dhaval17 / awsome-security-write-ups-and-POCsLinks
Awesome Writeups and POCs
☆546Updated 6 months ago
Alternatives and similar repositories for awsome-security-write-ups-and-POCs
Users that are interested in awsome-security-write-ups-and-POCs are comparing it to the libraries listed below
Sorting:
- A collection of templates for bug bounty reporting☆414Updated 4 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,276Updated 4 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆466Updated 2 years ago
- A curated list of vulnerable web applications.☆311Updated last year
- ☆529Updated 4 years ago
- Web App bug hunting☆570Updated 5 months ago
- ☆433Updated 2 years ago
- 🎯 Open Redirect Payload List☆609Updated last year
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆455Updated 2 years ago
- RepoToStoreBugBountyInfo☆338Updated 5 years ago
- ☆1,009Updated 3 years ago
- BugBounty_CheatSheet☆256Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆111Updated 8 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆734Updated 2 years ago
- Combination of all my Resources, Links & Scripts☆279Updated 6 years ago
- Repository for hosting my research papers☆512Updated last year
- BugBountyTips☆413Updated 3 weeks ago
- Tools and datas related to Bug Bounty.☆235Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆449Updated 5 years ago
- Penetration Testing notes, resources and scripts☆667Updated last year
- this html file creates a csrf poc form to any http request.☆280Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆320Updated last year
- This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place☆259Updated 3 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆542Updated 3 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆149Updated 7 years ago
- ☆598Updated last year
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆745Updated 3 years ago
- A Bash script and Docker image for Bug Bounty reconnaissance. Intended for headless use.☆911Updated 4 months ago
- XSS payloads designed to turn alert(1) into P1☆1,374Updated last year
- A script to set up a quick Ubuntu 17.10 x64 box with tools I use.☆1,214Updated last year