EdOverflow / legal-bug-bountyLinks
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
☆70Updated 5 years ago
Alternatives and similar repositories for legal-bug-bounty
Users that are interested in legal-bug-bounty are comparing it to the libraries listed below
Sorting:
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Scans packages in npm and pypi for secrets☆31Updated 5 years ago
- AWS Security Checks☆39Updated 7 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- A static website template for security pages.☆52Updated 10 months ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- JIRA Secure Attachment Looter☆70Updated 4 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆74Updated 6 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 5 years ago
- A collection of response templates for invalid bug bounty reports.☆91Updated 7 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Updated 2 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆39Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Some random scripts. Just trying to be like the cool kids.☆93Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆92Updated last year
- ☆18Updated 5 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- An Entropy-Based Link Vulnerability Tool☆60Updated 7 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- ☆29Updated 8 years ago
- Tools to gather subdomains from Bug Bounty programs☆64Updated 7 years ago
- Brute force AWS bucket finder☆61Updated 2 years ago