-
-
Save nsiddiqui25/c83e79f69a8c89dae8dab7065567a9e6 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
TODO | |
My Urls | |
/ | |
Regexp patterns | |
https://regexr.com/ | |
Python | |
https://hackernoon.com/10-common-security-gotchas-in-python-and-how-to-avoid-them-e19fbe265e03?utm_source=pocket-ff-recs | |
Rails | |
https://www.cloudbees.com/blog/preproduction-checklist-for-a-rails-app?utm_source=rubyweekly&utm_medium=email | |
https://youtu.be/CIhHpkybYsY?t=1171 | |
xss - https://threadreaderapp.com/thread/1508406052663934979.html | |
B | |
Browsers | |
https://github.com/Excloudx6/browser-compat-data | |
https://httpwg.org/specs/rfc7230.html#header.transfer-encoding | |
https://developer.mozilla.org/en-US/docs/Glossary/Forbidden_header_name | |
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Length | |
https://stackoverflow.com/questions/978061/http-get-with-request-body?rq=1 | |
https://datatracker.ietf.org/doc/html/rfc7230 | |
https://groups.yahoo.com/neo/groups/rest-discuss/conversations/messages/9962 | |
https://www.ietf.org/rfc/rfc2119.txt | |
https://www.elastic.co/guide/en/elasticsearch/guide/current/_empty_search.html | |
d | |
sd | |
2FA Bypass - | |
2fa bypass Mindmap - https://www.mindmeister.com/1736437018?t=SEeZOmvt01 | |
2fa Bypass Methods - https://workbook.securityboat.in/resources/web-app-pentest/business-logic-vulnerabilities/2fa-bypass | |
Android | |
https://github.com/dzmitry-savitski/android-pentest-tool | |
Authentication Bypass Vulnerabilities | |
API Hacking | |
https://gist.github.com/ruevaughn/51048bccdc753596443eca95cbf39356 | |
https://apexvicky.medium.com/top-10-api-bugs-where-to-find-them-5dac338b3d73 | |
https://attacker-codeninja.github.io/2021-08-28-Hacking-APIs-notes-from-bug-bounty-bootcamp/ | |
https://dfir.blog/unfurl/ | |
https://www.slideshare.net/programmableweb/why-api-security-is-more-complicated-than-you-think-and-why-its-your-1-priority | |
Blockchain | |
https://hash.ai/@b/uniswap | |
https://medium.com/immunefi/hacking-the-blockchain-an-ultimate-guide-4f34b33c6e8b | |
https://github.com/ruby/webrick/blob/master/lib/webrick/httprequest.rb }9 | |
https://twitter.com/0xAsm0d3us/status/1438149310080712709 | |
Blogs | |
https://respectxss.blogspot.com/ | |
Ethereum Hacking | |
https://twitter.com/CyberWarship/status/1533710785914056705 | |
Broken Access Control - https://cwe.mitre.org/data/definitions/1345.html | |
Browser Extensions - Chrome | |
Collusion - https://chrome.google.com/webstore/search/collusion | |
DotGit - https://chrome.google.com/webstore/detail/dotgit/pampamgoihgcedonnphgehgondkhikel?hl=en | |
Trufflehog https://chrome.google.com/webstore/detail/trufflehog/bafhdnhjnlcdbjcdcnafhdcphhnfnhjc | |
Browser Extensions - Firefox | |
Cookie Editor - https://addons.mozilla.org/en-US/firefox/addon/cookie-editor/ | |
Bulk URL Opener - https://addons.mozilla.org/en-GB/firefox/addon/bulkurlopener/ | |
Hacktoolshttps://addons.mozilla.org/en-US/firefox/addon/hacktools/ | |
Bug Bounty Programs | |
Discovery Header DoD - https://github.com/KingOfBugbounty/Discovery-Header-Bug-Bounty | |
King Recon DoD - https://github.com/KingOfBugbounty/KingRecon_DOD | |
Bentley Bug Bounty Program - https://www.bentley.com/en/products | |
https://lostsoulofawolf.medium.com/bug-bounty-how-to-get-private-invites-60062a5d0809 | |
https://github.com/Hack-with-Github | |
Blog | |
https://www.veracode.com/blog?utm_source=lpFooter&utm_medium=Website | |
http://10degres.net/posts/ | |
CSRF TOken - https://www.veracode.com/security/csrf-token | |
Courses | |
https://web.stanford.edu/class/cs253/ | |
Character Encodings | |
https://stat545.com/character-encoding.html | |
Cheatsheets | |
Cheatsheets | |
https://securityzines.com/#comics <---- Very Cool Cheatsheets printouts etc. \ | |
https://github.com/EdOverflow/bugbounty-cheatsheet | |
Cookies | |
https://datatracker.ietf.org/doc/html/rfc6265#section-5.3w | |
https://github.com/jshttp/cookie | |
CWE | |
CWE-548: Exposure of Information Through Directory Listing - https://cwe.mitre.org/data/definitions/548.html | |
Directory Listing | |
http://www.tecapi.com/public/rvr-view-attack-vector-gui.jsp?antiCsrfToken=null&attackVectorId=254 | http://projects.webappsec.org/w/page/13246922/Directory%20Indexing | |
Dorks | |
Aline - Dork Automator CLI - https://github.com/ferreiraklet/Aline | |
Brtwitter dork: https://mobile.twitter.com/i/events/1417062625997991936 | |
🌟 Find company's owned domains (company.*) with these #googledorks: | https://twitter.com/nil0x42/status/1533094473067995137 | |
Shifa123 BugBounty Dorks https://github.com/shifa123/bugbountyDorks/blob/master/bbdorks | |
Goop https://github.com/s0md3v/goop | |
Open Bug Bounty Targets https://github.com/bughunterlabs/open-bounty-targets/blob/main/dorks.txt | |
uDork https://github.com/m3n0sd0n4ld/uDork | |
Frameworks | |
BBRF Client - https://github.com/honoki/bbrf-client | |
LazyRecon - https://github.com/nahamsec/lazyrecon | |
Osmedeus - https://github.com/j3ssie/osmedeus | https://docs.osmedeus.org/web-ui/ | https://github.com/osmedeus/osmedeus-workflow/blob/main/general/subdomain.yaml | https://discord.com/invite/mtQG2FQsYA | https://docs.osmedeus.org/installation/practical-usage/ | |
Sniper - https://github.com/1N3/Sn1per | |
Reconness - https://github.com/reconness/reconness | |
Recon NG - https://github.com/lanmaster53/recon-ng | https://github.com/lanmaster53/recon-ng-marketplace | |
ReconFTW - https://github.com/six2dez/reconftw | |
Rengine - https://github.com/yogeshojha/rengine | |
Vajra - https://github.com/r3curs1v3-pr0xy/vajra eeewwwff | |
Git/Source Code Secret Finding | |
http://10degres.net/github-tools-collection/ | |
https://docs.github.com/en/rest/search | |
https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_04B-3_Meli_paper.pdf | |
https://github.com/koto/gitpillage | |
https://github.com/hisxo/gitGraber | |
https://github.com/gwen001/github-search | |
https://github.com/darkseed/gitpillage | |
Tools to Get sensitive info / secrets from https://twitter.com/soaj1664ashar/status/1176769454035939328 | |
https://github.com/trufflesecurity/trufflehog | |
Why Exposed API Keys and Sensitive Data are Growing Cause for Concern https://www.programmableweb.com/news/why-exposed-api-keys-and-sensitive-data-are-growing-cause-concern/analysis/2015/01/05 | |
Graphql | |
https://www.programmableweb.com/news/what-graphql-and-how-did-it-evolve-rest-and-other-api-technologies/analysis/2019/07/31 | |
https://github.com/KathanP19/HowToHunt/blob/master/GraphQL/GraphQL.md | |
https://www.youtube.com/watch?v=cvvPLlP4518&feature=emb_logo | |
handson / demos | |
ABUH! https://darkrebel.net/metarget-framework-providing-automatic-consctions-of-vulnerable-infrastructures | metarget appv install dvwa | metarget install cve-2021-2312 | |
xss jigsaw - https://blog.innerht.ml/page/2/ | |
HTTP Request Smuggling | |
Defparam Variant - https://gist.github.com/defparam/840f7d9e31f77b3c5460c5921e0787ef/revisions | |
bbhunter mutations - https://gist.github.com/bbhunter | |
HTTP Request Smuggling - https://gist.github.com/ruevaughn/9c76260b412446f33b647c970bbb1001) | |
HTTP Rquest Smuggling Tools | |
https://github.com/Sh1Yo/request_smuggler | |
IDOR | |
https://medium.com/pentesternepal/access-control-worth-2000-everyone-missed-this-idor-access-control-between-two-admins-9745eaf15d21 | |
ISS= | |
iis https://www.rapid7.com/db/vulnerabilities/spider-asp-dot-net-trace-axd/ | |
Ios | |
https://medium.com/pentesternepal/access-control-worth-2000-everyone-missed-this-idor-access-control-between-two-admins-9745eaf15d21 | |
https://havoc.app/package/crane | |
Javascript Vulnerabilities | |
Javascript Enumeration https://www.youtube.com/watch?v=IsSWbVHk11M | |
https://cheatsheetseries.owasp.org/cheatsheets/Third_Party_Javascript_Management_Cheat_Sheet.html | |
https://github.com/Excloudx6/jsmon | |
https://github.com/robre/scripthunter | |
JSON Attacks - JSON https://www.youtube.com/watch?v=oUAeWhW5b8c | |
JWT | |
https://gist.github.com/ruevaughn/328067fadf926ddb788f98cd0d2d1a71 Crack JWT | |
https://medium.com/redteam/stealing-jwts-in-localstorage-via-xss-6048d91378a0 | |
Security Weekly Unlocked: https://www.youtube.com/playlist?list=PLlPkFwQHxYE7nQtKNzjnsVyoSOu2K4l9e | |
https://anil-pace.medium.com/json-web-tokens-vs-oauth-2-0-85dd0b32057d | |
https://www.youtube.com/watch?v=muYmiEtPL8U JWT with bbking | |
JWT Traversal https://github.com/MoisesTapia/JwtTransversal | |
Mass Assignment https://cheatsheetseries.owasp.org/cheatsheets/Mass_Assignment_Cheat_Sheet.html | |
https://code.tutsplus.com/tutorials/mass-assignment-rails-and-you--net-31695 | |
Mindmaps | |
List of Attack Vectors http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp | |
Huge Mind Map. Lots of resources. Has All Exploits and a lot of good info. https://www.xmind.net/m/Xy7XEW/ | |
Collaborative Mindmaps - Collaborative Mind Mapping | |
Mobile | |
https://www.veracode.com/blog/2010/12/mobile-app-top-10-list | |
Owasp Top 10 (2021) https://cwe.mitre.org/data/definitions/1344.html | |
Parameter Tampering - | |
http://www.tecapi.com/public/rvr-view-attack-vector-gui.jsp?antiCsrfToken=null&attackVectorId=57 | |
POC | |
https://github.com/RootUp/PersonalStuff | |
https://github.com/swisskyrepo/PayloadsAllTheThings | |
Products / Services | |
Tobuy https://order.shareit.com/cart/view | https://tryhackme.com/why-subscribe | https://findomain.app/#Pricing | https://github.com/Excloudx6/InfoSec-Black-Friday | HAKLUKE RECOMENDS https://securitytrails.com/corp/osint-toolkit?referral_code=LLDAK0F80M | |
Recon | |
Reconmap GUI Website SaaS https://demo.reconmap.com/login | |
Reporting | |
https://cheatsheetseries.owasp.org/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.html | |
Resources | |
cloud metadata - https://gist.github.com/rudSarkar/39f821249bf0d38093cafbfd23bc33ee | https://gist.github.com/BuffaloWill/fa96693af67e3a3dd3fb | |
Megathread https://twitter.com/ITSecurityguard/status/1519272305729458176 | |
reset pass https://docs.google.com/presentation/d/1QzBl3k3n2q44ULyfZgr_gPZexj8nF5vD8JrS5AUJRbs/edit#slide=id.gb5aea10a86_0_167 | |
bug bounty https://docs.google.com/presentation/d/1o7GWUOYwcd3uMwLBRG9UzARYCvfuX3VKUHfoPu38t78/edit | |
Bug Bounty Udemy Courses Tip https://twitter.com/ITSecurityguard/status/1519272305729458176 | |
https://github.com/carlospolop/PEASS-ng | |
RPO (Relative Path overide) Gadgets - https://blog.innerht.ml/rpo-gadgets/ | |
Self Hosting | |
Shodan like nmap results parser (https://github.com/shivammehta007/ScanX) PBNJ(http://pbnj.sourceforge.net/) (A suite of tools to monitor change in a network over time) store NMAP Results in a database to monitor changes on a network over time and then conducts historical analysis to identify new hosts - | |
Scripts | |
LFI https://web.archive.org/web/20100228162410/http://pastie.org/840199 | |
https://github.com/killswitch-GUI/PenTesting-Scripts | |
Session Poisoning - https://en.wikipedia.org/wiki/Session_poisoning | |
https://github.com/t1m4/ptl_lab | |
Setup | |
Bug Bounty Tools Setup - https://github.com/oliveira-andre/bug_bounty_tools | |
Redherd - https://redherd.readthedocs.io/en/latest/ | https://www.youtube.com/channel/UCYSM51oldVsryhZxGdB3hXA | |
Shodan | |
Awesome Shodan Queries https://github.com/jakejarvis/awesome-shodan-queries | |
Shodan Dorks https://twitter.com/0xhunster/status/1548382647759491074/photo/1 | |
Shodan CVE Dorks Kathan https://kathan19.gitbook.io/howtohunt/sensitive-info-leaks/shodan_cve_dorks | |
Status Codes | |
Web status codes https://requests.readthedocs.io/en/latest/api/#status-code-lookup | |
SQL Injection | |
https://book.hacktricks.xyz/pentesting-web/sql-injection | |
(at the bottom of the page, the image and text for 2 sqli x-forwarded-for tips) https://medium.com/pentesternepal/access-control-worth-2000-everyone-missed-this-idor-access-control-between-two-admins-9745eaf15d21 | |
https://github.com/0xEval/sql2shell | |
Source Code Analysis | |
https://twitter.com/dhakal_ananda/status/1544574015779606529 | |
Takeovers | |
https://github.com/musana/mx-takeover | |
Timing Attacks | |
Time Attacks http://www.tecapi.com/public/relative-vulnerability-rating-gui.jsp?antiCsrfToken=null&filterCategory=9 | |
Tips | |
https://bbinfosec.medium.com/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248 | |
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/bugbountytips.md | |
King of Bug Bounty Tips - https://github.com/KingOfBugbounty/KingOfBugBountyTips | |
https://abhinavprasad47.github.io/bugbounty-starter-notes/ | |
https://www.google.com/search?tbm=bks&q=recon-ng | |
gh dork: https://github.com/topics/one-liners | |
Sqlmap tip - https://youtu.be/rVu0GUjic_g?t=2246 | |
Eval command and security issues https://mywiki.wooledge.org/BashFAQ/048 | |
Tools | |
HTML Tools (CSV To HTML, Regexpal, 50+ tools) https://www.cleancss.com/join.php | |
Arjun - https://github.com/s0md3v/Arjun/wiki/Usage#scan-a-single-url | |
crobat - https://www.onsecurity.io/blog/how-i-made-rapid7s-project-sonar-searchable/ | |
Dom Invader - https://www.youtube.com/watch?v=GeqVMOUugqY | |
ffuf - https://mikekitckchan.medium.com/holy-ffuf-a-beginner-guide-to-fuzz-with-ffuf-4bc6a66b5391 | https://thexssrat.medium.com/what-the-fuzz-the-truth-behind-content-discovery-77cd0c0756e7 | |
gf - https://rengine.wiki/usage/tool_conf/ | https://github.com/1ndianl33t/Gf-Patterns | https://github.com/halencarjunior/BugBuntu/wiki/Installing-Gf-Patterns | https://github.com/NitinYadav00/gf-patterns/fork | https://twitter.com/sratarun/status/1361209626478276610 | MORE GF TEMPLATES ----> https://github.com/lutfumertceylan/top25-parameter/releases/tag/v1.0.7 | https://github.com/tomnomnom/gf/compare/master...pry0cc:jf:master | https://github.com/ResistanceIsUseless/gf | https://github.com/tomnomnom/gf/compare/master...medbsq:gf:master | https://github.com/mrofisr/gf-patterns | |
gee - Similar to Tee. More Functionality. https://github.com/hahwul/gee | |
- Gee Tips https://twitter.com/hahwul/status/1360495560843689989 | |
FFMPEG-AVI-m3u-xbin - https://github.com/Excloudx6/ffmpeg-avi-m3u-xbin | |
metabigor v2 - Metabigor https://twitter.com/j3ssiejjj/status/1528687407587299330/photo/1 | |
SimpleApachePathTraversal - https://github.com/MrCl0wnLab/SimplesApachePathTraversal | |
Source2Url - | |
WhatWeb - https://github.com/urbanadventurer/WhatWeb | |
WFUZZ - https://book.hacktricks.xyz/pentesting-web/web-tool-wfuzz | |
Wordlists | |
https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056 | |
Writeups | |
securityforeveryone.com/scan-repository | |
2022-07-15 Exploiting Arbitrary Object Instantiations in PHP without Custom Classes https://swarm.ptsecurity.com/exploiting-arbitrary-object-instantiations/ | |
https://github.com/fardeen-ahmed/Bug-bounty-Writeups | |
https://github.com/devanshbatham/Awesome-Bugbounty-Writeups | |
https://twitter.com/ITSecurityguard/status/1519272305729458176 | |
https://github.com/ngalongc/bug-bounty-reference | |
https://github.com/djadmin/awesome-bug-bounty | |
https://ysamm.com/# | |
https://tarekbouali.com/posts/how-i-hacked-one-of-the-biggest-airlines-group-of-the-world/ | |
https://github.com/jaiswalakshansh/Facebook-BugBounty-Writeups | |
https://infosecwriteups.com/intro-to-bug-bounty-automation-tool-chaining-with-bash-13e11348016f | |
https://hacklido.com/u/excloudx | |
https://subscription.packtpub.com/book/networking-and-servers/9781788626897/7/ch07lvl1sec47/example | |
https://subscription.packtpub.com/owned | |
https://id.bugbountyhub.com/auth/realms/bugbountyhub/login-actions/authenticate?execution=a484e1a7-bc42-472b-a339-15be49996b14&client_id=prod-platform&tab_id=MivkVulj_p8 | |
https://prashantbhatkal2000.medium.com/svg-based-stored-xss-ee6e9b240dee | |
https://github.com/phlmox/public-reports/blob/main/hackerone-one-million-reports | |
https://footstep.ninja/posts/ | |
https://twitter.com/omespino/status/1489310300708900868/photo/ | |
https://github.com/phlmox/public-reports | |
https://blog.assetnote.io/2020/09/15/hacking-on-bug-bounties-for-four-years/ | |
https://discord.com/channels/772850979955671103/772854181433573398/895230570366402590 Hacking Articles | |
Vhosts | |
Vhost Discovery https://github.com/projectdiscovery/tlsx#sancn-probe | |
xss | |
https://twitter.com/ofjaaah/status/1504932805431767046 | |
https://portswigger.net/research/new-xss-vectors | |
https://medium.com/bugbountywriteup/how-i-was-able-to-find-50-cross-site-scripting-xss-security-vulnerabilities-on-bugcrowd-public-ba33db2b0ab1 | |
https://github.com/takshal/freq | |
https://bytemeta.vip/index.php/@takshal | |
https://github.com/takshal/freq/pull/2/commits/ca176eee65889530b4896d782419edd0e4325713 | |
https://www.kitploit.com/2018/05/xss-payload-list-cross-site-scripting.html | |
What is the best method to use dalfox?? https://attacker-codeninja.github.io/2021-09-09-portswigger-notes-on-host-header-attack/ | |
https://github.sre.pub/topics/xss-scanners | |
https://medium.com/@skavans_/the-unobvious-about-xss-and-html-encoding-4e0d536a35d9 | |
Gists | |
Identify anything. pyWhat easily lets you identify emails, IP addresses, and more. Feed it a .pcap file or some text and it'll tell you what it is! https://github.com/bee-san/pyWhat/fork | |
Eyeballer | |
https://github.com/BishopFox/eyeballer <----- TODO BIG IG and [this](https://www.kaggle.com/datasets/altf42600/pentest-screensots) | |
https://www.akamai.com/blog#HTTP2rs | |
https://www.jhaddix.com/post/tooltime-2-ssl-certificate-parsers-for-recon | |
Recon | |
Notify -bulk - workflow to funnel everything to Notify https://youtu.be/v7FMPU3J3Qw?t=3044 | |
ReconFTW Automation - https://youtu.be/v7FMPU3J3Qw?t=2841 | |
Automation - what to do with all the subdomains endpoints you found! https://youtu.be/v7FMPU3J3Qw?t=1864 | |
Tools | |
https://reconshell.com/awesome-bug-bounty-tools/ | |
https://reconshell.com/mobile-hackers-weapons/ | |
https://book.hacktricks.xyz/todo/more-tools | |
https://github.com/fardeen-ahmed/Bug-bounty-Writeups#-bug-bounty-tools--- | |
https://github.com/vavkamil/awesome-bugbounty-tools#Recon | |
Image upload | |
https://github.com/barrracud4/image-upload-exploits | |
https://hackbotone.com/blog/essential-recon-tools/ | |
https://github.com/danielthatcher/spydom | |
https://allciber.com/web-attack-cheat-sheet/ | |
Alias / Snippet / Command Management | |
https://github.com/nahamsec/recon_profile | |
https://github.com/hahwul/hack-pet/commit/6405608c856551d241174d8c839c79efdff5153c | |
https://github.com/hahwul/hack-pet | |
https://github.com/knqyf263/pet | |
Wordlists | |
FUZZ.txt good -https://gist.github.com/m4ll0k/50efec5f04179b107c9d7597eec7d23c | |
https://gist.github.com/m4ll0k/https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d | |
Wordlists | |
Stream: Creating Target Specific Wordlist!! https://www.youtube.com/watch?v=AF-zp6DROTs | |
feeee q | |
API Endpoints https://gist.github.com/yassineaboukir/8e12adefbd505ef704674ad6ad48743d | |
https://bendtheory.medium.com/finding-and-exploiting-unintended-functionality-in-main-web-app-apis-6eca3ef000af | |
https://wordlists.assetnote.io/ | |
https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056 | |
https://github.com/six2dez/OneListForAll/blob/main/onelistforallmicro.txt | |
https://gist.github.com/miguelmota/706ebaeb661e246e1b682c400d49d1c9 | |
https://github.com/ghostlulzhacks/wordlist/blob/master/directory-brute-wordlist.txt | |
to harvest https://youtu.be/YO3ldj4jkJk?t=275 | |
Common Bucket Names https://github.com/buckhacker/buckhacker/blob/master/resources/common-bucket-names.txt | |
https://portswigger.net/web-security/authentication/auth-lab-passwords | |
https://portswigger.net/web-security/authentication/auth-lab-usernames | |
https://github.com/SmeegeSec/SmeegeScrape | |
make a wl from js https://gist.github.com/seqrity/d67608eb6372cd6f455bfeeefa77b9c2 | |
Who what where when tomnomnom - https://www.youtube.com/watch?v=W4_QCSIujQ4 | |
https://pentestbook.six2dez.com/recon/webs-recon Wordlist Gen | |
https://github.com/giteshnxtlvl/cook | |
https://gitlab.com/kalilinux/packages/amass/-/tree/91a5313226ab9ebd4ecbad40622584dd6f3f7cd5/wordlists Wordlists | |
https://github.com/anshumanbh/brutesubs | |
Proxy | |
https://github.com/neex/tcp-over-http | |
hetty.xyz | |
Sqli | |
https://sapt.medium.com/sqli-on-a-bugcrowd-private-program-17858b57ec61 | |
http://sqlninja.sourceforge.net/download.html | |
https://w3af.org/howtos/find-cross-site-scripting-and-sql-injections | |
https://www.securedyou.com/how-to-hack-sql-database-password-cracking/ | |
https://www.securedyou.com/download-havij-free-automated-sql-injection-tool/ | |
sqlmap | |
https://h1pmnh.github.io/post/advanced-sqlmap-case-study-1 | |
cors https://chawdamrunal.medium.com/insecure-cors-configuration-808437d7cfd7 | |
Default C | |
https://github.com/lanmaster53/recon-ng-marketplace/wiki/API-Keys | |
https://github.com/SummitRoute/csp_security_mistakes | |
File Upload | |
https://sm4rty.medium.com/hunting-for-bugs-in-file-upload-feature-c3b364fb01ba | |
https://github.com/almandin/fuxploider - File upload vulnerability scanner and exploitation tool. | |
Default Cred Scanner | |
https://github.com/Excloudx6/changeme | |
Monitor Server Status | |
https://github.com/sudo-jtcsec/server-status-mon | |
https://github.com/Excloudx6/server-status_PWN | |
Tmux https://github.com/Excloudx6/clips | |
# My Bug Bounty Wiki Page | |
https://github.com/MrM8BRH/SuperLibrary | |
https://github.com/zeroc00I/ReconNotes | |
https://gist.github.com/ruevaughn/71c31d7f67b7d105d9f480489e02c906 | |
Scanners | |
https://github.com/RustScan/RustScan | |
https://github.com/knassar702/scant3r | |
http headers | |
https://www.ibm.com/docs/en/ibm-mq/7.5?topic=headers-content-type-http-entity-header | |
A-Z Sorting in progress | |
AwsCli https://aws.plainenglish.io/aws-s3-cli-cheatsheet-9078366fca83 | |
Welcome to my Bug Bounty Wiki page. It's currently not organized or cleaned up at all though that's a WIP. Originally was where I was dumping links and things I needed to rememnber. | |
News Articles | |
https://www.bbc.com/news/technology-43581624 | |
Deserialisation | |
Deserialization example <-https://youtu.be/oUAeWhW5b8c?t=1583 | |
Another Deserialization example https://youtu.be/eDfGpu3iE4Q?t=266 | |
https://github.com/GerbenJavado/LinkFinder | |
https://medium.com/@duhroach/how-png-works-f1174e3cc7b7 | |
https://github.com/beurtschipper/Depix <-- unblur | |
### A | |
Amass | |
https://hackbotone.com/blog/amass-osint-reconnaissance-tool/ | |
https://hakluke.medium.com/haklukes-guide-to-amass-how-to-use-amass-more-effectively-for-bug-bounties-7c37570b83f7 | |
https://securityonline.info/amass-subdomain-enumeration/ | |
https://github.com/OWASP/Amass/releases | |
https://mobile.twitter.com/drunkrhin0/status/1344130730947825664 | |
https://twitter.com/jeff_foley | |
https://github.com/OWASP/Amass/blob/master/doc/scripting.md | |
https://github.com/OWASP/Amass | |
https://gist.github.com/sillydadddy/b1726c8e8ce281d55b82d4e2a1a610e8 | |
https://twitter.com/dokkillo/status/1305566849514471424 | |
https://github.com/PatrikFehrenbach/amass-tools/blob/master/assetfinder.ads | |
https://github.com/OWASP/Amass#top-mentions | |
amass enum script command https://youtu.be/H1wdBgY1rtg?t=5408 | |
Example of api key configuration https://www.hahwul.com/2020/09/23/amass-go-deep-in-the-sea-with-free-apis/#chaos | |
[31:33 / 1:56:06] | |
[How to Use Amass Efficiently by @jeff_foley #NahamCon2020](https://youtu.be/H1wdBgY1rtg?t=1974) | |
[OWASP AMass Boot Camp by Jeff Foley (Caffix)](https://www.youtube.com/watch?v=OOurkCPf2-I) | |
Amass Tutorial https://github.com/OWASP/Amass/blob/master/doc/tutorial.md | |
https://github.com/vortexau/dnsvalidator | |
https://twitter.com/owaspamass | |
https://kathmandupost.com/science-technology/2021/04/06/we-dream-to-be-nepal-s-first-billion-dollar-it-company | |
https://reconwithme.com/ | |
Amass Scripting\ | |
https://github.com/OWASP/Amass/tree/master/resources/scripts | |
https://github.com/OWASP/Amass/blob/master/doc/scripting.md | |
amass scripting https://youtu.be/H1wdBgY1rtg?t=4987 | |
https://jaeles-project.github.io/ | |
APIs | |
Huge API Resources list! https://dsopas.github.io/MindAPI/references | |
https://thexssrat.podia.com/view/courses/free-api-testing-and-securing-guide/923506-api-top-10-videos/2699995-owasp-api-top-10-a0-to-a3 | |
https://www.hahwul.com/2019/07/01/easy-security-testing-with-applications-bridge-in-zap/ | |
https://github.com/PortSwigger | |
### B | |
Books https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/BOOKS.md | |
https://cheatsheetseries.owasp.org/cheatsheets/Authorization_Testing_Automation_Cheat_Sheet.html | |
https://guidesmiths.github.io/cybersecurity-handbook/resources | |
https://guidesmiths.github.io/cybersecurity-handbook/tooling | |
https://github.com/1N3/Sn1per/blob/master/modes/normal_webporthttp.sh | |
Blogs | |
https://opsecx.com/index.php/category/blog/ | |
Url FInder | |
https://www.kitploit.com/2021/08/sigurlfind3r-reconnaissance-tool-it.html | |
403 Bypasser | |
https://www.kitploit.com/2021/11/4-zero-3-403401-bypass-methods-bash.html | |
https://www.kitploit.com/2021/09/403bypasser-automates-techniques-used.html | |
Oauth | |
#### Oauth Bug Bounty Cheatheet | |
https://0xn3va.gitbook.io/cheat-sheets/web-application/oauth-2.0-vulnerabilities | |
https://anil-pace.medium.com/json-web-tokens-vs-oauth-2-0-85dd0b32057d | |
https://www.ibm.com/docs/en/sqsp/32.0?topic=SSBRUQ_32.0.0/com.ibm.resilient.doc/install/resilient_install_defang s.htm | |
Nuclei | |
Nuclei : A Bug Bounty Tool https://www.youtube.com/watch?v=ZcG8ARatgs0 | |
https://www.reddit.com/r/infosec_daily/comments/lrz9bg/nuclei_tool_review/ | |
Finding bugs with Nuclei with PinkDraconian (Robbe Van Roey) https://www.youtube.com/watch?v=ewP0xVPW-Pk | |
Nuclei templates | |
https://github.com/xm1k3/cent <-- manage nuclei tempaltes and ibg list of templateseeeeeeeeeeeeeeeeeee | |
https://github.com/aboul3la/nuclei-templates | |
https://github.com/projectdiscovery/nuclei-templates/compare/master...s4e-labs:nuclei-templates:master | |
https://github.com/projectdiscovery/nuclei-templates/discussions/693 | |
https://nuclei-templates.netlify.app/ | |
cool | |
https://github.com/nikitastupin/param-miner-doc | |
rxrdxrhttps://platforms.disclose.io/ | |
https://cardanofeed.com/cardano-doubled-the-rewards-for-its-bug-bounty-program-49977.html | |
https://portswigger.net/daily-swig/bug-bounty-radar-the-latest-bug-bounty-programs-for-march-2022 | |
https://portswigger.net/daily-swig/cloudflare-bug-bounty-program-goes-public-with-3-000-rewards-on-offer | |
### C | |
CanaryTokens | |
https://canarytokens.org/generate | |
Checklists | |
https://github.com/security-checklist/php-security-check-list | |
https://apexvicky.medium.com/bug-bounty-methodology-web-vulnerabilities-checklist-86175dd29987 | |
Cheatsheet | |
https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet | |
https://github.com/dgtlmoon/changedetection.io | |
#### CVE | |
Code Review | |
https://www.youtube.com/watch?v=q5NqY2RRLj0 | |
https://www.youtube.com/watch?v=bfLQjZmD5jY&feature=youtu.be | |
POC Videos | |
https://repo.telematika.org/project/bminossi_allvideopocsfromhackerone/ | |
https://github.com/zeroc00I/AllVideoPocsFromHackerOne | |
Fuzzing | |
https://thugcrowd.com/kiosk/ Badass Fuzzing tools / Resources | |
https://0xn3va.gitbook.io/cheat-sheets/resources/software/fuzzing | |
Bug Bounty Videos | |
Mix - webpwnized https://www.youtube.com/watch?v=Y_2JVREtDFk&list=RDCMUCPeJcqbi8v46Adk59plaaXg&start_radio=1 | |
Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out! - https://www.youtube.com/watch?v=CIhHpkybYsY&t=2s | |
Videos | |
https://administraitor.video/edition/Hack.lu/2019 | |
https://portswigger.net/news | |
Notify - https://youtu.be/rbr7ZmBI9qs?t=278 | |
https://www.youtube.com/watch?v=kbi2KaAzTLg | |
What after Recon? - Sup Subdomains?! | |
DORK | |
https://www.google.com/imgres?imgurl=https%3A%2F%2Fpbs.twimg.com%2Fmedia%2FEf6ELytWAAAswXx%3Fformat%3Djpg%26name%3D4096x4096&imgrefurl=https%3A%2F%2Fmobile.twitter.com%2Fbugbountyrecon&tbnid=pQu57Q5pha2WIM&vet=12ahUKEwixtNqk0vz1AhV0IX0KHWddCpQQMygLegUIARC-AQ..i&docid=NghhHzdXU7Ey8M&w=2480&h=1302&q=Bug%20bounty%20automation%20GitHub&client=firefox-b-1-d&ved=2ahUKEwixtNqk0vz1AhV0IX0KHWddCpQQMygLegUIARC-AQ | |
https://github.com/bughunterlabs/open-bounty-targets/blob/main/dorks.txt | |
Reporting | |
https://hacktify.in/bugbounty/ <---- lots of resources for reporting | |
#### Ruby on Rails | |
https://hackerone.com/reports/904059 | |
https://hackerone.com/reports/1400309 | |
https://github.com/httpvoid/writeups/blob/main/Ruby-deserialization-gadget-on-rails.md | |
https://bugbountyforum.com/resources/#ruby-on-rails | |
Free Shodan key and nmap automatin script to search for big f5 ip acve | |
https://learn.hacktify.in/courses/take/bug-bounty-hunting-and-penetration-testing/lessons/16862042-assets-resources | |
https://github.com/shifa123/f5BigIPExploit/blob/master/assets | |
dnmap | |
https://github.com/vdjagilev/nmap-formatter | |
https://www.darknet.org.uk/2016/07/dnmap-distributed-nmap-framework/?utm_source=pocket-ff-recs | |
https://github.com/alt3kx/CVE-2021-21985_PoC/blob/main/CVE-2021-21985.nse | |
# https://github.com/RootUp/PersonalStuff/blob/master/http-vuln-cve-2021-41773.nse | |
# https://github.com/RootUp/PersonalStuff/blob/master/http-vuln-cve2020-3452.nse | |
aquatone - https://gist.github.com/random-robbie/beae1991e9ad139c6168c385d8a31f7d | |
https://www.tib.eu/en/publishing-archiving/research-data | |
https://github.com/erbbysam/Hunting-Certificates-And-Servers/blob/master/Hunting%20Certificates%20%26%20Servers.pdf | |
Bug Bouty Programs | |
https://cheatsheetseries.owasp.org/cheatsheets/Authorization_Testing_Automation_Cheat_Sheet.html | |
https://guidesmiths.github.io/cybersecurity-handbook/resources | |
https://guidesmiths.github.io/cybersecurity-handbook/tooling | |
rxrdxrhttps://platforms.disclose.io/ | |
https://cardanofeed.com/cardano-doubled-the-rewards-for-its-bug-bounty-program-49977.html | |
https://portswigger.net/daily-swig/bug-bounty-radar-the-latest-bug-bounty-programs-for-march-2022 | |
https://portswigger.net/daily-swig/cloudflare-bug-bounty-program-goes-public-with-3-000-rewards-on-offer | |
https://hackerone.com/alipay?type=team | |
https://render.alipay.com/p/c/183ecyeztvuo/dana-pay.html | |
Disclosure Assistance w/ Hackerone https://hackerone.com/disclosure-assistance/disclosure_assistance_requests/new?type=team | |
* [Disclose.io - program List Data](https://raw.githubusercontent.com/disclose/diodb/master/program-list.json) | |
https://github.com/detectify/cs-challenge | |
https://github.com/bughunterlabs/open-bounty-targets/blob/main/dorks.txt | |
Dutch Gov - bug bounty scope https://gist.github.com/ruevaughn/f2d1157598a6156c3d51538b3fbd980c | |
"Bug Bounty programs|VDP|launch" -> Google News etc | |
#### J | |
Javascript | |
JAVASCRIPTRECON.md https://gist.github.com/m4ll0k/31ce0505270e0a022410a50c8b6311ff | |
https://portswigger.net/research/dom-based-angularjs-sandbox-escapes | |
Javascript for hackers https://www.youtube.com/watch?v=FTeE3OrTNoA | |
https://legallybreaking.com/discussion/88/full-featured-javascript-recon-automation-jsfscan-sh | |
https://labs.detectify.com/2016/12/08/the-pitfalls-of-postmessage/ | |
https://portswigger.net/researcword | |
h/dom-based-angularjs-sandbox-escapes | |
https://portswigger.net/research/dom-based-angularjs-sandbox-escapes | |
#### L | |
Labs | |
Linux | |
https://linuxsecurity.expert/resources/ | |
#### M | |
Monitoring | |
https://github.com/dgtlmoon/changedetection.io Monitor Website Changes | |
### P | |
#### Podcasts | |
Links here -> https://blog.intigriti.com/2019/11/12/bug-bytes-44-new-platform-new-programs-and-a-e25k-head-csrf/ | |
SelfHosted Podcast https://selfhosted.show/60?t=777 | |
Programs | |
https://github.com/bughunterlabs/open-bounty-targets/blob/main/dorks.txt | |
### R | |
#### | |
#### Reverse Shells | |
### Rate Limit | |
### T | |
Top 10 | |
------- ACCOUNT TAKEOVERS----------- | |
https://medium.com/@bathinivijaysimhareddy/tale-of-account-takeovers-part-2-9abf62de4ca3 | |
https://kathan19.gitbook.io/howtohunt/subdomain-takeover/easy_methods | |
https://opensourcelibs.com/lib/google-acquisitions | |
API Security | |
https://www.cloudflare.com/learning/security/api/owasp-api-security-top-10/ | |
Shadowe apis https://www.cloudflare.com/learning/access-management/what-is-shadow-it/ | |
Cors | |
https://jakearchibald.com/2021/cors/playground/ | |
DNS Hijacking | |
https://www.cloudflare.com/en-ca/learning/security/global-dns-hijacking-threat/ | |
https://github.com/mdsecresearch/Publications/blob/master/presentations/Offensive%20Development%20-%20Post-Exploitation%20Tradecraft%20in%20an%20EDR%20World%20-%20x33fcon%202020.pdf | |
ffuf | |
How to use ffuf - Hacker Toolbox https://www.youtube.com/watch?v=aN3Nayvd7FU | |
Fuzzing / FFUF -> 5-30-22 Nehamssec stream covered fuzzing A LOT https://www.twitch.tv/videos/1312499916 | |
Protips ffuf - tips and tricks https://www.youtube.com/watch?v=uwcRBSUl8e4&t=358s | |
Late to the party, or, in other words massive web enumeration using ffuf. http://0entropy.blogspot.com/2020/05/late-to-party-or-in-other-words-massive.html | |
https://gowthams.gitbook.io/bughunter-handbook/fuzzing-fuff | |
https://0xmahmoudjo0.medium.com/how-i-found-multiple-sql-injection-with-ffuf-and-sqlmap-in-a-few-minutes-9c3bb3780e8f | |
IDN Homograph | |
https://www.akamai.com/blog/security/watch-your-step-the-prevalence-of-idn-homograph-attacks | |
Insecure Deserialisation | |
Insecure Deserialisation https://www.youtube.com/watch?v=SNi7gNkfLSM | |
#### Protype Pollution | |
https://www.kitploit.com/2021/09/plution-prototype-pollution-scanner.html | |
https://github.com/BlackFan/client-side-prototype-pollution | |
https://research.securitum.com/prototype-pollution-and-bypassing-client-side-html-sanitizers/ | |
https://github.com/HoLyVieR/prototype-pollution-nsec18/blob/master/paper/JavaScript_prototype_pollution_attack_in_NodeJS.pdf | |
#### Prototype polution Tools | |
https://github.com/msrkp/PPScan | |
Sensitive Info | |
https://kathan19.gitbook.io/howtohunt/sensitive-info-leaks/shodan_cve_dorks | |
SSRF | |
https://reconshell.com/jira-mobile-ssrf-exploit/ | |
https://gowthams.gitbook.io/bughunter-handbook/list-of-vulnerabilities-bugs/ssrf | |
Subdomain Takeovers | |
https://0xpatrik.com/subdomain-takeover-ns/ | |
https://labs.detectify.com/2014/10/21/hostile-subdomain-takeover-using-herokugithubdesk-more/ | |
https://www.hackerone.com/application-security/guide-subdomain-takeovers | |
https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75 | |
https://import.cdn.thinkific.com/359809/courses/1386931/locomotivesubdomaintakeover-210608-154821.yamll | |
https://github.com/buckhacker/SubDomainTakeoverTools | |
github.com/lukasikic/subzy | |
-> https://gist.githubusercontent.com/ruevaughn/91d3369fdf0d93b0bdc6662c771cb7ae/raw/79e07b315e465bae1f003ec8fd40fcf5471b223b/fingerprints.json | |
github.com/mhmdiaa/second-order | |
SQL INjection | |
https://www.cloudflare.com/learning/security/threats/sql-injection/ | |
XSS | |
Al the ways you can alert js -> https://gist.github.com/tomnomnom/14a918f707ef0685fdebd90545580309 | |
https://github.com/wisec/domxsswiki/wiki | |
https://github.sre.pub/topics/xss-scanners | |
https://owasp.org/www-community/attacks/xss/ | |
Moving beyond alert()xss https://av.tib.eu/media/49191 | |
https://unescape-room.jobertabma.nl/ | |
https://infosecwriteups.com/reflected-xss-on-microsoft-com-subdomains-4bdfc2c716df | |
#### Tools | |
https://www.xmind.net/m/Xy7XEW/# <----- | |
https://github.com/Excloudx6/PentestTools#exploitation-tools | |
https://linuxsecurity.expert/security-tools/top-100/ | |
https://intelx.io/tools | |
https://github.com/nccgroup/ScoutSuite/tree/master/tools | |
Clean Ips Script | |
https://gist.github.com/LuD1161/bd4ac4377de548990b47b0af8d03dc78 | |
### D | |
Dirb | |
https://techyrick.com/dirb/ | |
https://github.com/nccgroup/tracy | |
#### Todo | |
hetty.xyz | |
https://www.bugbountyhunting.com/ | |
https://github.com/KingOfBugbounty/KingOfBugBountyTips#scan-log4j-using- -and-log4j-scan | |
https://medium.com/hacking-info-sec/how-to-install-and-use-bbrf-35f6aa15fbc9 | |
https://github.com/Excloudx6/Guide-to-SSRF | |
https://github.com/alphaSeclab/sec-daily-2020 | |
https://github.com/KathanP19/HowToHunt/blob/master/CheckList/mindmap.png | |
https://github.com/topics/bugbounty | |
https://gist.github.com/R0X4R/bc08d55e368965f22c0b41ee8475ba87 | |
SSRF | |
https://cheatsheetseries.owasp.org/assets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet_SSRF_Big.pdf | |
Nmap | |
https://github.com/killswitch-GUI/PenTesting-Scripts/blob/master/Nmap-Strings | |
https://www.bugcrowd.com/blog/getting-started-bug-bounty-hunter-methodology/ | |
https://github.com/SmeegeSec/Security_Headers_Nmap_Parser | |
ssh bruting | |
A simple multi-threaded distributed SSH brute-forcing tool written in Python https://github.com/k4yt3x/orbitaldump | |
https://github.com/d3vilbug/Brutal_SSH | |
xsshunter | |
https://github.com/mystech7/xsshunter - duplicate within 15 min check added | |
https://gosecure.github.io/security-cheat-sheet/ | |
https://twitter.com/e11i0t_4lders0n/status/1489234267687497735 | |
https://snyk.io/log4j-vulnerability-resources/ | |
https://blog.detectify.com/2019/02/05/guide-http-security-headers-for-better-web-browser-security/ | |
HTTP HEader Smuggling | |
https://github.security.telekom.com/2020/05/smuggling-http-headers-through-reverse-proxies.html | |
Request Smuggling | |
https://github.com/ruevaughn/websocket-connection-smuggler | |
https://portswigger.net/daily-swig/how-to-perform-an-http-header-smuggling-attack-through-a-reverse-proxy | |
https://twitter.com/albinowax/status/1263122811683553283 | |
Note: kitploit guys is the hackbogtone guy | |
https://www.kitploit.com/2021/08/http-request-smuggling-http-request.html | |
https://hackbotone.com/blog/http-request-smuggling-detection-tool/ | |
https://www.youtube.com/watch?v=mijOcGLneLU&t=303.658823s | |
https://gist.github.com/sminez/571bd7bafb1b88630b85c85a0cd66e3a - grep through this | |
try | |
https://github.com/arjunshibu/gcmd | |
https://splash.readthedocs.io/en/stable/scripting-tutorial.html#scripting-tutorial | |
https://github.com/phlmox | |
Recon | |
https://www.kitploit.com/2021/10/webdiscover-purpose-of-this-script-is.html | |
https://www.cobalt.io/blog/scope-based-recon-smart-recon-tactics | |
Checklists | |
https://gist.github.com/jhaddix/6b777fb004768b388fefadf9175982ab | |
https://github.com/KathanP19/HowToHunt/blob/master/CheckList/Web_Checklist_by_Chintan_Gurjar.pdf | |
https://blog.assetnote.io/2021/01/13/blind-ssrf-chains/ | |
https://gist.github.com/pdelteil/ba005609789ae14862f023da4191826d | |
https://github.com/rails/rails/issues/37620 | |
SUBDOMAIN TAKEOVERS | |
https://kathan19.gitbook.io/howtohunt/subdomain-takeover/easy_methods | |
https://www.udemy.com/course/cloud-hacking/learn/lecture/8613164?start=0#overview | |
https://github.com/indianajson/can-i-take-over-dns | |
RECON | |
https://gist.github.com/khanjanny/039d7c7d825a866b9020e3945e04ace9 | |
https://github.com/KathanP19/HowToHunt | |
https://prettyrecon.com/auth/forgot_password/ | |
Oneliners | |
https://github.com/KingOfBugbounty/KingOfBugBountyTips/compare/master...halencarjunior:KingOfBugBountyTips:master | |
https://www.youtube.com/watch?v=ZcG8ARatgs0&t=467s | |
https://giters.com/okaayfine/oneliner-bugbounty | |
https://twitter.com/ofjaaah/status/1532581839344394241 | |
https://gist.github.com/cyberheartmi9/c993542044fdc45834837c3f88484a63 | |
https://github.com/trimstray/the-book-of-secret-knowledge | |
Tweets Dorks | |
https://twitter.com/hashtag/bugbountytips | |
https://twitter.com/search?q=%23bugbountytips&cn=ZmxleGlibGVfcmVjcw%3D%3D&refsrc=email | |
https://twitter.com/ghostlulz1337 | |
https://www.google.com/search?client=firefox-b-1-d&q=site%3Agist.github.com+%22dalfox%22+automate | |
https://gist.github.com/sec99 | |
https://gist.github.com/Bedrovelsen/starred | |
https://gist.github.com/tranphuoctien/47c1242c8189b42fb4d268c548db4526 | |
https://gist.github.com/GrahamcOfBorg/601b9608c6010d9c82cf0e9535faac4b | |
https://gist.github.com/babaloveyou | |
https://www.google.com/search?client=firefox-b-1-d&q=bug+bountny+automation | |
https://www.reddit.com/r/bugbounty/comments/nkaz32/automation_for_bug_bounty_recon_framework/ | |
https://github.com/dirsoooo/Recon | |
https://gowthams.gitbook.io/bughunter-handbook/automation | |
Crawlers / Crawling | |
https://github.com/spatie/crawler | |
http://www.robotstxt.org/ | |
https://github.com/BruceDone/awesome-crawler | |
https://github.com/tijme/not-your-average-web-crawler | |
https://github.com/ghostlulzhacks/crawler | |
https://scotthelme.co.uk/top-1-million-analysis-march-2020/ | |
https://crawler.ninja/ | |
https://scotthelme.co.uk/top-1-million-analysis-march-2020/ | |
FINISH Watching - https://www.youtube.com/watch?v=12gtkYbMGd4&t=362s | |
HARSHBROTHA - https://www.youtube.com/watch?v=UrdvDCb4Gz8 | |
NOTIFY - https://www.youtube.com/watch?v=rbr7ZmBI9qs | |
Handle your data carefully https://www.y | |
outube.com/watch?v=rbr7ZmBI9qs | |
UserAgents | |
https://github.com/BbhunterOne/ReconChef/blob/main/recon.sh#L82 | |
Screenshots | |
https://github.com/spatie/browsershot | |
# https://github.com/maaaaz/webscreenshot | |
https://random-robbie.github.io/bugbounty-scans/ | |
https://buaq.net/go-99375.html | |
https://stackoverflow.com/questions/5258977/are-http-headers-case-sensitive?rq=1 | |
cheatsheets | |
https://0xn3va.gitbook.io/cheat-sheets/ | |
https://0xn3va.gitbook.io/cheat-sheets/web-application/http-request-smuggling | |
_ _ _ _ _ _ _ _ _ _ | |
/ \ / \ / \ / \ / \ / \ / \ / \ / \ / \ | |
( F | R | A | M | E | W | O | R | K | S ) | |
\_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ \_/ | |
* reconftw - | |
* Reconness | |
* BBHT | |
https://github.com/hahwul/WebHackersWeapons | |
https://github.com/yeswehack/pwn-machine | |
https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE | |
https://core.intrigue.io/ | |
Reconness | |
Vajra - https://github.com/r3curs1v3-pr0xy/vajra | |
Hive https://hexway.io/blog/new-update-hive/ | |
Pwnmachine | |
axiom | |
https://www.mandiant.com | |
https://github.com/AlexisAhmed/BugBountyToolkit | |
https://github.com/nahamsec/lazyrecon | |
https://github.com/yogeshojha/rengine/commit/cf30e98e0440424019cb2cad600892ce405f850e | |
https://github.com/0xInfection/TIDoS-Framework | |
https://buaq.net/go-249.html MooseDojo/apt2: automated penetration toolkit | |
_..._ | |
.-'_..._''. | |
__.....__ .' .' '.\ __.....__ . _..._ .--. _..._ | |
.-'' '. / .' .-'' '. .'| .' '. |__|.' '. .--./) | |
/ .-''"'-. `. . ' .-,.--. / .-''"'-. `. .| < | . .-. . .| .--. .-. ./.''\\ | |
/ /________\ \| | | .-. / /________\ \ .' |_ | | | ' ' | .' |_ | | ' ' | | | | | |
_ | || | | | | | |.' | | | .'''-. _ _ | | | | .' || | | | |\`-' / | |
.' |\ .-------------'. ' | | | \ .-------------'--. .-' | |/.'''. \ | ' / || | | |'--. .-'| | | | |/("'` | |
. | | '-.____...---. \ '. .| | '- \ '-.____...---. | | | / | | .' | .' || | | | | | | | | | |\ '---. | |
.'.'| |//`. .' '. `._____.-'/| | `. .' | | | | | | / | / || | | | | | |__| | | | /'""'.\ | |
.'.'.-' / `''-...... -' `-.______ / | | `''-...... -' | '.' | | | | | `'. || | | | | '.' | | | ||| || | |
.' \_.' ` |_| | / | '. | '.' .'| '/ | | | | / | | | |\'. __// | |
`'-' '---' '---'`-' `--''--' '--' `'-' '--' '--' `'---' | |
Secret Hunting - Google Dorks, Git Dorks, Employee OSINT, etc | |
https://gist.github.com/markofu/549fbd287edf08c38e869dacc740e49de | |
https://github.com/aquasecurity/cloudsploit | |
Trufflehog https://www.youtube.com/watch?v=aioheMi1Wko | |
+ --- + | |
|Tools| | |
https://sapt.medium.com/perform-information-gathering-using-following-tools-on-the-given-targets-cyber-sapiens-internship-12c858166008 | |
+Github Wiki Auditor | |
https://www.smeegesec.com/2019/03/auditing-github-repo-wikis-for-fun-and.html | |
https://github.com/SmeegeSec/GitHub-Wiki-Auditor | |
https://www.kitploit.com/2022/04/gitbleedtools-for-extracting-data-from.html | |
https://github.com/phlmox/jslinkfinderv2 | |
https://exposingtheinvisible.org/guides/google-dorking/ <---- huge dorking guide! | |
https://github.com/phlmox/bingdork | |
https://github.com/awslabs/git-secrets | |
https://github.com/toniblyx/my-arsenal-of-aws-security-tools | |
https://techvomit.net/aws-security/ | |
https://github.com/gwen001/s3-bucketsdfinder.git | |
https://github.com/phlmox/gdork | |
https://github.com/lc/secretz | |
https://github.com/kevthehermit/PasteHunter | |
+ ------ + | |
|Articles| | |
+ ------ + | |
* E.crack jwt - https://github.com/brendan-rius/c-jwt-cracker | |
Neo4j vs postgres (graphdb) | |
https://edoverflow.com/2019/ci-knew-there-would-be-bugs-here/ | |
Automation script | |
https://www.benteveo.kiwi/blog/automating-bug-bounties | |
https://github.com/AlexisAhmed/BugBountyToolkit <-- docker | |
https://gowthams.gitbook.io/bughunter-handbook/automation | |
Secret | |
https://www.directdefense.com/csrf-in-the-age-of-json/ | |
https://buaq.net/go-249.html | |
Intentionally Vulnerable Github repo | |
https://github.com/shifa123/githubleak | |
https://wiki.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contentsfff | |
https://pentestbook.six2dez.com/ | |
https://github.com/m4ll0k | |
https://github.com/six2dez | |
https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter | |
https://github.com/shifa123 | |
https://www.udemy.com/course/web-application-ethical-hacking/learn/lecture/3305350?start=0#overview | |
VPS | |
https://gist.github.com/Rajchowdhury420/24fa500ebc4edbb2018860f85f93b8cf | |
https://hackingblogs.com/bug-bounty-builder-project-tool-use/ | |
Beats - Lightweight shippers for Elasticsearch & Logstash | |
https://github.com/nicolargo/glances | |
https://github.com/intrigueio/intrigue-core/wiki/Setting-up-a-Development-Environment-%28on-Ubuntu%2C-Kali%2C-Debian%29 | |
https://www.udemy.com/course/learn-website-hacking-penetration-testing-from-scratch/learn/lecture/5878090?start=0#overview | |
Pt a website onlne https://www.youtube.com/watch?v=NQP89ish9t8 | |
https://www.trenchesofit.com/2021/06/14/bug-bounty-vps-build/ | |
https://github.com/intrigueio/intrigue-core/wiki/Setting-up-a-Development-Environment-%28on-Ubuntu%2C-Kali%2C-Debian%29 | |
https://github.com/AlexisAhmed/BugBountyToolkit <-- docker | |
### To Deploy your own | |
https://demo.ezxss.com/manage/dashboard | |
https://github.com/ssl/ezXSS/wiki/Installation | |
## BugBounty Programs | |
--- | |
https://huntr.dev/ | |
https://www.zerodayinitiative.com/ | |
https://greedybucks.medium.com/bug-bounty-programs-beginners-should-try-fe51cebe52a5 | |
https://opensourcelibs.com/lib/google-acquisitions | |
https://opensourcelibs.com/libs/bugbounty | |
List of .gov | |
Tatget crypto https://arlolra.github.io/otr/ | |
https://github.com/cisagov/dotgov-data | |
[FireBounty](https://firebounty.com) The Ultimate Vulnerability Disclosure Program. FireBounty, aggregate your bounty. | |
[Disclose.io](https://disclose.io/programs/) We're here to make vulnerability disclosure safe, simple, and standardized for everyone. | |
[Security Ninja txt valuess list](https://crawler.ninja/files/security-txt-values.txt) | |
[Security Ninja Files List](https://crawler.ninja/files/) | |
https://allabouttesting.org/ | |
Todo: | |
https://boards.greenhouse.io/cobaltio/jobs/4141074002 <--- solve challenge | |
CheatSheets | |
https://github.com/six2dez/bitup2021_subdominions/blob/main/Cheatsheet.md | |
Automated Scanners | |
* [Zeus-Scanner](https://github.com/Ekultek/Zeus-Scanner) | |
* [Dalfox](https://github.com/hahwul/dalfox) | |
* [XSSTrike](https://github.com/s0md3v/XSStrike) | |
* [SSTI-xssfinder](https://awesomeopensource.com/project/darklotuskdb/SSTI-XSS-Finder?categoryPage=47) | |
[SSTI-XSS-Finder](https://github.com/darklotuskdb/SSTI-XSS-Finder) | |
* [Learn with @DarkLotusKDB: Recon with Shodan & Spyse,XSS, Bypass OpenRedirects, SSRF, BugBunty Bot!!!](https://www.youtube.com/watch?v=66HqaFCF4Kk) | |
* https://twitter.com/0xJin/status/1470748925963513863 | |
* https://twitter.com/0xJin/status/1470748925963513863/photo/1 | |
XXE | |
https://book.hacktricks.xyz/pentesting-web/xxe-xee-xml-external-entity | |
https://app.intigriti.com/programs/dpgm/libelle/detail | |
https://web-in-security.blogspot.com/2016/03/xxe-cheat-sheet.html | |
https://twitter.com/infosec_au/status/1340785029899698181?lang=en | |
https://web-in-security.blogspot.com/2014/11/detecting-and-exploiting-xxe-in-saml.html | |
Understanding DTD-< https://web-in-security.blogspot.com/2014/11/detecting-and-exploiting-xxe-in-saml.html | |
## Owasp Top 10 | |
--- | |
https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/WhatsNew.html | |
### Clickjacking | |
https://lcamtuf.blogspot.com/2011/12/x-frame-options-or-solving-wrong.html | |
https://blog.innerht.ml/page/2/ | |
https://hackerone.com/reports/8724 | |
### CSRF | |
* https://hackerone.com/reports/44146 | |
- 7-19-16 | |
* [CSRF attack on paypal.me](https://www.youtube.com/watch?v=RjS47ojRQXk&t=5s) | |
* https://hethical.io/paypal-bug-bounty-updating-the-paypal-me-profile-picture-without-consent-csrf-attack/ | |
- 01-18-15 https://hackerone.com/reports/44146(Make API calls on behalf of another user (CSRF protection bypass)) | |
### XSS | |
Paid Services | |
https://findomain.app/#Pricing | |
## Resources | |
--- | |
Params | |
Config override using non-validated query parameter allows at least reflected XSS by injecting configuration into state | |
https://hackerone.com/reports/1082847 | |
Fuzzcon & fuzzung | |
https://twitter.com/hashtag/hacklu?src=hashtag_click | |
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/Fuzzing.md | |
Recoon | |
eiIaaefwaaa m | |
k | |
- https://kathan19.gitbook.io/howtohunt/sensitive-info-leaks/shodan_cve_dorks | |
[PrettyRecon](https://prettyrecon.com/auth/signup) | |
### Dorks | |
https://ask.fm/tags/bounty | |
### Lists | |
https://github.com/payloadbox/xss-payload-list | |
Protips and Trips | |
Most of the sites use AWS nowadays... | |
AWS localhost is 169.254.169.254 so don't use 127.0.0.1 there! | |
https://sniferl4bs.com/2017/02/wallpaper-penetration-testing-and-exploit-dev-cheatsheet/ | |
https://githubhelp.com/topic/bugbountytips | |
https://github.com/Excloudx6/open-redirect-payload-list | |
https://www.openbugbounty.org/blog/devl00p/top-100-xss-dorks/ | |
### Githubs | |
--- | |
- [Book of secret knowledge](https://github.com/ruevaughn/the-book-of-secret-knowledge) | |
- [Disclose/diodb](https://github.com/disclose/diodb) | |
- | |
### Streams | |
[Nehamsec Twitch](https://www.twitch.tv/nahamsec) | |
### Twitter Tweetin' | |
https://twitter.com/0xMstar/status/1464658472981565444{{ | |
https://twitter.com/0xJin/status/1470748925963513863 | |
podcasts | |
https://open.spotify.com/episode/2VaH6DgbghMEiaimqdxq4Q | |
### Data | |
--- | |
Bugcrowd Subdomain Enumeration https://www.youtube.com/watch?v=La3iWKRX-tE | |
CVE-2019-11510 Detail | |
/dana-na | |
## CVE/CVD | |
--- | |
CVE [2020-3452](https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter)xx | |
- https://vuls.cert.org/confluence/display/CVD/Executive+Summary | |
- https://vuls.cert.org/confluence/display/CVD/Sightings | |
https://github.com/detectify/cs-challenge | |
https://github.com/r3curs1v3-pr0xy | |
https://notsosecure.com/resources | |
https://reconshell.com/bug-bounty-tips/ | |
https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Subdomains%20Enumeration.md | |
[Insecure Deserialization Part 1](https://www.youtube.com/watch?v=SNi7gNkfLSM) | |
[Insecure Deserialization part 3](https://www.youtube.com/watch?v=icAKHE-iKOs) | |
https://secoceans.com/blog-2/ | |
https://portswigger.net/research | |
https://portswigger.net/blog | |
https://portswigger.net/news | |
https://portswigger.net/daily-swig | |
courses | |
https://www.udemy.com/course/penetration-testing-bug-bounty-hunting-level-2-hacktify/ | |
https://spongebhav.medium.com/facebook-group-members-disclosure-e53eb83df39e | |
https://github.com/six2dez/talks/blob/main/Gotta_ENG.pdf | |
packets | |
https://www.kitploit.com/2018/08/polymorph-real-time-network-packet.html | |
Automation | |
https://gowthams.gitbook.io/bughunter-handbook/automation | |
[Automated subdomain scanning with Findomain, PostgreSQL and Webhooks](https://medium.com/heck-the-packet/automated-subdomain-scanning-with-findomain-postgresql-and-webhooks-3e74ce9b5372) | |
https://pentestbook.six2dez.com/ | |
https://github.com/m4ll0k | |
https://github.com/six2dez | |
https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter | |
https://github.com/shifa123 | |
Writeups | |
## BugBounty Programs | |
--- | |
https://greedybucks.medium.com/bug-bounty-programs-beginners-should-try-fe51cebe52a5 | |
https://opensourcelibs.com/lib/google-acquisitions | |
https://opensourcelibs.com/libs/bugbounty | |
List of .gov | |
https://github.com/cisagov/dotgov-data | |
[FireBounty](https://firebounty.com) The Ultimate Vulnerability Disclosure Program. FireBounty, aggregate your bounty. | |
[Disclose.io](https://disclose.io/programs/) We're here to make vulnerability disclosure safe, simple, and standardized for everyone. | |
[Security Ninja txt valuess list](https://crawler.ninja/files/security-txt-values.txt) | |
[Security Ninja Files List](https://crawler.ninja/files/) | |
https://allabouttesting.org/ | |
CheatSheets | |
https://github.com/six2dez/bitup2021_subdominions/blob/main/Cheatsheet.md | |
### Z | |
Zap | |
https://github.com/sepehrdaddev/zap-scripts/fork | |
https://www.zaproxy.org/authors/thorin/ | |
https://github.com/zaproxy/zap-extensions | |
Frameworks | |
https://core.intrigue.io/ | |
Reconness | |
Pwnmachine | |
axiom | |
https://www.mandiant.com/ | |
https://trickest.com/ | |
(https://github.com/Findomain/Findomain/releases) | |
* [Configuing Findomain](https://www.youtube.com/watch?v=Wpm2C1LD9ns) | |
* https://github.com/findomain/findomain/blob/master/README.md#subdomains-monitoring | |
Automated Scanners | |
* [Zeus-Scanner](https://github.com/Ekultek/Zeus-Scanner) | |
* [Dalfox](https://github.com/hahwul/dalfox) | |
* [XSSTrike](https://github.com/s0md3v/XSStrike) | |
* [SSTI-xssfinder](https://awesomeopensource.com/project/darklotuskdb/SSTI-XSS-Finder?categoryPage=47) | |
[SSTI-XSS-Finder](https://github.com/darklotuskdb/SSTI-XSS-Finder) | |
* [Learn with @DarkLotusKDB: Recon with Shodan & Spyse,XSS, Bypass OpenRedirects, SSRF, BugBunty Bot!!!](https://www.youtube.com/watch?v=66HqaFCF4Kk) | |
* https://twitter.com/0xJin/status/1470748925963513863 | |
* https://twitter.com/0xJin/status/1470748925963513863/photo/1 | |
## Owasp Top 10 | |
--- | |
### Clickjacking | |
https://hackerone.com/reports/8724 | |
### CSRF | |
* https://hackerone.com/reports/44146 | |
- 7-19-16 | |
* [CSRF attack on paypal.me](https://www.youtube.com/watch?v=RjS47ojRQXk&t=5s) | |
* https://hethical.io/paypal-bug-bounty-updating-the-paypal-me-profile-picture-without-consent-csrf-attack/ | |
- 01-18-15 https://hackerone.com/reports/44146(Make API calls on behalf of another user (CSRF protection bypass)) | |
### XSS | |
Paid Services | |
https://findomain.app/#Pricing | |
## Resources | |
--- | |
[Automated subdomain scanning with Findomain, PostgreSQL and Webhooks](https://medium.com/heck-the-packet/automated-subdomain-scanning-with-findomain-postgresql-and-webhooks-3e74ce9b5372) | |
How to view someones IP address and connection speed! https://www.youtube.com/watch?v=SXmv8quf_xM | |
Recoon | |
eiIaaefwaaa m | |
k | |
- https://kathan19.gitbook.io/howtohunt/sensitive-info-leaks/shodan_cve_dorks | |
[PrettyRecon](https://prettyrecon.com/auth/signup) | |
### Dorks | |
https://ask.fm/tags/bounty | |
### Lists | |
https://github.com/payloadbox/xss-payload-list | |
### Githubs | |
--- | |
- [Book of secret knowledge](https://github.com/ruevaughn/the-book-of-secret-knowledge) | |
- [Disclose/diodb](https://github.com/disclose/diodb) | |
- | |
Active Directory | |
Penttesting Active Directory https://www.xmind.net/m/5dypm8/a | |
https://adsecurity.org/ | |
### Streams | |
[Nehamsec Twitch](https://www.twitch.tv/nahamsec) | |
Live Bug Bounty Hunting Speedbiker https://www.youtube.com/watch?v=9W94AKLc5g8 | |
### Twitter Tweetin' | |
https://twitter.com/samwcyo/status/1529888063576584202 | |
https://twitter.com/sshell_ | |
https://mobile.twitter.com/TechnoTimLive Devops tweets | |
https://mobile.twitter.com/drunkrhin0/status/1344130729320435712 | |
https://twitter.com/0xMstar/status/1464658472981565444{{ | |
https://twitter.com/0xJin/status/1470748925963513863 | |
podcasts | |
https://open.spotify.com/episode/2VaH6DgbghMEiaimqdxq4Q | |
### Data | |
--- | |
* [Disclose.io - program List Data](https://raw.githubusercontent.com/disclose/diodb/master/program-list.json) | |
CVE-2019-11510 Detail | |
/dana-na | |
## CVE/CVD | |
--- | |
CVE [2020-3452](https://github.com/darklotuskdb/CISCO-CVE-2020-3452-Scanner-Exploiter)xx | |
- https://vuls.cert.org/confluence/display/CVD/Executive+Summary | |
- https://vuls.cert.org/confluence/display/CVD/Sightings | |
https://kathan19.gitbook.io/howtohunt/subdomain-takeover/easy_methods | |
https://opensourcelibs.com/lib/google-acquisitions | |
Reverse shells | |
https://github.com/wwkenwong/Pentest-note | |
https://github.com/tehryanx?tab=repositories | |
https://github.com/sawzeeyy/Sanitiz3r | |
https://buaq.net/go-249.html | |
s | |
(https://github.com/Findomain/Findomain/releases) | |
* [Configuing Findomain](https://www.youtube.com/watch?v=Wpm2C1LD9ns) | |
* https://github.com/findomain/findomain/blob/master/README.md#subdomains-monitoring | |
https://github.com/D35m0nd142/LFISuite | |
https://hub.docker.com/u/secsi | |
tips | |
adminphpfinder | |
https://linux | |
security.expert/tools/admin-page-finder-php/ | |
Wig | |
https://linuxsecurity.expert/tools/wig/ | |
xxxzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzxΩxxxxxxxxxxx≈≈ | |
BlindElephant | |
https://linuxsecurity.expert/tools/blindelephant/alternatives/ | |
https://ronak-9889.medium.com/denial-of-service-using-cookie-bombing-55c2d0ef808c | |
IOT | |
https://www.youtube.com/watch?v=AKoyZLibIeo |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Private Programs | |
BBP (Bug Bounty Programs!) | |
https://github.com/Excloudx6/KingRecon_DOD | |
https://github.com/bughunterlabs/open-bounty-targets/blob/main/dorks.txt | |
Geico | |
https://jsfiddle.net/ruevaughn/2mnq5vgf/9/ | |
https://github.com/detectify/cs-challenge | |
'https://github.com/projectdiscovery/public-bugbounty-programs | |
https://app.intigriti.com/programs/redbull/redbull/detailhttps://gist.github.com/ruevaughn/a365c7100f8dce26e550e2e3e239e138 | |
https://huntr.dev/ | |
https://gist.github.com/ruevaughn/a365c7100f8dce26e550e2e3e239e138 | |
https://support.google.com/websearch/answer/2466433?hl=en | |
Dutch Gov - bug bounty scope https://gist.github.com/ruevaughn/f2d1157598a6156c3d51538b3fbd980c | |
https://gist.github.com/haxcited/e684df7f9ec210867d25f7ccac22c1d5 | |
https://github.com/B3nac/Android-Reports-and-Resources | |
https://hackerone.com/alipay?type=team | |
https://render.alipay.com/p/c/183ecyeztvuo/dana-pay.html | |
https://github.com/The-Art-of-Hacking/h4cker | |
Disclosure Assistance w/ Hackerone https://hackerone.com/disclosure-assistance/disclosure_assistance_requests/new?type=team | |
* [Disclose.io - program List Data](https://raw.githubusercontent.com/disclose/diodb/master/program-list.json) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Good Information https://yw9381.github.io/Burp_Suite_Doc_en_us/burp/documentation/desktop/tools/proxy/options/index.html | |
