This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Learn from real-world examples of vulnerabilities. Improve their skills in identifying and reporting bugs. Understand common vulnerability types and their impact.
☆13Mar 4, 2026Updated 2 weeks ago
Alternatives and similar repositories for Report-Templates
Users that are interested in Report-Templates are comparing it to the libraries listed below
Sorting:
- Bash scripts to automate the burpsuite's certificate configuration and proxying of an Android device for penetration test.☆19May 26, 2025Updated 9 months ago
- PYMI team CTF write-up☆10Mar 26, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- A comprehensive tutorial for running OpenGL apps on containers☆18Mar 15, 2021Updated 5 years ago
- chatGPT prompts and programs generated by chatGPT (OpenAI)☆11Jan 22, 2026Updated last month
- GraphSpecter is a tool to audit GraphQL API☆21Oct 6, 2025Updated 5 months ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- Find CVEs that don't have a Detectify modules.☆22Mar 28, 2023Updated 2 years ago
- My Powershell notes☆15Sep 27, 2022Updated 3 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- code obfuscation via control flow flattening☆13Jan 5, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/fuzzdb☆13Mar 23, 2015Updated 10 years ago
- ☆16Aug 25, 2025Updated 6 months ago
- Script to automate bypassing 403 forbidden status code☆24Jun 18, 2025Updated 9 months ago
- This tools used for Automating finding of subdomain, and checking for alive subdomain, and gathering js files from all the subdomain and …☆22Jun 28, 2024Updated last year
- ☆25Nov 16, 2023Updated 2 years ago
- this is an guide for people aspiring to enter the world of cybersecurity☆34Apr 17, 2024Updated last year
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- ☆23Aug 9, 2025Updated 7 months ago
- A prisma generator that turns your Postgres Database into a realtime Database and make it easy to subscribe to changes from Prisma Client…☆14Nov 16, 2024Updated last year
- ☆17Oct 15, 2024Updated last year
- automating the zig release process☆11Nov 19, 2025Updated 4 months ago
- Bash Script to Hunt all the targets/Subdomains from Chaos by Project Discovery Team☆36Sep 26, 2020Updated 5 years ago
- Cover Photo jQuery plugin like Facebook☆20Nov 15, 2012Updated 13 years ago
- 🚩 A cheatsheet of useful tools and shell scripts that come in handy in capture the flag contests.☆47Feb 2, 2018Updated 8 years ago
- ☆33Oct 28, 2023Updated 2 years ago
- Round switch ToggleColumn for Yii2 GridView☆10Oct 3, 2018Updated 7 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆32May 8, 2020Updated 5 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- NGINX Api Gateway☆11Apr 13, 2020Updated 5 years ago
- https://codeberg.org/ccxvii/djvudec☆14Aug 13, 2025Updated 7 months ago
- Sending file through ICMP packet using PING☆22Jul 18, 2024Updated last year
- Data Science project involving all Pokémon data: from data gathering (web scraping) to machine learning techniques, including data cleani…☆37Feb 21, 2025Updated last year
- Yii2 extension. Save filters from GridView to session, keep filter state between pages.☆13Jan 14, 2020Updated 6 years ago
- Comprehensive Toolkit for Boosting and Fostering Cybersecurity Compliance☆52Nov 26, 2024Updated last year
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year