בס״ד
â«· HacKingPro
⫸
â«· TryHackMe
| KoTH
⫸
â«· Privilege-Escalation
⫸
â«· ScanPro
| Linfo
| Diablo
⫸
â«· Offensive-Security
| PenTest
⫸
â«· Goals
| Studies
| HacKing
| AnyTeam
⫸
-
-
A comprehensive curated list of Bug Bounty Programs and write-ups from the Bug Bounty hunters.
-
A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.
-
-
-
The Threat Hunter Playbook ~ The Threat Hunter Playbook
-
The Threat Hunter Playbook is a community-driven, open source project to share detection logic, adversary tradecraft and resources to make detection development more efficient. All the detection documents in this project follow the structure of MITRE ATT&CK categorizing post-compromise adversary behavior in tactical groups and are available in the form of interactive notebooks. The use of notebooks not only allow us to share text, queries and expected output, but also code to help others run detection logic against pre-recorded security datasets locally or remotely through BinderHub cloud computing environments.
-
related to web application security assessments and more specifically towards bug hunting in bug bounties.
-
Bug-Bounty-Tools: Random Tools for Bug Bounty
-
Tips and Tutorials for Bug Bounty and also Penetration Tests.
-
Tutorials and Things to Do while Hunting Vulnerability.
-
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
-
All about bug bounty (bypasses, payloads, and etc)
-
-
-
-
-
-
###A list of resources for those interested in getting started in bug bounties
-
Hacking-Books Here Are Some Popular Hacking PDF
-
A list of interesting payloads, tips and tricks for bug bounty hunters.