub cloud computing environments.


Cheatsheets

  • A list of interesting payloads, tips and tricks for bug bounty hunters.

  • A list of interesting payloads, tips and tricks for bug bounty hunters.


Cheacklists

  • Tips and Tutorials for Bug Bounty and also Penetration Tests.


Tools

Here are some of the tools that we use when we perform Live Recon Passive ONLY on Twitch:

  1. Recon-ng https://github.com/lanmaster53/recon-ng

  2. httpx https://github.com/projectdiscovery/httpx

  3. isup.sh https://github.com/gitnepal/isup

  4. Arjun https://github.com/s0md3v/Arjun

  5. jSQL https://github.com/ron190/jsql-injection

  6. Smuggler https://github.com/defparam/smuggler

  7. Sn1per https://github.com/1N3/Sn1per

  8. Spiderfoot https://github.com/smicallef/spiderfoot

  9. Nuclei https://github.com/projectdiscovery/nuclei

  10. Jaeles https://github.com/jaeles-project/jaeles

  11. ChopChop https://github.com/michelin/ChopChop

  12. Inception https://github.com/proabiral/inception

  13. Eyewitness https://github.com/FortyNorthSecurity/EyeWitness

  14. Meg https://github.com/tomnomnom/meg

  15. Gau - Get All Urls https://github.com/lc/gau

  16. Snallygaster https://github.com/hannob/snallygaster

  17. NMAP https://github.com/nmap/nmap

  18. Waybackurls https://github.com/tomnomnom/waybackurls

  19. Gotty https://github.com/yudai/gotty

  20. GF https://github.com/tomnomnom/gf

  21. GF Patterns https://github.com/1ndianl33t/Gf-Patterns

  22. Paramspider https://github.com/devanshbatham/ParamSpider

  23. XSSER https://github.com/epsylon/xsser

  24. UPDOG https://github.com/sc0tfree/updog

  25. JSScanner https://github.com/dark-warlord14/JSScanner

  26. Takeover https://github.com/m4ll0k/takeover

  27. Keyhacks https://github.com/streaak/keyhacks

  28. S3 Bucket AIO Pwn https://github.com/blackhatethicalhacking/s3-buckets-aio-pwn

  29. BHEH Sub Pwner Recon https://github.com/blackhatethicalhacking/bheh-sub-pwner

  30. GitLeaks https://github.com/zricethezav/gitleaks

  31. Domain-2IP-Converter https://github.com/blackhatethicalhacking/Domain2IP-Converter

  32. Dalfox https://github.com/hahwul/dalfox

  33. Log4j Scanner https://github.com/Black-Hat-Ethical-Hacking/log4j-scan

  34. Osmedeus https://github.com/j3ssie/osmedeus

  35. getJS https://github.com/003random/getJS

  • A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during my BUG Hunting Rest You can add Your CUSTOM payloads too ;)

    • NOTE: BugDog is made with python and requires python2 to run perfectly.

  • BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

  • hack-pet is collection of command snippets that are useful to hackers/bug bounty hunters.

    It is similar to the recon_profile, but it uses the pet. pet can manage the command set more progressively.

  • A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.

  • Here you can find a list of differents tools that you can use in bug bounty or pentesting.

    Some categories and tools will be added as we go.

    If you have questions or suggestions, don't hesitate to contact me on twitter (https://twitter.com/sehno)

  • This Is A Tool For Bug Hunters in this tool i have included the tools which bug hunters use

  • Recon Automation for BugBounties

  • Bug Bounty Vps Setup Tools Installer

    With these tools you can install most of the bug bounty tools with just one command and The tool has been modified and spelled many tools ## special thanks @supr4s Because most of these tools modify his tools

  • Kali Linux containers for bug bounty and CTFs

  • Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.

    You will be notified when your task(command line) is finished with results. This bot make long time tasks by you, taking off the need of your attention if it's finished.

  • Subdomains recon

  • Manual recon

  • Enumeration / Crawling

  • XSS

  • SQL Injection


Wordlists

  • A repository that includes all the important wordlists used while bug hunting.

  • this contain the burp pack

  • FuzzDB was created to increase the likelihood of finding application security vulnerabilities through dynamic application security testing. It's the first and most comprehensive open dictionary of fault injection patterns, predictable resource locations, and regex for matching server responses.

  • A set of tools for making life easier with wordlists


More

  • related to web application security assessments and more specifically towards bug hunting in bug bounties.

  • Tips and Tutorials for Bug Bounty and also Penetration Tests.

  • Tutorials and Things to Do while Hunting Vulnerability.

  • A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

  • All about bug bounty (bypasses, payloads, and etc)

  • A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

  • Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..

  • ###A list of resources for those interested in getting started in bug bounties

    Table of Contents


Here Are Some Popular Hacking PDF

~ The Threat Hunter Playbook

: Random Tools for Bug Bounty

:

:

:

GitHub Bounty
Awesome Bug Bounty Tools
Awesome Bug Bounty
Awesome CTF
Awesome Bug Bounty Builder
Hacking-Books
The Threat Hunter Playbook
Bug Bounty Cheat Sheet
Bug Bounty Cheat Sheet
Galaxy-Bugbounty-Checklist
Bug Bounty Methodology & Tools
BugDog
Bug-Bounty-Tools
BigBountyRecon
Hack-Pet
CTF-tool
Bug bounty toolkit
BugHuntingToolKit
Parrots Recon
OK-VPS
kali-repos
Bot-Bounty
amass
subfinder
assetfinder
dnsgen
shuffledns
httprobe
aquatone
shodan
censys
google dorks
pastebin
github
nmap
ffuf
hakrawler
gau
paramspider
arjun
parameth
xsshunter
xsscrapy
dalfox
sqlmap
waybacksqliscanner
Bug-Bounty-Wordlists
a-full-list-of-wordlists
FuzzDB
wordlist-tools
The Bug Hunter's Methodology (TBHM)
Galaxy-Bugbounty-Checklist
HowToHunt
Awesome-Bugbounty-Writeups
AllAboutBugBounty
HolyTips
KingOfBugBountyTips
Resources-for-Beginner-Bug-Bounty-Hunters
Basics
Setup
Tools
Labs & Testing Environments
Talks
Vulnerability Types
Mobile Hacking
Smart Contracts
Coding & Scripting
Hardware & IoT
Blog posts & Talks
Media Resources
Certifications
Mindset & Mental Health
Awesomes
Books
Cheatsheets
Checklists
Tools
Wordlists
More
^ Back to TOP ^
⚜️ Aภl๏miuภuຮ ⚜️
HacKingPro
TryHackMe
KoTH
Privilege-Escalation
ScanPro
Linfo
Diablo
Offensive-Security
PenTest
Goals
Studies
HacKing
AnyTeam
image
image
image