Resources-for-Beginner-Bug-Bounty-Hunters
reconftw
Resources-for-Beginner-Bug-Bounty-Hunters | reconftw | |
---|---|---|
5 | 3 | |
10,157 | 5,242 | |
- | - | |
2.9 | 9.2 | |
3 months ago | 14 days ago | |
Shell | ||
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Resources-for-Beginner-Bug-Bounty-Hunters
- Getting started with bb journey
-
Cyber Security resources
Media Resources
- Bug Bounty Resources
-
What is your favorite resource for becoming a better bug bounty hunter?
NahamSec's bug bounty beginner repo
-
Whats A Good Online Resource To Learn About Web
Nahamsec's beginner repo https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
reconftw
- Automated recognition frameworks?
-
I made a CLI that streamlines Ethical Hacking workflow
Checkout ReconFTW
-
Tools for subdomain brute forcing
reconFTW = https://github.com/six2dez/reconftw
What are some alternatives?
awesome-ethical-hacking-resources - 😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.
LazyRecon - An automated approach to performing recon for bug bounty hunting and penetration testing.
Awesome-Hacking - A collection of various awesome lists for hackers, pentesters and security researchers
Sn1per - Attack Surface Management Platform
offensive-docker - Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed - This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
OSCP-Prep
Goohak - Automatically Launch Google Hacking Queries Against A Target Domain
diodb - Open-source vulnerability disclosure and bug bounty program database
ReconPi - ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
study-bug-bounty - Beginner Guide to Bug Hunting
hackerone-reports - Top disclosed reports from HackerOne