EdOverflow / bug-bounty-responsesLinks
A collection of response templates for invalid bug bounty reports.
☆91Updated 7 years ago
Alternatives and similar repositories for bug-bounty-responses
Users that are interested in bug-bounty-responses are comparing it to the libraries listed below
Sorting:
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- AWS Security Checks☆40Updated 7 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆40Updated 7 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- A place to store my own wordlists, and link to others that are useful☆107Updated last year
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 5 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆39Updated 6 years ago
- Push notifications for passive DNS data☆109Updated 9 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- AWS S3 Sensitive Data Search☆36Updated 3 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆105Updated 3 years ago
- Brute force AWS bucket finder☆61Updated 2 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- bountytpl – template generator cli. By using a template similar to the ones for Template Generator (https://github.com/fransr/template-ge…☆47Updated 6 years ago
- Repo of useful scripts☆105Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- ☆128Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- subdomain bruteforce list☆102Updated 11 months ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆135Updated 5 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆158Updated 5 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 5 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ou…☆134Updated 2 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago