EdOverflow / legal-bug-bounty
#legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.
☆70Updated 5 years ago
Alternatives and similar repositories for legal-bug-bounty
Users that are interested in legal-bug-bounty are comparing it to the libraries listed below
Sorting:
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆39Updated 6 years ago
- A static website template for security pages.☆51Updated 8 months ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- A collection of response templates for invalid bug bounty reports.☆91Updated 7 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- AWS Security Checks☆39Updated 7 years ago
- A place to store my own wordlists, and link to others that are useful☆108Updated last year
- A tool to evaluate Content Security Policies.☆71Updated 4 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 5 years ago
- Amazon bucket brute force tool☆101Updated 11 years ago
- All-in-one AWS S3 bucket tool for pentesters.☆73Updated 6 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- ☆28Updated 6 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆67Updated 3 years ago
- Learn the basics of cryptography throughout history.☆19Updated 4 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- ☆29Updated 8 years ago
- Tools to gather subdomains from Bug Bounty programs☆64Updated 7 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago