EdOverflow / legal-bug-bountyView external linksLinks
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
☆73Dec 4, 2019Updated 6 years ago
Alternatives and similar repositories for legal-bug-bounty
Users that are interested in legal-bug-bounty are comparing it to the libraries listed below
Sorting:
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- A collection of response templates for invalid bug bounty reports.☆90Feb 26, 2018Updated 7 years ago
- An OSINT tool to find contacts in order to report security vulnerabilities.☆268Jan 27, 2020Updated 6 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- Multi Thread POST|GET (BLIND/TIME BASED/HEADER/SQL/XSS/LFI) INJECTION SCANNER☆12Jun 22, 2013Updated 12 years ago
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Learn the basics of cryptography throughout history.☆21Jan 30, 2021Updated 5 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆41Aug 2, 2018Updated 7 years ago
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 4 years ago
- this repo contains all nuclei templates for particular vulnerability that i used mosty while hunting..☆10Aug 15, 2024Updated last year
- Information gathering tool.☆10Apr 24, 2021Updated 4 years ago
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- A static website template for security pages.☆54Jul 19, 2025Updated 6 months ago
- WpDisect is a wordpress hacking tool that finds vulnerabilities in wordpress.☆14Feb 20, 2022Updated 3 years ago
- ☆13Sep 8, 2024Updated last year
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆16Oct 20, 2024Updated last year
- All in one tool for lazy hackers.☆10Apr 24, 2021Updated 4 years ago
- ☆11Oct 6, 2022Updated 3 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- GSA open source policy guidance repository with official policy found at☆14Oct 2, 2018Updated 7 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Aug 31, 2017Updated 8 years ago
- A repository full of malware samples.☆13Nov 29, 2020Updated 5 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Pdfencrypt is a tool to encrypt/lock PDFs☆14Oct 23, 2021Updated 4 years ago
- Tool for Reconnaissance on a web camera.☆18Apr 5, 2022Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- Leetcode and other coding challenges solved in Python, C++ and Go.☆12Sep 15, 2023Updated 2 years ago
- Crackme collections☆13May 24, 2020Updated 5 years ago
- Description-FAQ of the process☆11Jul 16, 2023Updated 2 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆472Nov 10, 2022Updated 3 years ago
- A tool for detecting sensitive data in code repositories☆17Dec 15, 2025Updated last month
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- ☆15Feb 22, 2021Updated 4 years ago
- A set of vulnerable machines rendered by Packer and Ansible scripts.☆13Feb 15, 2021Updated 4 years ago
- All-in-One WP Migration-Backup-Finder☆15Nov 5, 2025Updated 3 months ago