A list of interesting payloads, tips and tricks for bug bounty hunters.
☆13Oct 26, 2017Updated 8 years ago
Alternatives and similar repositories for bugbounty-cheatsheet
Users that are interested in bugbounty-cheatsheet are comparing it to the libraries listed below
Sorting:
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆12Dec 26, 2021Updated 4 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Jun 23, 2020Updated 5 years ago
- Wrapper for blocksec2go allowing easy hardware-based signing of Ethereum transactions☆12Feb 8, 2023Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- Getting started in bug bounty!☆33Jul 16, 2021Updated 4 years ago
- ☆29May 14, 2019Updated 6 years ago
- Reclaim control of your Burp Suite Repeater tabs with this powerful extension☆68Aug 15, 2021Updated 4 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆74May 23, 2021Updated 4 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆41Apr 10, 2023Updated 2 years ago
- Starter Projects for the Docker Course☆11Dec 25, 2025Updated 2 months ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated last month
- My blog☆10Oct 6, 2025Updated 4 months ago
- ☆10May 6, 2017Updated 8 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Converts binary files of 1C (1CD, cf, epf, efd, etc.) to grepable CSV☆12Feb 12, 2024Updated 2 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Hardhat made easy with a flexible CLI to help run test, deploy and more.☆10Apr 10, 2024Updated last year
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- Training and certifications related to secure software development☆11Feb 9, 2026Updated 3 weeks ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 4 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Limits asset outflows from contracts within customisable timeframes☆11May 7, 2022Updated 3 years ago
- Solidity smart contract for atomic swaps.☆10Oct 31, 2022Updated 3 years ago