EdOverflow / legal-bug-bounty
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
☆70Updated 5 years ago
Alternatives and similar repositories for legal-bug-bounty:
Users that are interested in legal-bug-bounty are comparing it to the libraries listed below
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- A static website template for security pages.☆50Updated 7 months ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- Some random scripts. Just trying to be like the cool kids.☆91Updated 6 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆72Updated 6 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago
- bountytpl – template generator cli. By using a template similar to the ones for Template Generator (https://github.com/fransr/template-ge…☆45Updated 5 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆38Updated 6 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆84Updated 2 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- ☆28Updated 8 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated last year
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- Repo of useful scripts☆104Updated 4 years ago
- ☆18Updated 4 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated last year
- AWS Security Checks☆37Updated 7 years ago
- Tools to gather subdomains from Bug Bounty programs☆64Updated 6 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆155Updated 5 years ago
- CLI tools using Harpoon features☆21Updated last year
- Scripts and tools for AWS Pentest☆53Updated 4 years ago