Skip to content

Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More

Notifications You must be signed in to change notification settings

AnLoMinus/Bug-Bounty

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 
 
 

Repository files navigation

בס״ד

⫷ HacKingPro ⫸
⫷ TryHackMe | KoTH ⫸
⫷ Privilege-Escalation⫸
⫷ ScanPro | Linfo | Diablo ⫸
⫷ Offensive-Security | PenTest ⫸
⫷ Goals | Studies | HacKing | AnyTeam ⫸


Bug Bounty


Wordlists


  • A list of interesting payloads, tips and tricks for bug bounty hunters.

  • A comprehensive curated list of Bug Bounty Programs and write-ups from the Bug Bounty hunters.

  • A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.

  • A curated list of Capture The Flag (CTF) frameworks, libraries, resources, softwares and tutorials. This list aims to help starters as well as seasoned CTF players to find everything related to CTFs at one place.

  • Awesome Bug bounty builder Project - ALL common Tools for find your Vulnerabilities.

    image

  • The Threat Hunter Playbook ~ The Threat Hunter Playbook

  • image

    The Threat Hunter Playbook is a community-driven, open source project to share detection logic, adversary tradecraft and resources to make detection development more efficient. All the detection documents in this project follow the structure of MITRE ATT&CK categorizing post-compromise adversary behavior in tactical groups and are available in the form of interactive notebooks. The use of notebooks not only allow us to share text, queries and expected output, but also code to help others run detection logic against pre-recorded security datasets locally or remotely through BinderHub cloud computing environments.

  • related to web application security assessments and more specifically towards bug hunting in bug bounties.

  • Bug-Bounty-Tools: Random Tools for Bug Bounty

  • Tips and Tutorials for Bug Bounty and also Penetration Tests.

  • Tutorials and Things to Do while Hunting Vulnerability.

  • A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference

  • All about bug bounty (bypasses, payloads, and etc)

  • A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.

  • BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

    • image
  • hack-pet is collection of command snippets that are useful to hackers/bug bounty hunters.

    It is similar to the recon_profile, but it uses the pet. pet can manage the command set more progressively.

    image
    image

  • Tips and Tutorials for Bug Bounty and also Penetration Tests.

  • Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wish to influence Onelinetips and explain the commands, for the better understanding of new hunters..



Books


Bug-Bounty : Cheatsheets

Releases

No releases published

Packages

No packages published