Mind-Maps of Several Things
☆2,631Jun 29, 2023Updated 2 years ago
Alternatives and similar repositories for Mind-Maps
Users that are interested in Mind-Maps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All about bug bounty (bypasses, payloads, and etc)☆6,672Sep 8, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,049Jun 25, 2025Updated 8 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,581Aug 6, 2023Updated 2 years ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,084Jul 29, 2024Updated last year
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,694Jun 20, 2022Updated 3 years ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,275Feb 10, 2024Updated 2 years ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,985Sep 5, 2021Updated 4 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,399Sep 14, 2023Updated 2 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,488Mar 14, 2026Updated last week
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,254Mar 13, 2026Updated last week
- Rockyou for web fuzzing☆3,094Mar 11, 2026Updated last week
- ☆535Jul 16, 2021Updated 4 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,352Mar 13, 2026Updated last week
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,767Oct 7, 2025Updated 5 months ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,658Nov 23, 2025Updated 4 months ago
- A cheat sheet that contains advanced queries for SQL Injection of all types.☆3,159May 13, 2023Updated 2 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,113Aug 14, 2024Updated last year
- A repository that includes all the important wordlists used while bug hunting.☆1,386Mar 11, 2023Updated 3 years ago
- ☆1,116Jul 26, 2023Updated 2 years ago
- ☆755Jun 26, 2024Updated last year
- Ressources for bug bounty hunting☆1,910Dec 1, 2022Updated 3 years ago
- Real-world infosec wordlists, updated regularly☆1,725Updated this week
- A curated list of various bug bounty tools☆5,845Feb 9, 2026Updated last month
- Top disclosed reports from HackerOne☆5,426Feb 28, 2026Updated 3 weeks ago
- OSWE, OSEP, OSED, OSEE☆3,786Jan 2, 2026Updated 2 months ago
- ☆241Jun 10, 2021Updated 4 years ago
- Bug Bounty Roadmaps☆1,717Jun 12, 2021Updated 4 years ago
- ☆865Dec 26, 2025Updated 2 months ago
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated last year
- ☆1,225Mar 7, 2026Updated 2 weeks ago
- This script grab public report from hacker one and make some folders with poc videos☆909Oct 10, 2025Updated 5 months ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,773Mar 23, 2022Updated 4 years ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,771Mar 14, 2026Updated last week
- Awesome Bug bounty builder Project☆675Feb 15, 2023Updated 3 years ago
- Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal, GhostArchive & Intelligence X!☆2,568Mar 8, 2026Updated 2 weeks ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,503Jan 8, 2026Updated 2 months ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,823Jun 9, 2024Updated last year
- A collection of snippets of codes and commands to make your life easier!☆2,893Sep 25, 2023Updated 2 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,670Updated this week