mrvcoder / Bug-Hunting-methodologiesLinks
this repo contains some public methodologies which I found from internet (google,telegram,discord,writeups etc..)
☆27Updated last year
Alternatives and similar repositories for Bug-Hunting-methodologies
Users that are interested in Bug-Hunting-methodologies are comparing it to the libraries listed below
Sorting:
- All About XSS☆14Updated 2 years ago
- My Notes on Regular Expressions for AWAE/OSWE.☆32Updated last year
- ☆74Updated 10 months ago
- ☆106Updated 2 years ago
- ☆136Updated 5 months ago
- My Notes & Resources Of Bug Bounty Checklists☆72Updated 7 months ago
- Ultimate Wordlist for Web Content Discovery☆68Updated 3 months ago
- A passive way to find backups/ sensitive information.☆86Updated last month
- ☆41Updated last year
- Private Nuclei Templates☆100Updated 5 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆61Updated 5 months ago
- A collection of slides and presentations from BSides Ahmedabad 2024, held on October 12th and 13th. This repository features key insights…☆37Updated 9 months ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆34Updated last year
- Bug bounty domain manager with validation, exports & Redis storage ✨☆23Updated 2 months ago
- My Powershell notes☆15Updated 2 years ago
- My custom created nuclei for SQLi, bugbounty, pentesting☆26Updated 3 months ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆43Updated 2 years ago
- This repo contains different variants of Bug Bounty & Security & Pentest & Tech related Articles☆47Updated 7 months ago
- Tools and methods that I personally use for Recon and Exploitations☆44Updated 3 months ago
- ☆115Updated 4 months ago
- Source Code Review resources for Bug Bounty Hunters & Developers. This Repo is updated consistently.☆71Updated 3 years ago
- Automate Recon XSS Bug Bounty☆168Updated last month
- Dorks for Bug Bounty Hunting☆179Updated last year
- ☆44Updated 7 months ago
- ☆138Updated 3 years ago
- ☆127Updated 4 years ago
- ♥☆137Updated 10 months ago
- A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods…☆87Updated 9 months ago
- ☆24Updated last year
- This PoC showcases how an attacker can exploit a CSRF vulnerability to upload a file to a victim's account without their knowledge. The a…☆10Updated last year