harsh-bothra / SecurityStoriesLinks
☆81Updated 2 years ago
Alternatives and similar repositories for SecurityStories
Users that are interested in SecurityStories are comparing it to the libraries listed below
Sorting:
- A Django web application for curating Bug Bounty educational Videos☆98Updated 2 years ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆76Updated 3 years ago
- Collection's of Tech Talk that are presented by me :)☆101Updated 11 months ago
- Advanced Reconnaissance and Web Application Discovery☆88Updated 4 years ago
- ☆95Updated 4 years ago
- Scripts and other stuff.☆132Updated 2 years ago
- ☆33Updated 3 years ago
- Learning and hunting SQL injection bugs for 50 continuous days☆76Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 11 months ago
- Summary of almost all paid bounty reports on H1☆46Updated 5 years ago
- Write-ups of my findings.☆122Updated 2 years ago
- My small collection of reports templates (This is a fork of orignal repo from https://github.com/gwen001/BB-datas)☆127Updated 2 years ago
- Hi everyone,☆61Updated 2 years ago
- ☆101Updated 2 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆80Updated 2 years ago
- Check List☆80Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆44Updated 3 years ago
- Weaponize Your Burp is a repository for automation your Bug Bounty Hunting mindset in Burp Suite☆77Updated 2 years ago
- Tips For Bug Bounty Hunters☆86Updated 3 years ago
- Private Nuclei Templates☆100Updated 10 months ago
- A curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆73Updated 2 years ago
- I collected it to help the bug hunter get a reward☆57Updated 3 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆40Updated 2 years ago
- ☆149Updated 3 years ago
- Describe how to use ffuf different options with examples☆89Updated 3 years ago
- Fast Bug Bounty Script☆40Updated 11 months ago
- A list of edge cases that occur in bug bounty programs, conversations on how they should be handled. The goal is to standardise the way t…☆234Updated 3 years ago
- Guide to SSRF☆73Updated 2 years ago
- Here Are Some Bug Bounty Resource From Twitter☆103Updated 6 months ago
- ☆111Updated 2 years ago