reconftw
Resources-for-Beginner-Bug-Bounty-Hunters
reconftw | Resources-for-Beginner-Bug-Bounty-Hunters | |
---|---|---|
3 | 5 | |
5,242 | 10,157 | |
- | - | |
9.2 | 2.9 | |
11 days ago | 3 months ago | |
Shell | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
reconftw
- Automated recognition frameworks?
-
I made a CLI that streamlines Ethical Hacking workflow
Checkout ReconFTW
-
Tools for subdomain brute forcing
reconFTW = https://github.com/six2dez/reconftw
Resources-for-Beginner-Bug-Bounty-Hunters
- Getting started with bb journey
-
Cyber Security resources
Media Resources
- Bug Bounty Resources
-
What is your favorite resource for becoming a better bug bounty hunter?
NahamSec's bug bounty beginner repo
-
Whats A Good Online Resource To Learn About Web
Nahamsec's beginner repo https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
What are some alternatives?
LazyRecon - An automated approach to performing recon for bug bounty hunting and penetration testing.
awesome-ethical-hacking-resources - 😎 🔗 Awesome list about all kinds of resources for learning Ethical Hacking and Penetration Testing.
Sn1per - Attack Surface Management Platform
Awesome-Hacking - A collection of various awesome lists for hackers, pentesters and security researchers
Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed - This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.
offensive-docker - Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Goohak - Automatically Launch Google Hacking Queries Against A Target Domain
OSCP-Prep
ReconPi - ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.
diodb - Open-source vulnerability disclosure and bug bounty program database
hackerone-reports - Top disclosed reports from HackerOne
study-bug-bounty - Beginner Guide to Bug Hunting