riddhi-shree / knowledge-sharingLinks
Hands-on content for Humla/Puliya sessions at null community
☆92Updated 4 years ago
Alternatives and similar repositories for knowledge-sharing
Users that are interested in knowledge-sharing are comparing it to the libraries listed below
Sorting:
- ☆130Updated 5 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆250Updated 5 years ago
- All Things Bug Bounty☆115Updated 3 years ago
- ☆143Updated 5 years ago
- A XSS mind map ;)☆88Updated 9 years ago
- A Collection of Android Pentest Learning Materials☆408Updated 5 years ago
- Print out URL schemas from an Android app☆128Updated 11 months ago
- API Pentesting notes.☆96Updated last year
- Bucky (An automatic S3 bucket discovery tool)☆198Updated 4 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆81Updated 9 months ago
- GraphQL security workshop labs☆118Updated this week
- Awesome XSS Payloads☆84Updated 9 years ago
- The tools I have programmed to help me with bugbounty's☆118Updated 6 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆163Updated 3 years ago
- ☆214Updated 4 years ago
- ☆172Updated 4 years ago
- This repo includes my analysis of some public reports.☆55Updated 5 years ago
- An Intentionally designed Vulnerable Android Application built in Kotlin.☆253Updated 3 years ago
- 🐙 Cross-document messaging security research tool powered by https://enso.security☆301Updated 2 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆218Updated 5 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆288Updated 2 years ago
- List HackerOne private program assets☆154Updated 4 years ago
- You can read the writeup on this script here☆192Updated 4 years ago
- Detectify Crowdsource Challenge☆72Updated 3 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆74Updated 5 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆94Updated 4 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆171Updated 5 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- Data from my Sunday streams☆75Updated 6 years ago
- A tool to automate the boring process of APK recon☆346Updated 3 years ago