Getting started in bug bounty!
☆33Jul 16, 2021Updated 4 years ago
Alternatives and similar repositories for getting-started
Users that are interested in getting-started are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- ☆17Sep 2, 2021Updated 4 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆11May 30, 2021Updated 4 years ago
- ☆20May 18, 2022Updated 3 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- This repository contains a collection of scripts I use regularly for offensive security-related tasks.☆16Mar 9, 2026Updated 2 weeks ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆22Oct 30, 2022Updated 3 years ago
- bug bounty disclosed reports☆123Feb 2, 2025Updated last year
- ☆27Jan 25, 2020Updated 6 years ago
- ☆13Jan 19, 2023Updated 3 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- Profile layout☆15Sep 11, 2025Updated 6 months ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- This is based on ZephyFoxy's .zshrc file. I added lolcat and some other fun stuff you might like. You still get the eth0, tun0. wlan0 an…☆15Apr 23, 2024Updated last year
- Good resources about web security that I have read.☆27Jul 23, 2023Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ☆26Feb 28, 2023Updated 3 years ago
- A Web-UI for subdomain enumeration (subfinder)☆55Jun 5, 2020Updated 5 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- Script to automate bypassing 403 forbidden status code☆24Jun 18, 2025Updated 9 months ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- A list of Mind-Map for those interested in getting started in bug bounties.☆17Jul 9, 2021Updated 4 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆13Oct 26, 2017Updated 8 years ago
- Stuff for bug bounty☆35Feb 1, 2023Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71May 8, 2020Updated 5 years ago
- Welcome to the Sec+ 701 Study Guide repository! This collection provides materials for the CompTIA Security+ (SY0-701) exam, including at…☆17Nov 30, 2024Updated last year
- A small utility and interface for renaming files using the Unicode Right-To-Left Override attack☆10Feb 16, 2016Updated 10 years ago