pdelteil / trusty-bbp
Legitimate bug bounty programs value ethical practices and provide clear rewards to researchers for identifying security flaws
☆28Updated last month
Related projects ⓘ
Alternatives and complementary repositories for trusty-bbp
- Repo containing walkthroughs to possibly pwn Admin Panels and Exposed Consoles☆17Updated last month
- This Tool To Test Machine Keys In View State☆55Updated last month
- ☆51Updated last month
- ☆93Updated last year
- get all nuclei temp from emad shanab repo in one run☆33Updated last year
- Stay on the beat with SubHound - receive notifications for new subdomains on Telegram and Discord! 🐶🎵☆17Updated last year
- ☆8Updated last year
- my nuclei templates☆39Updated 6 months ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆16Updated last year
- A simple bash script to gather js files from waybackurls and check for any exposures using nuclei engine.☆0Updated 8 months ago
- DepFine Is a tool to find the unregistered dependency based on dependency confusion valunerablility and lead to RCE☆26Updated 2 years ago
- This Burp extension extracts various data (path, parameter keys, parameter values, subdomains, etc.) from the sitemap. This data is used …☆29Updated 3 years ago
- PoC for leaking text nodes via CSS injection☆15Updated 3 months ago
- Useful configurations for the DomLogger++ extension☆30Updated 2 months ago
- ☆118Updated 2 years ago
- My custom created nuclei for SQLi, bugbounty, pentesting☆20Updated last month
- A powerful bash script for massive XSS scanning leveraging Brute Logic's KNOXSS API☆58Updated last month
- This tool checks if the given Url/File has Swagger Ui, That can be tested later..☆31Updated last year
- Gather results of dorks across a number of search engines☆77Updated 4 months ago
- Collection of scripts that I use while bug hunting☆48Updated last year
- Simple tool to gather domains from crt.sh using the organization name☆97Updated 2 years ago
- ☆30Updated 2 years ago
- ☆17Updated 10 months ago
- A Series of Tweets☆12Updated 9 months ago
- ♥☆53Updated last month
- Mind map for certifcation, vulnerability finding and recon for bug bounty and professional works.☆21Updated 7 months ago
- Self-hosted bug bounty programs that are "scammy" or unethical☆95Updated 3 weeks ago
- ☆49Updated 7 months ago
- My Notes & Resources Of Bug Bounty Checklists☆53Updated last year
- ☆17Updated 5 months ago