riddhi-shree / knowledge-sharingLinks
Hands-on content for Humla/Puliya sessions at null community
☆92Updated 4 years ago
Alternatives and similar repositories for knowledge-sharing
Users that are interested in knowledge-sharing are comparing it to the libraries listed below
Sorting:
- ☆129Updated 5 years ago
- All Things Bug Bounty☆116Updated 3 years ago
- Burp Extension written in Jython to hunt for common vulnerabilities found in websites. Developed by Gaurav Narwani to help people find vu…☆247Updated 5 years ago
- Print out URL schemas from an Android app☆123Updated 10 months ago
- ☆212Updated 4 years ago
- A Collection of Android Pentest Learning Materials☆408Updated 5 years ago
- This are some Dorks and Platform to find the Bug Bounty Programs.☆79Updated 8 months ago
- This repo includes my analysis of some public reports.☆55Updated 5 years ago
- Python library and CLI for the Bug Bounty Recon API☆230Updated 4 years ago
- API Pentesting notes.☆96Updated last year
- Bucky (An automatic S3 bucket discovery tool)☆198Updated 3 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- The tools I have programmed to help me with bugbounty's☆118Updated 6 years ago
- An open source tool to aid in command line driven generation of bug bounty reports based on user provided templates.☆218Updated 5 years ago
- List HackerOne private program assets☆154Updated 4 years ago
- Some Tutorials and Things to Do while Hunting That Vulnerability.☆74Updated 5 years ago
- Awesome XSS Payloads☆84Updated 9 years ago
- ☆143Updated 5 years ago
- ☆172Updated 4 years ago
- Random Tools for Bug Bounty☆149Updated 3 years ago
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆163Updated 3 years ago
- Random utilities from my security projects that might be useful to others☆182Updated 11 months ago
- My personal bug bounty toolkit.☆164Updated last year
- A XSS mind map ;)☆87Updated 9 years ago
- A list of useful payloads and Bypass for Web Application Security and Bug Bounty/CTF☆171Updated 5 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆324Updated last year
- GraphQL security workshop labs☆116Updated 3 weeks ago
- ASN reconnaissance script☆130Updated last year
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆112Updated 8 years ago
- Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures t…☆213Updated 5 years ago