Burp Extension https://parsiya.net/blog/2019-04-06-hiding-options-an-adventure-in-dealing-with-burp-proxy-in-an-extension/ | |
Send any traffic through burp. https://github.com/jrmdev/mitm_relay | |
https://github.com/fuzz-security | |
https://www.kitploit.com/2022/06/mitmintercept-little-bit-less-hackish.html | |
https://youtu.be/cqM-MdPkaWo?t=412 <--- Burp Find and Replace rule to do vhost hopping | |
https://github.com/w0ot-net/ParamScraper | |
https://stackoverflow.com/questions/tagged/burp?tab=Votes | |
https://securityzines.gumroad.com/l/burp-plugin-dev | |
todo | |
https://www.youtube.com/watch?v=sNtxbv7nxJA&t=32s | |
https://github.com/mdsecresearch/BurpSuiteSharpener | |
https://burpbounty.net/burp-bounty-ekoparty-2020/ | |
https://parsiya.net/blog/2019-04-06-hiding-options-an-adventure-in-dealing-with-burp-proxy-in-an-extension/ | |
https://hakin9.org/blind-xss-in-practice-advanced-bug-hunting-with-burp-suite-tutorial-free-course-content/ | |
https://www.youtube.com/watch?v=KoaSRi3tmck | |
https://www.youtube.com/watch?v=35jw4dJtRz0&t=230s | |
#Eko2020 Bounty Hunters | Eduardo Garcia Melia: Burp Bounty - Scan Check Builder https://www.youtube.com/watch?v=t4caslqATi8 | |
https://tryhackme.com/room/burpsuitebasics | |
https://mrxn.net/?tag=burpsuite | |
https://github.com/topics/burp-extensions | |
https://www.youtube.com/watch?time_continue=11&v=35jw4dJtRz0&feature=emb_logo | |
https://https://www.youtube.com/watch?time_continue=11&v=35jw4dJtRz0&feature=emb_logogithub.com/Mr-xn/BurpSuite-collections | |
https://github.com/volkandindar/agartha | |
https://twitter.com/Pethuraj/status/1530773159355379712?cxt=HBwWgMCjsf-Es74qAAAA&cn=ZmxleGlibGVfcmVjcw%3D%3D&refsrc=email | |
https://github.com/BurpsuiteExtensions | |
https://github.com/Team-Firebugs/Burp-LFI-tests | |
https://github.com/1N3/IntruderPayloads | |
2018 Burp Hacks for Bounty Hunters - James Kettle shares his setup - https://www.youtube.com/watch?v=boHIjDHGmIo | |
BUG BOUNTY :- Burp Suite Bug Bounty Web Hacking learn from Scratch :- Complete Burp Suite Tutorial https://www.youtube.com/watch?v=AH1UcYwxKak | |
https://www.secureideas.com/blog/2015/08/introducing-burp-correlator.html\ | |
https://github.com/redhuntlabs/BurpSuite-Asset_Discover | |
https://github.com/m4ll0k/SecretFinder/tree/master/BurpSuite-SecretFinder | |
https://www.secureideas.com/blog/2015/05/tip-running-burpsuite-on-mac.html | |
https://osxdaily.com/2013/06/04/change-icon-mac/ | |
https://github.com/elkokc/reflector | |
https://github.com/snoopysecurity/awesome-burp-extensions | |
https://portwswigger.net/burp/documentation/desktop/functions/generate-csrf-poc | |
Jamies Kettle burp | |
https://youtu.be/boHIjDHGmIo?t=204 | |
[http pippelining in burp](https://youtu.be/boHIjDHGmIo?t=204) | |
[Wordlists in burp](https://youtu.be/boHIjDHGmIo?t=378) | |
[Grep Extract w intruder](https://youtu.be/boHIjDHGmIo?t=427) | |
[Adding your own active scan check](https://youtu.be/boHIjDHGmIo?t=543) | |
https://import.cdn.thinkific.com/359809/BurpsuiteResourcePDF-201107-173314.pdf | |
https://portswigger.net/burp/pro/video-tutorials?utm_source=burp_suite_professional&utm_medium=embedded_browser&utm_campaign=burp_support | |
Burp | |
https://portswigger.net/blog/burp-suite-professional-feature-roundup | |
https://portswigger.net/news | |
https://youtu.be/rbr7ZmBI9qs?t=278 | |
https://www.hahwul.com/2019/12/29/run-other-application-on-burp-suiteburp/ | |
https://github.com/PortSwigger | |
Burp api Tip https://youtu.be/5qSq1S2sRC8?t=731 | |
[Burp Active Scan by Jason Haddix] | |
He runs an [Active Scan using burp suite](https://youtu.be/uKWu6yhnhbQ?t=4370). He toggles 50 threads, see link for more. | |
Burp | |
https://infosecwriteups.com/leveraging-burp-suite-extension-for-finding-http-request-smuggling-2c0b5321f06d | |
burp etc https://www.youtube.com/playlist?list=PL8j1j35M7wtI4IvNS7ItrM8dTYXx2nYfX | |
echo "Burp Extensions" && echo "Burp Extension Basic Auth Decoder Bypass: https://learn.hacktify.in/courses/take/hacktify-special-chapter-1/downloads/25003636-burpsuite-decode-basic-auth-extension" >> $README | |
curl https://import.cdn.thinkific.com/359809/courses/1386931/firstextension-210608-160308.py -o $HOME/basic-auth-decoder.py | |
Burp Extensions | |
https://github.com/CoreyD97?tab=repositorwies | |
https://github.com/xnl-h4ck3r/burp-extensions/fork | |
https://github.com/xnl-h4ck3r/burp-extensions | |
https://www.kitploit.com/2019/08/iprotate-extension-for-burp-suite-which.html | |
https://github.com/InitRoot/BurpJSLinkFinder | |
https://bugbountyforum.com/tools/proxy-plugins/ Burp | |
https://github.com/arbazkiraak/BurpBLH Burp | |
https://github.com/0xDexter0us/Scavenger | |
https://github.com/danielthatcher/spydom <--- the postmessage alerts that burp is always complaining about, use this to view them. | |
Building an extension resources | |
*---> https://github.com/w0ot-net/ParamScraper/blob/master/ParamScraper.py | |
#### Burp | |
Burp Cheat Sheet https://www.sans.org/posters/burp-suite-cheat-sheet/ | |
https://www.hackingarticles.in/burp-suite-for-pentester-burps-project-management/ | |
https://github.com/Net-hunter121/API-Wordlist#usage <----- hack apis with burp | |
[Autorize](https://youtu.be/5qSq1S2sRC8?t=852) | |
https://www.kitploit.com/2022/05/graphql-threat-matrix-graphql-threat.html | |
inQL graphql Burp Extension for burp [here](https://youtu.be/5qSq1S2sRC8?t=753) | |
Extender | |
https://www.trenchesofit.com/2022/01/16/burp-suite-custom-parameter-handler/ | |
Burp | |
https://github.com/nccgroup/BurpSuiteHTTPSmuggler | |
https://portswigger.net/burp/documentation/collaborator/deploying | |
https://import.cdn.thinkific.com/359809/BurpsuiteResourcePDF-201107-173314.pdf | |
https://portswigger.net/blog/burp-suite-professional-feature-roundup | |
My Burp Extensions | |
https://portswigger.net/bappstore/aaaa60ef945341e8a450217a54a11646 | |
https://github.com/nccgroup/WCFDSer-ng | |
https://github.com/GoSecure/csp-auditor | |
https://github.com/SmeegeSec/Burp-Importer | |
Flow by Marcin Woloszyn | |
https://www.hackingarticles.in/burp-suite-for-pentester-burps-project-management/ | |
https://kalilinuxtutorials.com/nuclei-burp-plugin/ | |
oast testin g | |
https://portswigger.net/burp/application-security-testing/oast | |
https://www.udemy.com/course/web-application-ethical-hacking/learn/lecture/3305350?start=0#overview | |
https://portswigger.net/blog/a-modern-elastic-design-for-burp-collaborator-server | |
https://portswigger.net/blog/burp-suite-roadmap-for-2022 | |
https://portswigger.net/blog/burp-suite-certification-prices-hacked-for-black-friday | |
https://portswigger.net/blog/the-mystery-of-the-missing-mac-release | |
Burp Documentation https://portswigger.net/burp/documentation/desktop/functions/generate-csrf-poc | |
#### [Burp](https://gist.github.com/ruevaughn/a6da987379f5593d0ab4a878fe1b6baf/575fd3933296ea1eb734fe4e69bd99a01c6d425e#file-burp-L2) | |
**https://apps.burpsuite.guide/** | |
**https://securityzines.com/flyers/burp.html** | |
Burp api Tip https://youtu.be/5qSq1S2sRC8?t=731 | |
https://github.com/InitRoot/BurpJSLinkFinder | |
https://github.com/tristanlatr/burpa | |
https://github.com/mdsecresearch/BurpSuiteSharpener | |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Use Charles PRoxy to Reverse Engiener an IOS APp https://www.youtube.com/watch?v=cvvPLlP4518&feature=emb_logo | |
List of API Requests in Charles https://youtu.be/cvvPLlP4518?t=682 | |
Zap videos By Hawhul | |
https://www.youtube.com/watch?v=GK46fsCL7kk | |
python cors_scan.py -u example.com -p http://127.0.0.1:8080 # To use socks5 proxy, install PySocks with pip install PySocks | |
https://www.zaproxy.org/docs/developer/quick-start-build/ | |
Zap Website | |
https://www.zaproxy.org/docs/docker/about/ | |
Zap Scripts - https://github.com/sepehrdaddev/zap-scripts | |
Zap Extensin Wiki - https://github.com/zaproxy/zap-extensions/wiki | |
https://www.charlesproxy.com/ | |
torsocks proxy torsocks gitls -l user.list) or -tor op | |
https://www.kitploit.com/2022/06/mitmintercept-little-bit-less-hackish.html | |
https://www.telerik.com/fiddler | |
http://tinyproxy.github.io/ | |
https://unix.stackexchange.com/questions/36627/how-to-telnet-via-proxy-authentication | |
https://mitmproxy.org/ | |
https://github.com/abhinavsingh/proxy.py | |
https://blog.intigriti.com/2021/05/05/bug-bytes-121-free-burp-collaborator-alternative-hacking-chrome-extensions-28k-facebook-oauth-account-takeover/ |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment