EdOverflow / bounty-formulaLinks
A formula to calculate bounty amounts.
☆15Updated 8 years ago
Alternatives and similar repositories for bounty-formula
Users that are interested in bounty-formula are comparing it to the libraries listed below
Sorting:
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Updated 6 years ago
- ☆54Updated last year
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Updated 7 years ago
- Scan all possible TLD's for a given domain name☆83Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- Learn the basics of cryptography throughout history.☆21Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆53Updated 4 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- AWS Security Checks☆40Updated 8 years ago
- bountytpl – template generator cli. By using a template similar to the ones for Template Generator (https://github.com/fransr/template-ge…☆48Updated 6 years ago
- ☆29Updated 6 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Updated 8 years ago
- Web application pentesting recon☆23Updated 5 years ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Updated last year
- Journey to Try Harder !!!☆31Updated 6 years ago
- Vulnerable Task Manager☆21Updated last year
- A static website template for security pages.☆54Updated 6 months ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- ☆27Updated 5 years ago
- ☆16Updated 4 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆64Updated 8 years ago
- Parse source code directories and output list of URLs that are then sent through a proxy.☆157Updated 3 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Brute force AWS bucket finder☆62Updated 3 years ago
- Some random scripts. Just trying to be like the cool kids.☆101Updated 7 years ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago