nabasteh / Intro-To-Bug-HuntingLinks
I provide educational resources in this repository for starting bug hunting from scratch. The content will be updated over time! Also, I would be happy if you introduce new resources to be added
☆32Updated 2 years ago
Alternatives and similar repositories for Intro-To-Bug-Hunting
Users that are interested in Intro-To-Bug-Hunting are comparing it to the libraries listed below
Sorting:
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆27Updated 7 months ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated last year
- DNS Explained : This repo aims to explain the basics of DNS at different levels of complexity for readers with various technical backgrou…☆56Updated 2 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆62Updated 2 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Updated 3 years ago
- aws cli pentesting/red team snippets☆32Updated last year
- A collection of one off hacks and simple scripts☆28Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 11 months ago
- ☆25Updated 2 years ago
- Programs I Made while learning python for pentesters.☆18Updated 2 years ago
- Python script implementing the favicon hash trick to find subdomains.☆37Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- ☆29Updated 3 years ago
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆10Updated 2 years ago
- An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full …☆38Updated 10 months ago
- Passive Web Vulnerability Detection Tool☆34Updated 2 months ago
- Config files for my GitHub profile.☆9Updated 3 years ago
- Filter URLs to save your time.☆60Updated 2 years ago
- autoreport generates bug report templates for security researchers☆20Updated last year
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 2 months ago
- ☆16Updated last year
- vhost scanning☆36Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆21Updated 11 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 9 months ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated 2 years ago
- Custom nuclei templates for bug hunting.....☆26Updated last year