EdOverflow / legal-bug-bountyLinks
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
☆72Updated 5 years ago
Alternatives and similar repositories for legal-bug-bounty
Users that are interested in legal-bug-bounty are comparing it to the libraries listed below
Sorting:
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆40Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆65Updated 2 years ago
- Detect exposed API keys on GitHub commits.☆35Updated 3 years ago
- Some random scripts. Just trying to be like the cool kids.☆99Updated 7 years ago
- Scans packages in npm and pypi for secrets☆31Updated 6 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 6 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- Amazon S3 bucket spelunking!☆88Updated 8 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Updated 5 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆106Updated 3 weeks ago
- A tool for searching a Git repository for interesting content☆106Updated last year
- Amazon bucket brute force tool☆102Updated 12 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆165Updated 6 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- A static website template for security pages.☆52Updated 4 months ago
- A place to store my own wordlists, and link to others that are useful☆107Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- Scan all possible TLD's for a given domain name☆84Updated 4 years ago
- Tools to gather subdomains from Bug Bounty programs☆65Updated 7 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆92Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- An Entropy-Based Link Vulnerability Tool☆60Updated 7 years ago
- ☆28Updated 6 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago