Ressources for bug bounty hunting
☆1,911Dec 1, 2022Updated 3 years ago
Alternatives and similar repositories for Bug-bounty
Users that are interested in Bug-bounty are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All about bug bounty (bypasses, payloads, and etc)☆6,679Sep 8, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,057Jun 25, 2025Updated 9 months ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,413Sep 14, 2023Updated 2 years ago
- A curated list of various bug bounty tools☆5,853Feb 9, 2026Updated last month
- Tips and Tutorials for Bug Bounty and also Penetration Tests.☆1,776Oct 7, 2025Updated 5 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,581Aug 6, 2023Updated 2 years ago
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,254Mar 13, 2026Updated 2 weeks ago
- A list of resources for those interested in getting started in bug bounties☆11,906Jul 23, 2024Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆3,088Jul 29, 2024Updated last year
- Bug Bounty Roadmaps☆1,717Jun 12, 2021Updated 4 years ago
- A repository that includes all the important wordlists used while bug hunting.☆1,386Mar 11, 2023Updated 3 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆4,080Jul 31, 2024Updated last year
- Top disclosed reports from HackerOne☆5,426Feb 28, 2026Updated 3 weeks ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆1,911Dec 8, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Mind-Maps of Several Things☆2,632Jun 29, 2023Updated 2 years ago
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,675Updated this week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,113Aug 14, 2024Updated last year
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆5,510Mar 7, 2026Updated 2 weeks ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,371Mar 20, 2026Updated last week
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,985Sep 5, 2021Updated 4 years ago
- ☆1,227Mar 7, 2026Updated 2 weeks ago
- BBT - Bug Bounty Tools (examples💡)☆1,887Apr 5, 2024Updated last year
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,275Feb 10, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- These are my checklists which I use during my hunting.☆857Nov 30, 2023Updated 2 years ago
- The Bug Hunters Methodology☆4,265Aug 1, 2023Updated 2 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,494Mar 14, 2026Updated last week
- 1337 Wordlists for Bug Bounty Hunting☆937Mar 21, 2026Updated last week
- Rockyou for web fuzzing☆3,094Mar 11, 2026Updated 2 weeks ago
- 403/401 Bypass Methods + Bash Automation + Your Support ;)☆1,581Jun 6, 2022Updated 3 years ago
- ☆865Dec 26, 2025Updated 3 months ago
- A python tool used to discover endpoints, potential parameters, a target specific wordlist for a given target and secrets☆1,533Mar 8, 2026Updated 2 weeks ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,823Jun 9, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- GF Paterns For (ssrf,RCE,Lfi,sqli,ssti,idor,url redirection,debug_logic, interesting Subs) parameters grep☆1,412Sep 13, 2024Updated last year
- This repository is about @harshbothra_'s 365 days of Learning Tweets & Mindmaps collection.☆1,694Jun 20, 2022Updated 3 years ago
- ☆1,116Jul 26, 2023Updated 2 years ago
- ☆755Jun 26, 2024Updated last year
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,777Mar 23, 2022Updated 4 years ago
- Awesome Bug bounty builder Project☆675Feb 15, 2023Updated 3 years ago
- This script grab public report from hacker one and make some folders with poc videos☆909Oct 10, 2025Updated 5 months ago