dhaval17 / awsome-security-write-ups-and-POCsView external linksLinks
Awesome Writeups and POCs
☆557Feb 11, 2025Updated last year
Alternatives and similar repositories for awsome-security-write-ups-and-POCs
Users that are interested in awsome-security-write-ups-and-POCs are comparing it to the libraries listed below
Sorting:
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,059Jul 31, 2024Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,532Aug 6, 2023Updated 2 years ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,756Mar 23, 2022Updated 3 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,376Sep 14, 2023Updated 2 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,360Jan 24, 2021Updated 5 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,484Oct 12, 2024Updated last year
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,404Jan 15, 2024Updated 2 years ago
- Ghazi is a BurpSuite Plugins For Testing various PayLoads Like "XSS,SQLi,SSTI,SSRF,RCE and LFI" through Different tabs , Where Each Tab W…☆107Feb 11, 2019Updated 7 years ago
- A curated list of amazingly awesome Burp Extensions☆3,360Feb 15, 2025Updated last year
- List of Awesome Asset Discovery Resources☆2,320Jan 22, 2025Updated last year
- Just some public notes that can be useful and i want let the world knows.☆88Oct 18, 2020Updated 5 years ago
- A collection of custom security tools for quick needs.☆3,286May 1, 2023Updated 2 years ago
- Hunting Bugs for Fun and Profit☆272Jul 29, 2020Updated 5 years ago
- BBT - Bug Bounty Tools (examples💡)☆1,881Apr 5, 2024Updated last year
- Hacking Facebook for fun and profit: It’s not that hard, apparently (exclusive)☆62Jul 2, 2019Updated 6 years ago
- Collection of methodology and test case for various web vulnerabilities.☆6,999Jun 25, 2025Updated 7 months ago
- Ressources for bug bounty hunting☆1,900Dec 1, 2022Updated 3 years ago
- A curated list of amazingly bug bounty tips from security researchers around the world.☆104Mar 14, 2019Updated 6 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- List of Awesome Red Teaming Resources☆7,757Dec 28, 2023Updated 2 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,074Jul 29, 2024Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆5,144Feb 8, 2024Updated 2 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,639Updated this week
- Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed b…☆1,028Feb 5, 2021Updated 5 years ago
- A big list of Android Hackerone disclosed reports and other resources.☆1,665Sep 10, 2025Updated 5 months ago
- Toolkit to detect and keep track on Blind XSS, XXE & SSRF☆293Aug 23, 2019Updated 6 years ago
- A python script that finds endpoints in JavaScript files☆4,280Apr 13, 2024Updated last year
- Fuzzing Payloads to Assist in Web Application Testing.☆166Jun 6, 2019Updated 6 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,897Sep 27, 2021Updated 4 years ago
- Mind-Maps of Several Things☆2,623Jun 29, 2023Updated 2 years ago
- Top disclosed reports from HackerOne☆5,297Jan 31, 2026Updated 2 weeks ago
- Tools & Interesting Things for RedTeam Ops☆2,250Updated this week
- Web App bug hunting☆577Nov 26, 2025Updated 2 months ago
- Tools and datas related to Bug Bounty.☆236Apr 20, 2022Updated 3 years ago
- The Bug Hunters Methodology☆4,239Aug 1, 2023Updated 2 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,969Sep 5, 2021Updated 4 years ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,550Feb 8, 2025Updated last year
- Collection of Bug Bounty Tips☆65Dec 10, 2019Updated 6 years ago
- Azure and AWS Attacks☆1,112Nov 25, 2022Updated 3 years ago