Bug-Bounty

Bug Bounty
GitHub Security Bug Bounty
Software security researchers are increasingly engaging with internet companies to hunt down vulnerabilities.
Our bounty program gives a tip of the hat to these researchers and provides rewards of $30,000 or more for critical vulnerabilities.
Awesomes
- A curated list of various bug bounty tools
- A curated list of
Capture The Flag(CTF) frameworks, libraries, resources, softwares and tutorials. This list aims to help starters as well as seasoned CTF players to find everything related to CTFs at one place. - Awesome Bug bounty builder Project - ALL common Tools for find your Vulnerabilities.
Books
- Hacking-Books Here Are Some Popular Hacking PDF
- The Threat Hunter Playbook ~ The Threat Hunter Playbook
Cheatsheets
- A list of interesting payloads, tips and tricks for bug bounty hunters.
Cheacklists
- Tips and Tutorials for Bug Bounty and also Penetration Tests.
Tools
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during my BUG Hunting Rest You can add Your CUSTOM payloads too ;)
- Bug-Bounty-Tools: Random Tools for Bug Bounty
- BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
- hack-pet is collection of command snippets that are useful to hackers/bug bounty hunters.It is similar to the recon_profile, but it uses the pet. pet can manage the command set more progressively.
- Here you can find a list of differents tools that you can use in bug bounty or pentesting.
- This Is A Tool For Bug Hunters in this tool i have included the tools which bug hunters use
- Recon Automation for BugBounties
- Bug Bounty Vps Setup Tools Installer
- Kali Linux containers for bug bounty and CTFs
- Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.
Wordlists
- A repository that includes all the important wordlists used while bug hunting.
- this contain the burp pack
More
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..
- Table of Contents
Last updated










