InsiderPhD / BugBountyKnowledgeBase
Obsidian Vault for bug bounty hunters
☆86Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for BugBountyKnowledgeBase
- ☆76Updated 5 years ago
- ☆77Updated 5 years ago
- ☆100Updated last year
- Scripts and other stuff.☆132Updated 11 months ago
- This repository contains some of the most exhaustive wordlists for enumeration, gathered from a lot of wordlists available on the Interne…☆94Updated 3 weeks ago
- ☆135Updated 3 years ago
- Sample Obsidian's vault for web pentesting☆90Updated 3 months ago
- ☆101Updated last year
- Repository to house markdown templates for researchers☆193Updated 2 weeks ago
- Web Application Penetration Testing☆92Updated 3 months ago
- A Django web application for curating Bug Bounty educational Videos☆95Updated last year
- Collection's of Tech Talk that are presented by me :)☆95Updated last month
- ☆172Updated 3 months ago
- Recon MindMap (RMM)☆139Updated 5 months ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆94Updated 2 years ago
- ☆147Updated 3 months ago
- OSCP preparation tools, scripts and cheatsheets☆55Updated last year
- ☆70Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆227Updated 2 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆99Updated 2 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆54Updated 2 years ago
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆86Updated 2 years ago
- A OWASP Based Checklist With 80+ Test Cases☆132Updated 2 years ago
- This repository contains cheatsheets and payloads compiled from completing the labs at PortSwigger Academy.☆71Updated 4 months ago
- Repository with some necessary information for you to create your PenTest consultancy☆92Updated 2 years ago
- ☆21Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆24Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- A LateX template for penetration testing reports☆107Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆40Updated 4 years ago