abhiabhi2306 / prototype-pollutionLinks
Prototype Pollution - A detailed study + hands on lab.
☆15Updated 3 years ago
Alternatives and similar repositories for prototype-pollution
Users that are interested in prototype-pollution are comparing it to the libraries listed below
Sorting:
- ☆146Updated 4 years ago
- ☆46Updated last year
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 3 years ago
- ☆99Updated 2 years ago
- My small collection of reports templates☆87Updated 6 years ago
- ☆75Updated last year
- Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws☆44Updated last year
- ☆157Updated 2 years ago
- ☆51Updated 4 years ago
- Burp extension to create target specific and tailored wordlist from burp history.☆254Updated 4 years ago
- EvenBetter is a frontend Caido plugin that makes the Caido experience even better 😎☆160Updated 2 months ago
- ☆178Updated 4 months ago
- ☆149Updated 3 years ago
- This is a python wrapper around the amazing KNOXSS API by Brute Logic☆277Updated last month
- Automation of tokens/api keys testing.☆146Updated 2 years ago
- Unofficial documentation for the great tool Param Miner☆185Updated 3 years ago
- ☆129Updated 4 years ago
- Golang tool which helps dropping the irrelevant entries from your ffuf result file.☆141Updated last year
- Automated tool for domains & subdomains gathering☆191Updated 2 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆165Updated 3 years ago
- Collection of scripts that I use while bug hunting☆48Updated 2 years ago
- Self-hosted bug bounty programs that are "scammy" or unethical☆164Updated 3 weeks ago
- My small collection of reports templates (This is a fork of orignal repo from https://github.com/gwen001/BB-datas)☆127Updated 2 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆77Updated 4 years ago
- ☆101Updated 2 years ago
- Private Nuclei Templates☆100Updated 10 months ago
- ☆87Updated 4 years ago
- All About Dependency Confusion Attack, (Detecting, Finding, Mitigating)☆302Updated last year
- Path Traversal Vulnerability Payload List☆79Updated 2 years ago
- ☆55Updated 5 years ago