A comprehensive curated list of available bug bounty amp disclosure programs and write ups git hub djadmin awesome bug bounty a comprehensive curated list of available bug bounty amp discl
Inspired by https github com djadmin awesome bug bounty a list of bug bounty write up that is categorized by the bug nature git hub ngalongc bug bounty reference inspired by https github c
An information security reference that doesn 39 t suck https rmusser net git admin 2 infosec reference for non ms git hosted version git hub rmusser01 infosec reference an information secu
A command kill chain consists of payload delivery code execution on a target system and establishing a command and control c2 channel outside of a network there are many ways to achieve each of these steps for example microsoft office macro for delivery power shell for code execution and http
Domato is a dom fuzzer developed by ifsecure it has a generation engine inside that when given grammar rule engine automatically generates codes which can be used as input to crash your target while trying to write my own grammar rule for my fuzzing target i got curious of how it is implement
Xxe valid use case this is a nonmalicious example of how external entities are used xml version 1 0 standalone no doctype copyright element copyright pcdata entity c system http www xmlwriter net copyright xml copyright c copyright resource https xmlwriter net x
This is a real story or not that occured in mid 2017 or not about a private program or not on hackerone or not believe me or not but it changed my life i would like to thanks all the people from this company i talked with they were very nice with me very fast to fix the bugs and i always got
Subscribe to get resources directly to your inbox. You won't receive any spam! ✌️