dhaval17 / awsome-security-write-ups-and-POCsLinks
Awesome Writeups and POCs
☆543Updated 5 months ago
Alternatives and similar repositories for awsome-security-write-ups-and-POCs
Users that are interested in awsome-security-write-ups-and-POCs are comparing it to the libraries listed below
Sorting:
- A collection of templates for bug bounty reporting☆412Updated 3 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,275Updated 4 years ago
- ☆528Updated 4 years ago
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆540Updated 3 years ago
- ☆1,007Updated 3 years ago
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆465Updated 2 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆454Updated 2 years ago
- Combination of all my Resources, Links & Scripts☆276Updated 5 years ago
- Web App bug hunting☆571Updated 4 months ago
- A curated list of vulnerable web applications.☆309Updated last year
- 🎯 Open Redirect Payload List☆604Updated last year
- RepoToStoreBugBountyInfo☆332Updated 5 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆732Updated last year
- ☆431Updated 2 years ago
- BugBountyTips☆414Updated last week
- BugBounty_CheatSheet☆254Updated 2 years ago
- this html file creates a csrf poc form to any http request.☆280Updated 2 years ago
- Penetration Testing notes, resources and scripts☆665Updated last year
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆110Updated 8 years ago
- Repository for hosting my research papers☆512Updated last year
- OSWE Preparation☆633Updated 3 years ago
- Tools and datas related to Bug Bounty.☆235Updated 3 years ago
- XSS payloads designed to turn alert(1) into P1☆1,374Updated last year
- Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome☆381Updated 3 years ago
- ☆374Updated 3 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆447Updated 5 years ago
- ☆366Updated 3 years ago
- The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)☆451Updated 2 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆318Updated last year
- ☆210Updated 4 years ago