nahamsec / Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
☆10,572Updated last month
Related projects: ⓘ
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆4,640Updated last year
- Collection of methodology and test case for various web vulnerabilities.☆6,048Updated last month
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆5,775Updated last year
- All about bug bounty (bypasses, payloads, and etc)☆5,745Updated last year
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆4,548Updated 8 months ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆4,169Updated last month
- articles☆12,823Updated last year
- Open source education content for the researcher community☆2,610Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆3,705Updated last month
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆4,851Updated last year
- A curated list of various bug bounty tools☆4,043Updated this week
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆8,776Updated this week
- A collection of hacking tools, resources and references to practice ethical hacking.☆13,194Updated 11 months ago
- The Bug Hunters Methodology☆3,875Updated last year
- A collection of custom security tools for quick needs.☆3,117Updated last year
- This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug …☆18,301Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,255Updated last year
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,427Updated 2 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆3,812Updated 3 weeks ago
- A list of web application security☆5,734Updated 3 weeks ago
- List of Awesome Red Teaming Resources☆6,820Updated 8 months ago
- The all-in-one browser extension for offensive security professionals 🛠☆5,736Updated last month
- Bug Bounty Roadmaps☆1,638Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆5,442Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆8,959Updated 2 weeks ago
- Top 100 Hacking & Security E-Books (Free Download)☆5,344Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆60,004Updated this week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆4,850Updated last month
- A collection of awesome penetration testing resources, tools and other shiny things☆21,402Updated last month
- Top disclosed reports from HackerOne☆3,720Updated 2 weeks ago