All Projects → Neelakandan-A → BugBounty_CheatSheet

Neelakandan-A / BugBounty_CheatSheet

Licence: GPL-3.0 license
BugBounty_CheatSheet

Projects that are alternatives of or similar to BugBounty CheatSheet

Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (-69.91%)
Mutual labels:  bugbountytips, bugbounty-tool, bugbountytricks
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+323.01%)
Mutual labels:  bugbounty-tool, bugbountytricks
cf-check
CloudFlare Checker written in Go
Stars: ✭ 147 (+30.09%)
Mutual labels:  bugbountytips, bugbounty-tool
DeadDNS
DNS hijacking via dead records automation tool
Stars: ✭ 44 (-61.06%)
Mutual labels:  bugbountytips, bugbounty-tool
HolyTips
A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.
Stars: ✭ 1,210 (+970.8%)
Mutual labels:  bugbountytips, bugbounty-writeups
Awesome Bugbounty Writeups
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference
Stars: ✭ 2,429 (+2049.56%)
Mutual labels:  bugbountytips, bugbounty-writeups
WDIR
Good resources about web security that I have read.
Stars: ✭ 14 (-87.61%)
Mutual labels:  bugbountytips, bugbounty-writeups
nerdbug
Full Nuclei automation script with logic explanation.
Stars: ✭ 153 (+35.4%)
Mutual labels:  bugbountytips
HostPanic
Find host header injections and perform Host Header attacks with other kind of bugs like web cache poissoning
Stars: ✭ 23 (-79.65%)
Mutual labels:  bugbounty-tool
hack-pet
🐰 Managing command snippets for hackers/bug bounty hunters. with pet.
Stars: ✭ 77 (-31.86%)
Mutual labels:  bugbountytips
Sn1per
Attack Surface Management Platform | Sn1perSecurity LLC
Stars: ✭ 4,897 (+4233.63%)
Mutual labels:  bugbounty-tool
Priest
Extract server and IP address information from Browser SSRF
Stars: ✭ 13 (-88.5%)
Mutual labels:  bugbounty-tool
VPS-Bug-Bounty-Tools
Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.
Stars: ✭ 44 (-61.06%)
Mutual labels:  bugbounty-tool
Passivehunter
Subdomain discovery using the power of 'The Rapid7 Project Sonar datasets'
Stars: ✭ 83 (-26.55%)
Mutual labels:  bugbounty-tool
wordlist generator
Unique wordlist generator of unique wordlists.
Stars: ✭ 41 (-63.72%)
Mutual labels:  bugbounty-tool
continuous-nuclei
Running nuclei Continuously
Stars: ✭ 45 (-60.18%)
Mutual labels:  bugbounty-tool
bulkssrf
Tests for SSRF by injecting a specified location into different headers. This is a Rust port of m4ll0k's tool.
Stars: ✭ 35 (-69.03%)
Mutual labels:  bugbounty-tool
Howtohunt
Tutorials and Things to Do while Hunting Vulnerability.
Stars: ✭ 2,996 (+2551.33%)
Mutual labels:  bugbountytips
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+47.79%)
Mutual labels:  bugbounty-tool
massurl
A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Stars: ✭ 14 (-87.61%)
Mutual labels:  bugbounty-tool

Bug Bounty Cheat Sheet

📚 Reference 🔎 Vulnerabilities
Bug Bounty Platforms XSS
Books SQLi
Special Tools SSRF
Recon CRLF Injection
Practice Platforms CSV Injection
Bug Bounty Tips LFI
XXE
RCE
Open Redirect
Crypto
Template Injection
Content Injection
XSLT Injection
Buffer Overflow Attack

Contents

Cross Site Scripting (XSS)

Cross Site Request Forgery (CSRF)

Clickjacking (UI redressing attack)

Local File Inclusion (LFI)

Subdomain Takeover

Denial of Service (DOS)

Authentication Bypass

SQL Injection(SQLI)

2FA related issues

CORS related issues

Server Side Request Forgery (SSRF)

Race Condition

Remote Code Execution (RCE)

Buffer Overflow Writeups

-Buffer Overflow Attack Book pdf -Github Reposirtory on Buffer Overflow Attack -Stack-Based Buffer Overflow Attacks: Explained and Examples -How Buffer Overflow Attacks Work -Binary Exploitation: Buffer Overflows -WHAT IS A BUFFER OVERFLOW? LEARN ABOUT BUFFER OVERRUN VULNERABILITIES, EXPLOITS & ATTACKS

Contributing

We welcome contributions from the public.

Using the issue tracker 💡

The issue tracker is the preferred channel for bug reports and features requests. GitHub issues

Issues and labels 🏷

Our bug tracker utilizes several labels to help organize and identify issues.

Guidelines for bug reports 🐛

Use the GitHub issue search — check if the issue has already been reported.

Style Guide

We like to keep our Markdown files as uniform as possible. So if you submit a PR, make sure to follow this style guide (we will not be angry if you do not).

  • Cheat sheet titles should start with ##.
  • Subheadings should be made bold. (**Subheading**)
  • Add newlines after subheadings and code blocks.
  • Code blocks should use three backticks. (```)
  • Make sure to use syntax highlighting whenever possible.

Bitcoin : 35ptN6ZEsuQpJWpCLuw2RQL176MB6yBfaS

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].