Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature
☆25Apr 19, 2017Updated 8 years ago
Alternatives and similar repositories for bug-bounty-reference
Users that are interested in bug-bounty-reference are comparing it to the libraries listed below
Sorting:
- This api maked for "https://koinim.com/". This company haven't an api. But if you want use koinim api, use this script. It works splinter…☆10Nov 23, 2014Updated 11 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Purple Team Workshop by @jorgeorchilles☆12Apr 26, 2025Updated 10 months ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆11Mar 1, 2022Updated 4 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Oct 11, 2017Updated 8 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- Python dilinde basit ornek uygulamalar yazacagiz.☆35Nov 15, 2023Updated 2 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- A collection of common web programming security mistakes.☆16Jun 11, 2019Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Sep 1, 2018Updated 7 years ago
- ☆41May 16, 2018Updated 7 years ago
- ZipArchive 2.1.4 dir traversal 0-Day☆17Aug 30, 2018Updated 7 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- ☆23Feb 13, 2026Updated 2 weeks ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- Smart DNS Brute Forcer☆22Jul 16, 2012Updated 13 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- Z2A-BlackLotus Challenge stage 2 bootkit-rootkit analysis☆16May 29, 2023Updated 2 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Jul 17, 2018Updated 7 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Apr 17, 2015Updated 10 years ago
- A repository with various tutorials on how to do things in Pentesting, setup environments and other things☆20Apr 26, 2025Updated 10 months ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- ☆46Apr 6, 2017Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- ☆44Aug 9, 2017Updated 8 years ago
- 802.15.4 Fuzzer☆21Mar 25, 2019Updated 6 years ago
- A toy implementation of 'Stack Guard' on top of the LLVM compiler toolchain☆24Jul 1, 2017Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago