A list of resources for those interested in getting started in bug bounties
☆13Jun 18, 2020Updated 5 years ago
Alternatives and similar repositories for Resources-for-Beginner-Bug-Bounty-Hunters
Users that are interested in Resources-for-Beginner-Bug-Bounty-Hunters are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆71May 8, 2020Updated 6 years ago
- Automated PoC of CVE-2021-44521☆10Feb 24, 2022Updated 4 years ago
- BugBounty , sort and delete duplicates param value without missing original value☆22Jul 31, 2021Updated 4 years ago
- Auto powerful subdomains scanner - Auto check live subdomains☆18Jul 5, 2020Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau☆12Jun 28, 2021Updated 4 years ago
- Top disclosed reports from HackerOne☆10Jun 9, 2020Updated 5 years ago
- ☆27Jan 25, 2020Updated 6 years ago
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Jun 23, 2020Updated 5 years ago
- 'apk-yara-checker' is a little CLI tool written in Rust to check Yara rules against a folder of APK files.☆16Jul 6, 2024Updated last year
- This repo contains scripts i used while bug bounty.☆16Nov 4, 2020Updated 5 years ago
- All Type of Payloads☆141Mar 26, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆13Aug 11, 2020Updated 5 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- Learn Website Hacking / Penetration Testing From Scratch, published by Packt☆22Jan 30, 2023Updated 3 years ago
- FirePrint is a security tool for finding misconfigured Firebase realtime databases in Android or iOS applications.☆22Apr 4, 2024Updated 2 years ago
- 该脚本为Citrix XenMobile 目录遍历漏洞(CVE-2020-8209)批量检测脚本。☆31Dec 7, 2020Updated 5 years ago
- Breaking fastjson with forward shell☆23Sep 1, 2022Updated 3 years ago
- ☆45Jun 5, 2021Updated 4 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- ☆17May 21, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A Modern Operating System Written in C++ From Scratch!☆14Jan 30, 2022Updated 4 years ago
- clerk-auth☆14Apr 27, 2023Updated 3 years ago
- Firebase database finder.☆13Dec 30, 2020Updated 5 years ago
- ☆76Jun 5, 2021Updated 4 years ago
- small code example of react js☆15Oct 2, 2020Updated 5 years ago
- Contains all my research and content produced regarding the log4shell vulnerability☆31Jan 22, 2022Updated 4 years ago
- ☆88May 27, 2021Updated 4 years ago
- MyBB 1.8.32 - Chained LFI Remote Code Execution (RCE) (Authenticated) python exploit script...☆14Oct 17, 2023Updated 2 years ago
- Install openSUSE on your VPS, no matter what the current OS is☆29May 23, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.☆12Dec 11, 2020Updated 5 years ago
- ☆177Oct 26, 2025Updated 6 months ago
- burpsuite extension for check and extract sensitive request parameter☆116Nov 29, 2020Updated 5 years ago
- My Malware Blog☆21Feb 4, 2024Updated 2 years ago
- ☆21Jul 26, 2022Updated 3 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago