dhaval17 / awsome-security-write-ups-and-POCsLinks
Awesome Writeups and POCs
☆556Updated 11 months ago
Alternatives and similar repositories for awsome-security-write-ups-and-POCs
Users that are interested in awsome-security-write-ups-and-POCs are comparing it to the libraries listed below
Sorting:
- A curated list of vulnerable web applications.☆330Updated 2 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,356Updated 4 years ago
- A collection of templates for bug bounty reporting☆435Updated last month
- ☆533Updated 4 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆543Updated 3 years ago
- ☆1,011Updated 3 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆471Updated 3 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆468Updated 3 years ago
- Web App bug hunting☆577Updated last month
- RepoToStoreBugBountyInfo☆362Updated 5 years ago
- BugBounty_CheatSheet☆259Updated 2 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆451Updated 5 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆746Updated 2 years ago
- ☆435Updated 3 years ago
- Combination of all my Resources, Links & Scripts☆285Updated 6 years ago
- Penetration Testing notes, resources and scripts☆673Updated last month
- BugBountyTips☆414Updated 5 months ago
- The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)☆464Updated 2 years ago
- Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome☆388Updated 2 weeks ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆112Updated 8 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆750Updated 3 years ago
- ☆623Updated last year
- Tools and datas related to Bug Bounty.☆236Updated 3 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆155Updated 7 years ago
- Repository for hosting my research papers☆510Updated last year
- this html file creates a csrf poc form to any http request.☆281Updated 3 years ago
- An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.☆441Updated 3 years ago
- OSWE Preparation☆654Updated 3 years ago
- This script grab public report from hacker one and make some folders with poc videos☆903Updated 3 months ago