EdOverflow / bounty-formulaLinks
A formula to calculate bounty amounts.
☆15Updated 8 years ago
Alternatives and similar repositories for bounty-formula
Users that are interested in bounty-formula are comparing it to the libraries listed below
Sorting:
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Updated 6 years ago
- Learn the basics of cryptography throughout history.☆21Updated 4 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- AWS Security Checks☆40Updated 7 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Updated 7 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- This repo is for the Ruby version of EyeWitness☆28Updated 11 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆40Updated 2 years ago
- Scan all possible TLD's for a given domain name☆83Updated 4 years ago
- Journey to Try Harder !!!☆31Updated 6 years ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆42Updated last year
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Brute force AWS bucket finder☆61Updated 3 years ago
- ☆54Updated 10 months ago
- recon-ng modules for Censys☆37Updated 2 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Updated 6 years ago
- A tool to fetch and verify the existence of endpoints from the Wayback Machine API.☆53Updated 4 months ago
- Detect exposed API keys on GitHub commits.☆35Updated 3 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- ☆29Updated 6 years ago
- ☆38Updated 6 years ago
- A static website template for security pages.☆53Updated 4 months ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Repo of useful scripts☆105Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆51Updated 4 years ago
- A very vulnerable implementation of a GraphQL API.☆61Updated 4 years ago
- An Entropy-Based Link Vulnerability Tool☆60Updated 7 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago