EdOverflow / legal-bug-bountyLinks
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
☆73Updated 6 years ago
Alternatives and similar repositories for legal-bug-bounty
Users that are interested in legal-bug-bounty are comparing it to the libraries listed below
Sorting:
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- AWS Security Checks☆40Updated 7 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- Detect exposed API keys on GitHub commits.☆35Updated 3 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Updated 7 years ago
- Brute force AWS bucket finder☆61Updated 3 years ago
- Learn the basics of cryptography throughout history.☆21Updated 4 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- Some random scripts. Just trying to be like the cool kids.☆101Updated 7 years ago
- Scan all possible TLD's for a given domain name☆83Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆65Updated 2 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- A tool for searching a Git repository for interesting content☆106Updated last year
- A static website template for security pages.☆53Updated 4 months ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆165Updated 6 years ago
- A formula to calculate bounty amounts.☆15Updated 8 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆59Updated 6 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 3 years ago
- Repo of useful scripts☆105Updated 5 years ago
- A repo which contains lots of things which it shouldn't☆43Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- A tool to fetch and verify the existence of endpoints from the Wayback Machine API.☆53Updated 4 months ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Updated 6 years ago
- A search engine for content shared publicly via cloud storage services☆102Updated last year
- A list of universities with vulnerability disclosure policies☆51Updated 4 years ago
- A place to store my own wordlists, and link to others that are useful☆108Updated 2 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Updated 2 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago