🤬
  • ■ ■ ■ ■ ■
    CONTRIBUTORS.md
    1 1  A Big Thank You to the Main-Contributors of the Repo:<br>
    2 2  Securibee<br>
    3  -Nahamsec<br>
     3 +NahamSec<br>
    4 4  AshF0x<br>
    5  -Cody Brocious (@daeken)<br>
     5 +daeken<br>
    6 6   
    7 7  and of course everyone else who sends in suggestions for the repo itself <3
     8 + 
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 5 lines
    6 6   
    7 7  We understand that there are more resources other than the ones we have listed and we hope to cover more resources in the near future!<br>
    8 8   
    9  -## Current Version: 2020.08
     9 +If you are interested in learning about top bug bounty hunters in the community check out my [Live Recon VODs](https://www.youtube.com/playlist?list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA).
     10 +## Current Version: 2020.12
    10 11   
    11  -[Changelog: See what's new!](/assets/changelog.md) 📣
    12 12   
    13 13  ---
    14 14  ## Table of Contents
    skipped 2 lines
    17 17  - [Setup](/assets/setup.md)
    18 18  - [Tools](/assets/tools.md)
    19 19  - [Labs & Testing Environments](/assets/labs.md)
     20 +- [Talks](/assets/talks.md)
    20 21  - [Vulnerability Types](/assets/vulns.md)
    21 22  - [Mobile Hacking](/assets/mobile.md)
    22 23  - [Smart Contracts](/assets/smartcon.md)
    skipped 5 lines
    28 29  - [Mindset & Mental Health](/assets/health.md)
    29 30   
    30 31  ---
    31  -If you have more questions or suggestions, check our [NahamSec's Discord](https://discord.gg/9jZxjQ5)!<br>
     32 +If you have more questions or suggestions, check out [NahamSec's Discord](https://discord.gg/9jZxjQ5)!<br>
    32 33  Also, feel free to check out the other resources:
    33  -- Nahamsec on [YouTube](https://www.youtube.com/channel/UCCZDt7MuC3Hzs6IH4xODLBw) and on [Twitch](https://www.twitch.tv/nahamsec)
     34 +- Nahamsec on [YouTube](https://www.youtube.com/NahamSec) and on [Twitch](https://www.twitch.tv/nahamsec)
    34 35   
  • ■ ■ ■ ■ ■ ■
    assets/basics.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  - 
    4 3  ## Basics 🤓
    5 4   
    6 5  ### Table of Contents
    skipped 2 lines
    9 8  3. [Networking basics](#Networking-basics)
    10 9  4. [Programming Basics](#Programming-Basics)
    11 10  5. [Automation](#Automation)
    12  -6. [Computing Fundamentals](#Computing-Fundamentals)
     11 +6. [Linux basics](#Linux-Basics)
     12 +7. [Web Server Basics](#Web-Server-Basics)
     13 +8. [Computing Fundamentals](#Computing-Fundamentals)
     14 +9. [Hacking Basics](#Hacking-Basics)
    13 15   
    14 16  ### Stanford CS 253 Web Security
    15  - 
    16 17  - [Stanford CS 253 Web Security](https://web.stanford.edu/class/cs253/) - by [@feross](https://twitter.com/feross)
    17 18   - "This course is a comprehensive overview of web security. The goal is to build an understanding of the most common web attacks and their countermeasures. Given the pervasive insecurity of the modern web landscape, there is a pressing need for programmers and system designers to improve their understanding of web security issues."
    18 19   
    19 20  ### HTTP basics
    20 21  In order to be able to learn what and how an application works, you need to be able to understand how you are communicating with it. This section is dedicated to all the resources to understand the HTTP basics.
    21  -- All in one resource: https://www.hacker101.com/sessions/web_in_depth
     22 +- [All in one resource](https://www.hacker101.com/sessions/web_in_depth)
    22 23   - HTTP basics
    23 24   - Cookie security
    24 25   - HTML parsing
    skipped 1 lines
    26 27   - Encoding sniffing
    27 28   - Same-Origin Policy
    28 29   - CSRF (Cross-Site Request Forgery)
    29  -- Request form
    30  -https://www.tutorialspoint.com/http/http_requests.htm
    31  -- Response form
    32  -https://www.tutorialspoint.com/http/http_responses.htm
    33  -- Response codes
    34  -https://www.tutorialspoint.com/http/http_status_codes.htm
    35  -- URL Encoding
    36  -https://www.tutorialspoint.com/http/http_url_encoding.htm
     30 +- [Request form](https://www.tutorialspoint.com/http/http_requests.htm)
     31 +- [Response form](https://www.tutorialspoint.com/http/http_responses.htm)
     32 +- [Response codes](https://www.tutorialspoint.com/http/http_status_codes.htm)
     33 +- [URL Encoding](https://www.tutorialspoint.com/http/http_url_encoding.htm)
    37 34   
    38 35   
    39 36  ### Networking basics
    40 37  Recon is a common terminology used in bug bounties. It’s great if you are already using tools to scan a range of IPs for open ports or find subdomain, however, you should first understand why these things matter and how they work.
    41  -- Terminology
    42  -https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols
    43  -- What is an IP?
    44  -https://commotionwireless.net/docs/cck/networking/learn-networking-basics/
    45  -- What are ports?
    46  -https://www.utilizewindows.com/list-of-common-network-port-numbers/
    47  -- What is DNS?
    48  -https://code.tutsplus.com/tutorials/an-introduction-to-learning-and-using-dns-records--cms-24704
    49  -- Intermediate Security Testing with Kali Linux 2
    50  -http://www.penguintutor.com/linux/basic-network-reference
     38 +- [Terminology](https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols)
     39 +- [What is an IP?](https://commotionwireless.net/docs/cck/networking/learn-networking-basics/)
     40 +- [What are ports?](https://www.utilizewindows.com/list-of-common-network-port-numbers/)
     41 +- [What is DNS?](https://code.tutsplus.com/tutorials/an-introduction-to-learning-and-using-dns-records--cms-24704)
     42 +- [Intermediate Security Testing with Kali Linux 2](http://www.penguintutor.com/linux/basic-network-reference)
    51 43  - [Network Fundamentals](https://www.youtube.com/playlist?list=PLDQaRcbiSnqF5U8ffMgZzS7fq1rHUI3Q8), A 19 part Video Series about Networking well explained for Beginners
    52 44   
    53 45   
    54 46  ### Programming Basics
    55 47  Being a great programmer is not a requirement to be a successful hacker. However, having the ability to make an educated guess, may increase your chances of successfully identifying and exploiting an issue. In a number of cases, you may need to automate your work or know more than just the “basics” in order to escalate a bug with a medium severity to high/critical.
    56  - 
    57  -- HTML: HTML is very easy to learn and there are a ton of free resources for it. If you are interested in learning about XSS this should be your first step.
    58  -If you prefer an interactive tool to learn about Javascript, I highly recommend Codecademy!
    59  -https://www.codecademy.com/learn/learn-html
    60  -https://www.w3schools.com/html/
    61  - 
    62  -- JavaScript: Once you have familiarized yourself with HTML, you should understand Javascript since you will be using it to exploit XSS vulnerabilities. The usage of Javascript isn’t just limited to when you are exploring XSS, so it’s a very handy programming language to know.
    63  -If you prefer an interactive tool to learn about Javascript, I highly recommend Codecademy! https://www.codecademy.com/learn/introduction-to-javascript
    64  - 
     48 +- HTML: HTML is very easy to learn and there are a ton of free resources for it. If you are interested in learning about XSS this should be your first step. If you prefer an interactive tool to learn about JavaScript, I highly recommend [Codecademy](http://ssqt.co/mQfH8zl) or [W3Schools](https://www.w3schools.com/html/)!
     49 +- JavaScript: Once you have familiarized yourself with HTML, you should understand JavaScript since you will be using it to exploit XSS vulnerabilities. The usage of JavaScript isn’t just limited to when you are exploring XSS, so it’s a very handy programming language to know.
     50 +If you prefer an interactive tool to learn about JavaScript, I highly recommend [CodeCademy](http://ssqt.co/mQfH8zl)!
    65 51  - SQL: You may have guessed It already, but you won’t be able to exploit complex SQL injection vulnerabilities before having any SQL knowledge.
    66  -As always, if you prefer an interactive course, feel free to use Codecademy!
     52 +As always, if you prefer an interactive course, feel free to use [CodeCademy](http://ssqt.co/mQfH8zl)!
    67 53  https://www.codecademy.com/learn/learn-sql
    68 54  http://www.sqlcourse.com/
    69 55   
    skipped 13 lines
    83 69   - https://docs.python.org/3/tutorial/
    84 70   - http://www.sqlcourse.com/
    85 71   - https://en.wikibooks.org/wiki/Programming_Fundamentals/Advanced_Flowcharting
     72 +- PHP
     73 + - https://php.net
     74 + 
     75 +### Web Server Basics
     76 +If you are looking into getting started with Bug Bounties with a focus on web, I highly recommend learning the nuts and bolts of what make a website work.
     77 + 
     78 +- [Installing Apache, MySQL, PHP on Windows 10](https://codebriefly.com/how-to-setup-apache-php-mysql-on-windows-10/)
     79 +- [Installing Apache, MySQL, PHP on Ubuntu](https://www.digitalocean.com/community/tutorials/how-to-install-linux-apache-mysql-php-lamp-stack-ubuntu-18-04)
     80 +- [Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation](https://www.youtube.com/watch?v=YhUiAH5SIqk)
     81 + 
     82 +After creating your own web server, I highly recommend installing a CMS (like Wordpress or drupal) on your localhost to understand how it all works.
     83 + 
     84 +### Linux Basics
     85 +- [Install WSL on Windows 10](https://ubuntu.com/wsl)
     86 +- [Basics Linux Commands](https://www.hostinger.com/tutorials/linux-commands)
     87 +- [How to use curl](https://flaviocopes.com/http-curl/)
     88 +- [Loops](https://tldp.org/HOWTO/Bash-Prog-Intro-HOWTO-7.html)
     89 +- [xargs](https://www.cyberciti.biz/faq/linux-unix-bsd-xargs-construct-argument-lists-utility/)
    86 90   
    87 91  ### Computing Fundamentals
    88 92  - [Hopper's Roppers Computing Fundamentals](https://www.hoppersroppers.org/course.html)
    89 93   - This free course teaches the absolute basics of Linux, hardware, networking, operating systems, and scripting. Designed to get a complete beginner over the first big learning hurdles and so they can move on to anything else and succeed.
    90 94  - [Exeter Q-Step Resources](https://exeter-qstep-resources.github.io/)
    91 95   - Here, you will find a range of teaching materials that have been developed by members of the Q-Step Centre. If you have any questions, please contact [email protected] or [email protected]. Details of Q-Step workshops and events can be found at https://socialsciences.exeter.ac.uk/q-step/events.
     96 + 
     97 +### Bug Bounty Basics
     98 +- [Bug bounty reports that stand out, how to write one?](https://thehackerish.com/bug-bounty-reports-that-stand-out-how-to-write-one/)
     99 +- [Bug Bounty Report Templates by @ZephrFish](https://github.com/ZephrFish/BugBountyTemplates/blob/master/Blank.md)
     100 +- [Hacker101- Writing Good Reports](https://www.youtube.com/watch?v=z60CFFFyZWE)
     101 +- [List of Bug Bounty Platforms](https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/bugbountyplatforms.md)
     102 +- [Bug Bounty Cheatsheet](https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html)
     103 +- [HOW TO GET STARTED IN BUG BOUNTY](https://www.youtube.com/watch?v=CU9Iafc-Igs)
    92 104   
    93 105  ---
    94 106  back to [Intro Page](/README.md)
    skipped 1 lines
  • ■ ■ ■ ■ ■ ■
    assets/blogposts.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
     2 +This page is designated to hosts blog posts on particular vulnerability and techniques that have led to a bounty. If you would like to learn more about specific vulnerability types, please visit [Vulnerability Types](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/assets/vulns.md)!
     3 + 
     4 +## NahamSec's Favorite Blogs & Reading Material
     5 +- [HackerOne Hacktivity](https://hackerone.com/hacktivity)
     6 +- [Bugcrowd Crowdstream](https://bugcrowd.com/crowdstream)
     7 +- [Alex Champman](https://ajxchapman.github.io/)
     8 +- [The Daily Swig](https://portswigger.net/daily-swig)
     9 +- [Deesee](https://blog.deesee.xyz/)
     10 +- [EdOverflow](https://edoverflow.com/)
     11 +- [Jon Bottarini](https://jonbottarini.com/)
     12 +- [Allyon O'Malley](http://www.allysonomalley.com/)
     13 +- [Orange Tsai](https://blog.orange.tw/)
     14 +- [Philippe Harewood](https://philippeharewood.com/)
     15 +- [Ron Chan](https://ngailong.wordpress.com)
     16 +- [Shubham Shah](https://shubs.io/)
     17 +- [spaceraccoon](https://spaceraccoon.dev)
     18 +- [ziot](https://buer.haus/)
     19 +- [zlz](https://samcurry.net/blog)
     20 +- [Vickie Li](https://vickieli.medium.com)
     21 + 
     22 +### Reddit
     23 +- [/r/BugBounty](https://reddit.com/r/bugbounty)
     24 +- [r/websecurityresearch/](https://www.reddit.com/r/websecurityresearch/)
     25 +- [r/howtohack](https://reddit.com/r/howtohack)
     26 +- [r/netsec](https://reddit.com/r/netsec)
     27 +- [r/netsecstudents](https://reddit.com/r/netsecstudents)
     28 + 
    2 29   
    3 30  ## Blog posts & Disclosed Reports 📝
    4 31  A collection of Blog Posts ordered by Vulnerability Types
    skipped 2 lines
    7 34   - [DOM XSS](#DOM-XSS)
    8 35   - [Stored XSS](#Stored-XSS)
    9 36  - [SSRF](#SSRF)
    10  -- [Vulnerability Scanning](#Vulnerability-Scanning)
    11 37  - [Token / Authentication](#Token-/-Authentication)
    12 38  - [SQL Injection](#SQL-Injection)
    13  -- [Mobile](#Mobile)
    14  - - [iOS](#iOS)
    15  - - [Android](#Android)
    16 39  - [HTTP Desync](#HTTP-Desync)
    17 40  - [File Upload](#File-Upload)
    18  -- [Automation](#Automation)
    19  -- [Buffer Overflow](#Buffer-Overflow)
    20 41  - [IDOR](#IDOR)
    21 42  - [GraphQL](#GraphQL)
    22 43  - [RCE](#RCE)
    skipped 1 lines
    24 45  - [Smart Contracts](#Smart-Contracts)
    25 46  - [API](#API)
    26 47  - [Misc](#Misc)
     48 +- [Mobile](#Mobile)
     49 + - [iOS](#iOS)
     50 + - [Android](#Android)
    27 51  ---
    28 52  ## Starting out & Tips
    29 53  - [Basic Bug Bounty FAQ](http://blog.oath.ninja/basic-bug-bounty-faq/) - by [@thedawgyg](https://twitter.com/thedawgyg)
    skipped 1 lines
    31 55  - [WTF is a Bug Bounty?](https://www.ceos3c.com/hacking/ethical-hacking-diaries-1-wtf-is-a-bug-bounty/) - by ceos3c
    32 56  - [How to Set up Certificate-Based SSH for Bug Hunting](https://medium.com/@c0ldbr3w/how-to-set-up-certificate-based-ssh-for-bug-hunting-bonus-ef4af95fca05) - by Mack Staples
    33 57  - [XSS in Google Colaboratory + CSP bypass](https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html) by Michał Bentkowski
    34  -- [Zseano’s notes on hacking & mentoring](https://blog.intigriti.com/2020/04/29/bug-business-3-zseanos-notes-on-hacking-mentoring/) by Intigriti & Zseano
    35  -- [MY BUG BOUNTY JOURNEY!](https://www.youtube.com/watch?v=ug7FzoByLFc) by Farah Hawa
     58 +- [zseano’s notes on hacking & mentoring](https://blog.intigriti.com/2020/04/29/bug-business-3-zseanos-notes-on-hacking-mentoring/) by Intigriti & Zseano
     59 + 
    36 60  ## XSS
    37 61  You can find a ton of awesome XSS reports by searching through the HackerOne Hacktivity Page (https://hackerone.com/hacktivity?querystring=XSS). Here are some more complex and some of my favorite XSS related blog posts:
    38  - 
    39  -- [XSS on Google Search - Sanitizing HTML in The Client?](https://www.youtube.com/watch?v=lG7U3fuNw3A) - LiveOverflow
    40  - - [The Fix](https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa)
    41 62  - [Cracking my windshield and earning $10,000 on the Tesla Bug Bounty Program](https://samcurry.net/cracking-my-windshield-and-earning-10000-on-the-tesla-bug-bounty-program/) - [Sam Curry](https://twitter.com/samwcyo)
    42 63  - [Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty](https://medium.com/bugbountywriteup/effortlessly-finding-cross-site-script-inclusion-xssi-jsonp-for-bug-bounty-38ae0b9e5c8a) - [@th3_hidd3n_mist](https://twitter.com/th3_hidd3n_mist)
    43 64  - [Microsoft Edge (Chromium) - EoP via XSS to Potential RCE](https://leucosite.com/Edge-Chromium-EoP-RCE/) - [@Qab](https://twitter.com/qab)
    44 65  - [Reflected XSS in https://blocked.myndr.net](https://hackerone.com/reports/824433) - Thilakesh
    45 66  - [Google Bug Bounty Writeup- XSS Vulnerability](https://pethuraj.com/blog/google-bug-bounty-writeup/) - [@itsmepethu](https://twitter.com/itsmepethu)
    46  -- [How to solve the INTIGRITI Easter XSS challenge using only Chrome Devtools](https://www.youtube.com/watch?v=IhPsBMBDFcg) - by STÖK
    47 67  - [Found Stored Cross-Site Scripting — What’s Next? — Privilege Escalation like a Boss](https://medium.com/bugbountywriteup/found-stored-cross-site-scripting-whats-next-privilege-escalation-like-a-boss-d-8fb9e606ce60) - by Harsh Bothra
    48 68  - [Bypassing WAF to perform XSS](https://medium.com/bugbountywriteup/bypassing-waf-to-perform-xss-2d2f5a4367f3) - by Kleitonx00
    49  - 
     69 +- [Facebook DOM Based XSS using postMessage](https://ysamm.com/?p=493)
    50 70   
    51 71  ### DOM XSS
    52 72  - [Persistent DOM-based XSS in https://help.twitter.com via localStorage](https://hackerone.com/reports/297968) - harisec
    skipped 10 lines
    63 83  - [Account Recovery XSS](https://sites.google.com/site/bughunteruniversity/best-reports/account-recovery-xss) - Gábor Molnár
    64 84   
    65 85  ## SSRF
    66  -- [DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server Side Request Forgery](https://www.youtube.com/watch?v=o-tL9ULF0KI)<br>- Nahamsec & daeken | DEFCON 2019
    67 86  - [Piercing The Veil: Server Side Request Forgery Attacks On Internal Networks](https://peertube.opencloud.lu/videos/watch/40f39bfe-6d3c-40f5-bcab-43f20944ca6a)<br>- Alyssa Herrera | Hack.lu 2019
     87 +- [Pivoting from blind SSRF to RCE with HashiCorp Consul](https://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html)
    68 88  - [Vimeo upload function SSRF](https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437) - Sayed Abdelhafiz
    69 89  - [Piercing the Veal](https://medium.com/@d0nut/piercing-the-veal-short-stories-to-read-with-friends-4aa86d606fc5) - by d0nut
     90 +- [CVE-2020-13379 - Unauthenticated Full-Read SSRF in Grafana](https://rhynorater.github.io/CVE-2020-13379-Write-Up)
    70 91  - [MY EXPENSE REPORT RESULTED IN A SERVER-SIDE REQUEST FORGERY (SSRF) ON LYFT](https://www.nahamsec.com/posts/my-expense-report-resulted-in-a-server-side-request-forgery-ssrf-on-lyft) - by nahamsec
    71  - 
    72  - 
    73  -## Vulnerability Scanning
    74  -- [NMAP For Vulnerability Discovery](https://www.peerlyst.com/posts/nmap-for-vulnerability-discovery-sachin-wagh) - Sachin Wagh
     92 +- [How I found SSRF on TheFacebook.com](https://w00troot.blogspot.com/2017/12/how-i-found-ssrf-on-thefacebookcom.html)
     93 +- [How I made $31500 by submitting a bug to Facebook](https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204)
     94 +- [A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!](https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf)
    75 95   
    76 96  ## Token / Authentication
    77 97  - [Abusing feature to steal your tokens](https://medium.com/@rootxharsh_90844/abusing-feature-to-steal-your-tokens-f15f78cebf74) - Harsh Jaiswal
    78 98  - [How I was able to bypass OTP code requirement in Razer [The story of a critical bug]](https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572?) - Ananda Dhakal
    79 99  - [Bypassing GitHub's OAuth flow](https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html) - [@not_aardvark](https://twitter.com/not_aardvark)
     100 +- [NMAP For Vulnerability Discovery](https://www.peerlyst.com/posts/nmap-for-vulnerability-discovery-sachin-wagh) - Sachin Wagh
    80 101  - [Subdomain Takeover to Authentication bypass](https://hackerone.com/reports/335330) - by geekboy
    81 102  - [Ability to know the presence of a person in a private event even if the guest list is hidden.](https://bugreader.com/index.php?pageNav=vivekps143%40193) - by [Vivek PS](https://bugreader.com/vivekps143)
     103 +- [Zero-day in Sign in with Apple](https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple/)
    82 104   
    83 105   
    84 106  ## SQL Injection
    skipped 4 lines
    89 111  - [Blind SQL Injection on windows10.hi-tech.mail.ru](https://hackerone.com/reports/786044) - Просто душка (api_0)
    90 112  - [How to Hack Database Links in SQL Server!](https://blog.netspi.com/how-to-hack-database-links-in-sql-server/) - Antti Rantasaari
    91 113   
    92  -## Mobile
    93  -### iOS
    94  -- [From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13](https://spaceraccoon.dev/from-checkra1n-to-frida-ios-app-pentesting-quickstart-on-ios-13) - spaceraccoon
    95  -### Android
    96  -- [A deep dive into reversing Android pre-Installed apps](https://github.com/maddiestone/ConPresentations/blob/master/Blackhat2019.SecuringTheSystem.pdf) and the [BlackHat Talk](https://www.youtube.com/watch?v=U6qTcpCfuFc) - Maddie Stone
    97  - 
    98 114  ## HTTP Desync
    99 115  - [HTTP Desync Attacks: Request Smuggling Reborn](https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn) in combination with this [report](https://hackerone.com/reports/510152) - [James Kettle](https://twitter.com/albinowax)
    100 116  - [HTTP Request Smuggling on vpn.lob.com](https://hackerone.com/reports/694604) - 0X0 (painreigns)
    skipped 5 lines
    106 122  - [A Tale of Exploitation in Spreadsheet File Conversions](https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/) - [@bbuerhaus](https://twitter.com/bbuerhaus)//[@daeken](https://twitter.com/daeken)//[@erbbysam](https://twitter.com/erbbysam)//[@smiegles](https://twitter.com/smiegles)
    107 123  - [External XML Entity via File Upload (SVG)](https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/) - by 0xatul
    108 124   
    109  - 
    110  -## Automation
    111  -- [Fasten your Recon process using Shell Scripting](https://medium.com/bugbountywriteup/fasten-your-recon-process-using-shell-scripting-359800905d2a) - Mohd Shibli
    112  -- [Beginner’s Guide to recon automation](https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb) - Ashish Jha
    113  -- [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - STÖK & Fisher
    114  -- [gitGraber: A tool to monitor GitHub in real-time to find sensitive data](https://blog.yeswehack.com/2019/10/08/gitgraber-a-tool-to-monitor-github-in-real-time-to-find-sensitive-data/) - by [@adrien_jeanneau](https://twitter.com/adrien_jeanneau) & [@R_Marot](https://twitter.com/R_marot)
    115  - 
    116  -## Buffer Overflow
    117  -- [Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty](https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/) - [Sam Curry](https://twitter.com/samwcyo)
    118  -- [Writing a Simple Buffer Overflow Exploit](https://www.youtube.com/watch?v=oS2O75H57qU) - LiveOverflow
    119  - 
    120 125  ## IDOR
    121 126  - [Steal Earning of Airbnb hosts by Adding Bank Account/Payment Method](https://www.indoappsec.in/2019/12/airbnb-steal-earning-of-airbnb-hosts-by.html) - [Vijay Kumar ](https://twitter.com/IndoAppSec)
    122 127  - [GraphQL IDOR leads to information disclosure](https://medium.com/@R0X4R/graphql-idor-leads-to-information-disclosure-175eb560170d) - [@R0X4R](https://twitter.com/R0X4R)
    123 128  - [From Multiple IDORs leading to Code Execution on a different Host Container](https://www.rahulr.in/2019/10/idor-to-rce.html?m=1) - [@Rahul_R95](https://twitter.com/Rahul_R95)
    124 129  - [Automating BURP to find IDORs](https://medium.com/cyberverse/automating-burp-to-find-idors-2b3dbe9fa0b8) - [Aditya Soni](https://medium.com/@hetroublemakr)
    125  -- [Another image removal vulnerability on Facebook](https://blog.darabi.me/2020/06/image-removal-vulnerability-on-facebook.html) - by Pouya
     130 +- [Another image removal vulnerability on Facebook](https://blog.darabi.me/2020/06/image-removal-vulnerability-on-facebook.html)
     131 +- [Stealing Your Private YouTube Videos, One Frame at a Time](https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/)
    126 132   
    127 133  ## GraphQL
    128 134  - [Private System Note Disclosure using GraphQL](https://hackerone.com/reports/633001) - Ron Chan
    skipped 4 lines
    133 139  - [My First RCE (Stressed Employee gets me 2x bounty)](https://medium.com/@abhishake100/my-first-rce-stressed-employee-gets-me-2x-bounty-c4879c277e37) - [Abhishek Yadav](https://medium.com/@abhishake100)
    134 140  - [How dangerous is Request Splitting, a vulnerability in Golang or how we found the RCE in Portainer and hacked Uber](https://medium.com/@andrewaeva_55205/how-dangerous-is-request-splitting-a-vulnerability-in-golang-or-how-we-found-the-rce-in-portainer-7339ba24c871) - by Andrewaeva
    135 141   
    136  -## Recon
     142 +## Automation & Recon
     143 +- [How to: Recon & Content Discovery](https://www.hackerone.com/blog/how-to-recon-and-content-discovery)
    137 144  - [Subdomain Recon Using Certificate Search Technique](https://www.r00tpgp.com/2020/01/subdomain-recon-using-certificate.html?m=0)
    138  -- [Notes about Nahamsecs Recon Sessions](https://mavericknerd.github.io/knowledgebase/nahamsec/recon_session_1/) - [maverickNerd](https://github.com/maverickNerd)
     145 +- [Notes about NahamSec's Recon Sessions](https://mavericknerd.github.io/knowledgebase/nahamsec/recon_session_1/) - [maverickNerd](https://github.com/maverickNerd)
    139 146  - [10 Recon Tools For Bug Bounty](https://medium.com/@hackbotone/10-recon-tools-for-bug-bounty-bafa8a5961bd) - Anshuman Pattnaik
    140 147  - [Recon: Create a methodology and start your subdomain enumeration](https://failednuke.info/2020/recon-create-a-methodology-and-start-your-subdomain-enumeration/) - by FailedNuke
    141 148  - [THEY SEE ME SCANNIN’, THEY HATIN’: A BEGINNER’S GUIDE TO NMAP](https://securityqueens.co.uk/they-see-me-scannin-they-hatin-a-beginners-guide-to-nmap/) - by Sophia (https://twitter.com/SecQueens)
     149 +- [Fasten your Recon process using Shell Scripting](https://medium.com/bugbountywriteup/fasten-your-recon-process-using-shell-scripting-359800905d2a) - Mohd Shibli
     150 +- [Beginner’s Guide to recon automation](https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb) - Ashish Jha
     151 +- [gitGraber: A tool to monitor GitHub in real-time to find sensitive data](https://blog.yeswehack.com/2019/10/08/gitgraber-a-tool-to-monitor-github-in-real-time-to-find-sensitive-data/) - by [@adrien_jeanneau](https://twitter.com/adrien_jeanneau) & [@R_Marot](https://twitter.com/R_marot)
    142 152   
    143 153  ## Smart Contracts
    144 154  - [Steal collateral during `end` process, by earning DSR interest after `flow](https://hackerone.com/reports/672664)(Listed as Business Logic Error)
    skipped 1 lines
    146 156   
    147 157  ## API
    148 158  - [31 Days of API Security Tips](https://github.com/smodnix/31-days-of-API-Security-Tips) - [smodnix](https://github.com/smodnix)
     159 +- [Exploiting Application-Level Profile Semantics (APLS)](https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/)
    149 160   
    150 161  ## Misc
    151 162  - [Hacking GitHub with Unicode's dotless 'i'](https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/)
    skipped 2 lines
    154 165  - [Cracking reCAPTCHA, Turbo Intruder style](https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style) - James Kettle
    155 166  - [Abusing ImageMagick to obtain RCE](https://strynx.org/imagemagick-rce/) - [strynx](https://strynx.org/)
    156 167  - [How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN](https://blog.detectify.com/2019/09/19/alyssa-herrera-pulse-corporate-networks-ssl-vpn/) - [Alyssa Herrera](https://twitter.com/Alyssa_Herrera_)
    157  -- [2 Cases of Path Traversal](https://jlajara.gitlab.io/posts/2020/03/29/Path_Traversal.html) by [@leonishan_](https://twitter.com/leonishan_)
    158 168  - [Top 10 web hacking techniques of 2019](https://portswigger.net/research/top-10-web-hacking-techniques-of-2019) by [James Kettle](https://twitter.com/albinowax)
    159 169  - [Understanding Search Syntax on Github](https://help.github.com/en/github/searching-for-information-on-github/understanding-the-search-syntax#exclude-certain-results) by Github
    160 170  - [URL link spoofing (Slack)](https://hackerone.com/reports/481472) by Akaki Tsunoda (akaki)
    161 171  - [Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts](https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts/) by Sam Curry
    162 172  - [The Secret sauce of bug bounty](https://medium.com/bugbountywriteup/the-secret-sauce-of-bug-bounty-bdcc2e2d45af) by Mohamed Slamat
     173 +- [Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty](https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/) - [Sam Curry](https://twitter.com/samwcyo)
     174 +## Mobile
     175 +### iOS
     176 +- [From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13](https://spaceraccoon.dev/from-checkra1n-to-frida-ios-app-pentesting-quickstart-on-ios-13) - spaceraccoon
     177 +### Android
     178 +- [A deep dive into reversing Android pre-Installed apps](https://github.com/maddiestone/ConPresentations/blob/master/Blackhat2019.SecuringTheSystem.pdf) and the
    163 179   
    164 180   
    165 181  ---
    166 182  back to [Intro Page](/README.md)
     183 + 
  • ■ ■ ■ ■ ■
    assets/changelog.md
    skipped 1 lines
    2 2   
    3 3  ## Changelog 📬
    4 4   
    5  -Updates to this repo will be pushed monthly. You can read about the latest changes below.
     5 +This page is no longer maintained. If you are interested in the changelog please check out the commit.
    6 6   
    7 7  ---
    8 8  ## ___Update 2020.08___
    skipped 261 lines
    270 270  - Cleaned up [Blogposts Page](/assets/blogposts.md)
    271 271  ---
    272 272  back to [Intro Page](/README.md)
     273 + 
  • ■ ■ ■ ■ ■
    assets/health.md
    skipped 11 lines
    12 12   
    13 13  ---
    14 14  back to [Intro Page](/README.md)
     15 + 
  • ■ ■ ■ ■ ■
    assets/labs.md
    skipped 1 lines
    2 2   
    3 3  ## Labs & Testing Environments 🧪
    4 4   
    5  -## General
     5 +### Web Hacking Fundamentals
     6 + 
     7 +#### Free
    6 8  - [Hacker101](https://www.hacker101.com/) | Good Exercises for Beginners, can earn you private Invites on HackerOne
    7  -- [Pentesterlab](https://pentesterlab.com) | Good Labs with a broad variety of Topics, some very good Web Application Exercises
    8  -- [HackTheBox](https://www.hackthebox.eu/) | provides Testing Labs, some Web Application Challenges
    9  -- [XSS-Game](https://xss-game.appspot.com/) | Learning Platform for XSS
    10 9  - [HackEdu](https://hackedu.io)
     10 +- [Web Security Academy](https://portswigger.net/web-security)
     11 +- [HackThisSite](https://hackthissite.org/)
     12 +- [CTFChallenge](https://ctfchallenge.co.uk) | Web CTF based on real vulnerabilities
     13 +- [XSS-Game](https://xss-game.appspot.com/) | Learning Platform for XSS
     14 +- [Hacksplaining](https://www.hacksplaining.com/)
     15 + 
     16 + 
     17 +#### Premium
     18 +- [Pentesterlab](https://pentesterlab.com/referral/olaL4k8btE8wqA) | Good Labs with a broad variety of Topics, some very good Web Application Exercises
     19 +- [BugBountyHunter](https://www.bugbountyhunter.com/) | Learn how to test for security vulnerabilities on web applications
     20 + 
     21 +#### Misc
     22 +- [0l4bs - Cross-site scripting labs for web application security enthusiasts](https://github.com/tegal1337/0l4bs) - by tegal1337
     23 +- [Will it CORS?](https://httptoolkit.tech/will-it-cors/) | Tell this magic CORS machine what you want, and it'll tell you exactly what to do
     24 +- [XSS Labs from PwnFunction](https://xss.pwnfunction.com/) Great Labs in a beautiful layout
     25 + 
     26 +### Vulnerable Apps
     27 +- [Google Gruyere](https://google-gruyere.appspot.com/)
    11 28  - [DVWA](http://www.dvwa.co.uk)
    12  -- [Google Gruyere](https://google-gruyere.appspot.com/)
    13  -- [Web Security Academy by PortSwigger](https://portswigger.net/web-security)
    14  -- [XSS Labs from PwnFunction](https://xss.pwnfunction.com/) Great Labs in a beautiful layout
    15  -- [0l4bs - Cross-site scripting labs for web application security enthusiasts](https://github.com/tegal1337/0l4bs) - by tegal1337
    16  -- [TryHackMe](https://tryhackme.com) | Cool Hacking & Pentesting Labs with Web Challenges
     29 +- [OWASP Juice Shop](https://owasp.org/www-project-juice-shop/)
     30 +- [Metasploitable 3](https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities)
     31 +- [Multidae](https://sourceforge.net/projects/mutillidae/)
     32 +- [Badstore](https://www.vulnhub.com/entry/badstore-123,41/)
     33 +- [https://application.security/ - SSRF](https://application.security/free-application-security-training/server-side-request-forgery-in-capital-one)
     34 + 
     35 +#### XSS
     36 +- [alert 1 to win](https://alf.nu/alert1/)
     37 +- [prompt(1)](http://prompt.ml/0)
     38 +- [XSS Game By Google](https://xss-game.appspot.com/)
     39 + 
     40 +### General Hacking
     41 + 
     42 +#### Free
     43 +- [VulnHuB](https://www.vulnhub.com/)
     44 +- [W3chhalls](https://w3challs.com/)
     45 +- [PicoCTF][https://picoctf.org/]
     46 +- [Root-Me](https://www.root-me.org/)
     47 +- [OverTheWire](https://overthewire.org/wargames/natas/)
     48 + 
     49 +#### Premium
     50 +- [TryHackMe](https://tryhackme.com/signup?referrer=nahamsec) | Cool Hacking & Pentesting Labs with Web Challenges
    17 51   - Videos: [TryHackMe! Basic Penetration Testing](https://www.youtube.com/watch?v=xl2Xx5YOKcI) // [TryHackMe! EternalBlue/MS17-010 in Metasploit](https://www.youtube.com/watch?v=s6rwS7UuMt8) // [TryHackMe! OhSINT - METADATA & Research](https://www.youtube.com/watch?v=oF0TQQmFu4w)
     52 +- [HackTheBox](https://www.hackthebox.eu/) | provides Testing Labs, some Web Application Challenges
    18 53  - [Cyberseclabs](https://www.cyberseclabs.co.uk/)
    19 54  - [Kontra Application Security Training](https://application.security/free-application-security-training)
    20  -- [Will it CORS?](https://httptoolkit.tech/will-it-cors/) | Tell this magic CORS machine what you want, and it'll tell you exactly what to do
    21 55   
    22 56  ---
    23 57  back to [Intro Page](/README.md)
     58 + 
  • ■ ■ ■ ■ ■ ■
    assets/media.md
    skipped 1 lines
    2 2   
    3 3  ## Media Resources & Communities 🎬
    4 4  Here you find listings to useful media creations that can help beginners in different ways.
     5 +If you are interested in interviews with the top hackers and bug bounty hunters, check out NahamSec's [Live Recon Stream](https://www.youtube.com/playlist?list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA)
    5 6   
     7 +- [Discord Servers](#Discord-Servers)
    6 8  - [YouTube Channels](#Youtube-Channels)
    7 9  - [Streamers](#Streamers)
    8 10  - [Podcasts](#Podcasts)
    9 11  - [Books](#Books)
    10 12  - [Twitter](#Twitter)
    11  -- [Discord Servers](#Discord-Servers)
    12 13  - [Misc](#Misc)
    13 14   
    14 15  ---
    15 16   
     17 +## Discord Servers
     18 +- [Nahamsec](https://discord.gg/d6dENAq)
     19 +- [Hacker101](https://discord.gg/WrCTm8h)
     20 +- [TryHackMe](https://discord.gg/KsAEejZ)
     21 +- [HackTheBox](https://discord.gg/FrRJ3Z8)
     22 +- [TheCyberMentor](https://discord.gg/)
     23 +- [AshF0x - The F0xbox](https://discord.gg/RCTy5zS)
     24 +- [The Mayor](https://discord.gg/EN2ya9h)
     25 +- [Ceos3c](https://discord.gg/SBK3hkR)
     26 +- [InsiderPhD](https://discord.gg/rdQcSk7a)
     27 + 
    16 28  ## Youtube Channels
    17 29  - [Curated List of YT Channels](https://threader.app/thread/1248351836672872456) by TCM
    18 30  - [Nahamsec](https://www.youtube.com/nahamsec) - Educational Videos and VODs of his Stream, Vlogs
    skipped 6 lines
    25 37  - [DEFCONConference](https://www.youtube.com/user/DEFCONConference/videos) - Tons of Talks from Defcon.
    26 38  - [Jason Haddix](https://www.youtube.com/channel/UCk0f0svao7AKeK3RfiWxXEA) - VODs of his Stream
    27 39  - [rwxrob](https://www.twitch.tv/rwxrob) - Linux God
     40 +- [bug Bounty Reports Explained](https://www.youtube.com/c/bugbountyreportsexplained/)
    28 41   
    29 42  ## Streamers
    30 43  - [Nahamsec](https://www.twitch.com/nahamsec) on Twitch
    31 44  - [d0nutptr](https://www.twitch.tv/d0nutptr/) on Twitch
    32  -- [The Cyber Mentor](https://twitch.tv/thecybermentor) on Twitch
    33  -- [The Blind Hacker](https://twitch.tv/theblindhacker) on Twitch
    34  -- [Jason Haddix](https://www.twitch.tv/js0n_x/) on Twitch
    35  -- [sup3rhero1](https://www.twitch.tv/sup3rhero1) on Twitch
    36  -- [STÖK](https://www.twitch.tv/stokfredrik) on Twitch
    37  -- [The Mayor](https://www.twitch.tv/themayor11) on Twitch
    38  - 
     45 +- [TheCyberMentor](https://twitch.tv/thecybermentor) on Twitch
     46 +- [TheBlindHacker](https://twitch.tv/theblindhacker) on Twitch
     47 +- [TheMayor](https://www.twitch.tv/themayor11) on Twitch
     48 +- [Ash_F0x](https://www.twitch.tv/ash_f0x)
     49 +- [mbcrump](https://www.twitch.tv/mbcrump)
     50 +- [thealtf4stream](https://www.twitch.tv/thealtf4stream)
     51 +- [dowright](https://www.twitch.tv/dowright)
     52 +- [The Red Team Village](https://www.twitch.tv/redteamvillage)
    39 53   
    40 54  ## Podcasts
    41 55  - [Darknet Diaries](https://darknetdiaries.com/) by [Jack Rhysider](https://twitter.com/jackrhysider)
    skipped 15 lines
    57 71  - [Black Hat Python](https://nostarch.com/blackhatpython) by Justin Seitz
    58 72  - [The Linux Command Line](https://nostarch.com/tlcl2) by William Shotts
    59 73   
    60  -In general ["no starch press"](https://nostarch.com/catalog/security) offers great books in the hacking category. [Humble Bundle](https://www.humblebundle.com) sometimes offfers great book deals for an awesome price, so have a eye out for those.
     74 +In general ["no starch press"](https://nostarch.com/catalog/security) offers great books in the hacking category. [Humble Bundle](https://www.humblebundle.com) sometimes offers great book deals for an awesome price, so have a eye out for those.
    61 75   
    62 76  ## Twitter
    63 77   
    skipped 1 lines
    65 79   
    66 80  The following list does not exclusively contains Bug Bounty themed Accounts but a broad variety of InfoSec and Hacking.<br>
    67 81   
    68  -| Name | Topics |
    69  -| ------------------------------------------------------- | ---------------------------------------------------------------------------- |
    70  -| [@Alyssa*Herrera*](https://twitter.com/Alyssa_Herrera_) | BB |
    71  -| [@Bugcrowd](https://twitter.com/Bugcrowd) | BB, Platform |
    72  -| [@DailySwig](https://twitter.com/DailySwig) | Web Technologie, News |
    73  -| [@DanielMiessler](https://twitter.com/DanielMiessler) | Security, Researcher, [SecLists](https://github.com/danielmiessler/SecLists) |
    74  -| [@Dinosn](https://twitter.com/Dinosn) | Researcher, News, Tools |
    75  -| [@EdOverflow](https://twitter.com/EdOverflow) | Developer, Researcher, @LiveOverflow in disguise |
    76  -| [@GoogleVRP](https://twitter.com/GoogleVRP) | VRP, Program |
    77  -| [@GossiTheDog](https://twitter.com/GossiTheDog) | Researcher |
    78  -| [@Hacker0x01](https://twitter.com/Hacker0x01) | BB, Platform |
    79  -| [@HackerSploit](https://twitter.com/HackerSploit) | General Hacking, Youtuber |
    80  -| [@InsiderPhD](https://twitter.com/InsiderPhD) | BB, Teaching, YouTuber, Beginner friendy content |
    81  -| [@JHaddix](https://twitter.com/Jhaddix) | BB, Bugcrowd, Streaming |
    82  -| [@KitPloit](https://twitter.com/KitPloit) | News, Tools |
    83  -| [@LiveOverflow](https://twitter.com/LiveOverflow) | Hacking, CTF, Teaching, YouTuber, @EdOverflow in disguise |
    84  -| [@MalwareTechBlog](https://twitter.com/MalwareTechBlog) | RE, Security, Hacking, News |
    85  -| [@NahamSec](https://twitter.com/NahamSec) | BB, Teaching, Streaming |
    86  -| [@Peerlyst](https://twitter.com/Peerlyst) | Articles, Peer Powered Publications |
    87  -| [@PortSwigger](https://twitter.com/PortSwigger) | BB, News, BurpSuite |
    88  -| [@PwnFunction](https://twitter.com/PwnFunction) | YouTuber, Teaching, Web Technologie |
    89  -| [@Regala\_](https://twitter.com/Regala_)(Fisher) | BB, DISTURBANCE, Podcaster |
    90  -| [@Rosenawesome](https://twitter.com/Rosenawesome) | Hacking, Events |
    91  -| [@TheBlindHacker](https://twitter.com/TheBlindHacker) | Hacking, Streamer |
    92  -| [@TheHackerNews](https://twitter.com/TheHackersNews) | News |
    93  -| [@TheParanoids](https://twitter.com/TheParanoids) | BB, "Program" |
    94  -| [@TomNomNom](https://twitter.com/TomNomNom) | Coding, BB, Hacking, DISTURBANCE, Tools |
    95  -| [@\_johnhammond](https://twitter.com/_johnhammond) | Hacking, Web Technologies, Coding, CTF |
    96  -| [@\_sn0ww](https://twitter.com/_sn0ww) | Social Enineering, OSINT |
    97  -| [@ajxchapman](https://twitter.com/ajxchapman) | BB, Researcher |
    98  -| [@albinowax](https://twitter.com/albinowax) | News, BB, Web Technologies, Researcher, BurpSuite |
    99  -| [@autothreat](https://twitter.com/autothreat) | Hacking, Cars |
    100  -| [@brutelogic](https://twitter.com/brutelogic) | Researcher, Teaching, XSS |
    101  -| [@ceos3c](https://twitter.com/ceos3c) | YouTuber, General Hacking, Teaching |
    102  -| [@codingo_](https://twitter.com/codingo_) | General Hacking, Bug Bounty, Coding |
    103  -| [@d0nutptr](https://twitter.com/d0nutptr) | BB, Researcher, (Rust.) |
    104  -| [@daeken](https://twitter.com/daeken) | BB, Researcher |
    105  -| [@evilsocket](https://twitter.com/evilsocket) | Hacking, Coding, Hardware, Tools |
    106  -| [@firebounty](https://twitter.com/firebounty) | BB, Platform |
    107  -| [@fluxfingers](https://twitter.com/fluxfingers) | CTF |
    108  -| [@fs0c131y](https://twitter.com/fs0c131y) | Mobile Applications, Hacking, Web Technologies, Researcher |
    109  -| [@hakluke](https://twitter.com/hakluke) | Researcher, Coding, Tools |
    110  -| [@intigriti](https://twitter.com/intigriti) | BB, Platform |
    111  -| [@jerh17](https://twitter.com/jerh17) | BB, Researcher, Platform |
    112  -| [@lorenzofb](https://twitter.com/lorenzofb) | Journalist |
    113  -| [@maddiestone](https://twitter.com/maddiestone) | Project Zero, Researcher |
    114  -| [@malwareunicorn](https://twitter.com/malwareunicorn) | Researcher, RE, Malware, Unicorn |
    115  -| [@mongobug](https://twitter.com/mongobug) | BB, Researcher |
    116  -| [@nahamsec](https://twitter.com/nahamsec) | BB, Researcher, YouTuber, Streamer, Teaching, Recon |
    117  -| [@nnwakelam](https://twitter.com/nnwakelam) | BB, Researcher |
    118  -| [@openbugbounty](https://twitter.com/openbugbounty) | Platform |
    119  -| [@orange_8361](https://twitter.com/orange_8361) | BB, Researcher |
    120  -| [@owasp](https://twitter.com/owasp) | OWASP |
    121  -| [@samykamkar](https://twitter.com/samykamkar) | Hacking, News, Tools, Hardware |
    122  -| [@securinti](https://twitter.com/securinti) | Researcher, BB |
    123  -| [@spaceraccoonsec](https://twitter.com/spaceraccoonsec) | Researcher, BB |
    124  -| [@stokfredrik](https://twitter.com/stokfredrik) | Researcher, BB, YouTuber, Teaching, Sunglasses |
    125  -| [@synack](https://twitter.com/synack) | Platform, Team, BB |
    126  -| [@thecybermentor](https://twitter.com/thecybermentor) | Streamer, Youtuber, General Hacking, Teaching |
    127  -| [@thedawgyg](https://twitter.com/thedawgyg) | BB |
    128  -| [@thegrugq](https://twitter.com/thegrugq) | Researcher |
    129  -| [@yaworsk](https://twitter.com/yaworsk) | BB, Researcher, Author |
    130  -| [@yeswehack](https://twitter.com/yeswehack) | BB, Platform |
    131  -| [@zseano](https://twitter.com/zseano) | BB, Teaching |
    132  -| [@ZephrFish](https://twitter.com/ZephrFish) | BB,Researcher |
    133  -| [@CalumBoal](https://twitter.com/CalumBoal) | Pentester, Software dev, Coder |
    134  -| [@_superhero1](https://twitter.com/_superhero1) | Streamer, Content Creator, BB |
    135  -| [@PhillipWylie](https://twitter.com/PhillipWylie) | BB, Researcher, Pentester |
    136  - 
     82 +### Members
     83 +| handle | name | description |
     84 +|--------|------|-------------|
     85 +|[@0x0luke](https://twitter.com/0x0luke) | Luke | MSc Cyber Security | BSc Computer Forensics and Security | Web/Hardware hacker. HoF @Tesla @Apple @DeptofDefense @Uber @RockstarGames @Cloudinary @Dell
     86 +|[@0xacb](https://twitter.com/0xacb) | André Baptista | 🇵🇹 Security researcher and bug bounty hunter living somewhere between 3D and 7D. Freedφm. 1128350274
     87 +|[@0xd0m7](https://twitter.com/0xd0m7) | 0xd0m7 | Security Researcher
     88 +|[@0xInfection](https://twitter.com/0xInfection) | Pinaki | I am just an infected geek. 🤠
     89 +|[@0xpatrik](https://twitter.com/0xpatrik) | Patrik Hudak | Outcome over ego.
     90 +|[@0xteknogeek](https://twitter.com/0xteknogeek) | Joel Margolis | Engineer by day, researcher by night • 50% grad of @RITtigers • ProdSec @Uber • DISTURBANCE • Views and opinions are my own.
     91 +|[@11xuxx](https://twitter.com/11xuxx) | Ashkan Jahanbakhsh | developer, pentester and bug hunter(OSCP, OSCE, OSWE)
     92 +|[@1ndianl33t](https://twitter.com/1ndianl33t) | Shiv chouhan | Web & Mobile Application Security Researcher | Hackerone | Bugcrowd |Apk Mod | Graphics Designer |CEH | CHFI | SEO | CCNA | CCNP |https://t.co/GueVYZ7uLi
     93 +|[@adrien_jeanneau](https://twitter.com/adrien_jeanneau) | Adrien | Cybersecurity Lover - I love to break things (and I'm paid for that) - Bug Hunter - Creator of gitGraber https://t.co/DKteWrVYt2 #InfoSec #BugBounty
     94 +|[@AEMSecurity](https://twitter.com/AEMSecurity) | AEMSecurity | Dedicated to Adobe AEM Security - Bugbounty - Vulnerability & Exploit Research. CVE-2016-0956, CVE-2013-6674
     95 +|[@Agarri_FR](https://twitter.com/Agarri_FR) | Nicolas Grégoire | Web hacker && Official Burp Suite Pro trainer https://t.co/oaXuAFhYWp…Follow @MasteringBurp for free tips and tricks
     96 +|[@ajxchapman](https://twitter.com/ajxchapman) | Alex Chapman | Bug Hunter | Vulnerability Researcher | On Recovery | DMs Open
     97 +|[@akita_zen](https://twitter.com/akita_zen) | Akita 🇦🇷 | bugbounty hunter & zen monk
     98 +|[@albinowax](https://twitter.com/albinowax) | James Kettle | Director of Research at PortSwigger Web Security aka @Burp_Suite
     99 +|[@alicanact60](https://twitter.com/alicanact60) | Ali Tütüncü | Bug Researcher
     100 +|[@Almroot](https://twitter.com/Almroot) | Fredrik N. Almroth | Co-Founder, Researcher and Head of Engineering at @detectify. Coder of stuff, breaker of things. PGP/MIT: 0xEDF8D9828B06A7F7
     101 +|[@Alra3ees](https://twitter.com/Alra3ees) | Emad Shanab | A Lawyer & A noooob. Every Law has its own Bugs. I have no Facebook. https://t.co/n9U5HPkWcV https://t.co/46EDOU8gnq
     102 +|[@alxbrsn](https://twitter.com/alxbrsn) | Alex Birsan |
     103 +|[@Alyssa_Herrera_](https://twitter.com/Alyssa_Herrera_) | Alyssa Herrera Perez 🇩🇰 🏳️‍⚧️ | Sr. App Sec engineer. Bug bounty hunter on @Hacker0x01. @detectify crowdsource hacker, and @hacknotcrime Advocate. Loves birbs. Furry Hacker. NB-They/them
     104 +|[@ameenmaali](https://twitter.com/ameenmaali) | Ameen | appsec infant, bug bounty fetus - Blog: https://t.co/IULDdK4Wh1 (@abugzlife1)
     105 +|[@andirrahmani1](https://twitter.com/andirrahmani1) | Andi Rrahmani | Security Researcherhttps://t.co/Xenw3BiShq
     106 +|[@anshuman_bh](https://twitter.com/anshuman_bh) | Anshuman Bhartiya | I love Security, Automation, Innovation, Challenges and Changes. My opinions here, not my employers. https://t.co/RyQUQzkYzm
     107 +|[@ap_ceng](https://twitter.com/ap_ceng) | Ashish Padelkar |
     108 +|[@ArchAngelDDay](https://twitter.com/ArchAngelDDay) | Douglas Day | Born again. Libertarian. Bug Bounty Hunter. Crypto Enthusiast.Views are correct. BTC to 3Jo3Yn7Xt3SYUmm49LiqF1nsKwa9R9wNhi for bugbounty mentorship
     109 +|[@arneswinnen](https://twitter.com/arneswinnen) | Arne Swinnen | IT Security. Bug Bounty Hunter.
     110 +|[@atul_hax](https://twitter.com/atul_hax) | Atul | I love pwn, reading RFCs, and I just dabble on the keyboard until things happen but Emacs gave me carpal tunnel.
     111 +|[@avlidienbrunn](https://twitter.com/avlidienbrunn) | ­Mathias Karlsson | Web security fiddler. Bug bounty bastard. CTF with @HackingForSoju.
     112 +|[@B3nac](https://twitter.com/B3nac) | Kyle | Full time Security Researcher. I really enjoy everything Android. Creator of InjuredAndroid and BountyPay apk. Send me all the apks plz. https://t.co/myQCNOp959
     113 +|[@bbuerhaus](https://twitter.com/bbuerhaus) | Brett Buerhaus | https://t.co/usMDC8wsVM - websec research, bug bounties, CTF (@hackingforsoju) and puzzles (@fomo_team).
     114 +|[@bendtheory](https://twitter.com/bendtheory) | bend theory | 1 1 2 3 5 8 13 21 34 55 69 420 666 911
     115 +|[@bitquark](https://twitter.com/bitquark) | bitquark ✪ | Tesla red team by day, |redacted| by night. Black Hat EU review board. Former Bugcrowd #1. Tweets may contain traces of cat. He/him. // nb ỉrt ḫt
     116 +|[@Black2Fan](https://twitter.com/Black2Fan) | Sergey Bobrov |
     117 +|[@BonJarber](https://twitter.com/BonJarber) | Jon Barber 🤖 | AppSec engineer @Cruise | Ex @facebook, @NCCsecurityUS | Building and breaking things
     118 +|[@brxxnh1](https://twitter.com/brxxnh1) | brxxn (security) | views and opinions are those of a wild ostrich on the loose
     119 +|[@bsysop](https://twitter.com/bsysop) | bsysop | If you can dream with it, you can do it🤘🏻!
     120 +|[@BugBountyHQ](https://twitter.com/BugBountyHQ) | BugBountyHQ |
     121 +|[@bug_dutch](https://twitter.com/bug_dutch) | Floerer | Bug Bounty Hunter - CS Student - 🇳🇱 - https://t.co/a2pvqTuEF9
     122 +|[@chevonphillip](https://twitter.com/chevonphillip) | Chevon Phillip | Bugcrowd Ambassador | Synack Red Team Member | Security Researcher | Penetration Tester
     123 +|[@codecancare](https://twitter.com/codecancare) | todayisnew | May you be well on your side of the screen.
     124 +|[@codingo_](https://twitter.com/codingo_) | Michael Skelton | Global Head of Security Ops and Researcher Enablement @bugcrowd, Ex-pentester. Maintainer of NoSQLMap, VHostScan, Reconnoitre, Interlace, Crithit
     125 +|[@Corb3nik](https://twitter.com/Corb3nik) | Ian Bouchard | Security Enthusiast, CTF Fanatic, Bug Bounty Hunter, @opentoallctf/perfect.blue Web guy, NorthernCoalition Co-Founder
     126 +|[@d0nutptr](https://twitter.com/d0nutptr) | d0nut | Lead Security Engineer @graplsec, part-time bug hunter (https://t.co/INDLSLS2Qu). (he/they). Formerly @Dropbox, @Cruise.My tweets are my own.
     127 +|[@damian_89_](https://twitter.com/damian_89_) | Damian Strobel | #webdev #php #machinelearning #python #laravel #python #websec #bugbounty #pentest
     128 +|[@dee__see](https://twitter.com/dee__see) | Dominic | Outdoor enthusiast, friend of all dogs, hacker, AppSec engineer @gitlab - fighting inertia
     129 +|[@defparam](https://twitter.com/defparam) | Evan Custodio | FPGA/Hardware Hacker. Web Security Researcher. I break web servers so that others can't.@awscloud - My opinions are my own
     130 +|[@dhauenstein](https://twitter.com/dhauenstein) | Daniel Hauenstein | I am the Klaus Kinski of IT security. I do bug bounties (H1/BC/SynAck/zerocopter). I know memes and drink beer. Co-Founder of Last Unicorn Con. Hacking magician
     131 +|[@eboda_](https://twitter.com/eboda_) | eboda | full-spectrum cyber warrior
     132 +|[@EdOverflow](https://twitter.com/EdOverflow) | Ed | Web developer & security researcher.
     133 +|[@erbbysam](https://twitter.com/erbbysam) | erbbysamᐸscriptᐳaler | software, cryptography, etc. DEFCON black badge with https://t.co/UBvdIM5TW6
     134 +|[@eur0pa_](https://twitter.com/eur0pa_) | europa | 𝙸 𝚑𝚊𝚌𝚔 𝚜𝚝𝚞𝚏𝚏 𝚏𝚘𝚛 𝚙𝚛𝚘𝚏𝚒𝚝, 𝚊𝚗𝚍 𝚕𝚒𝚏𝚝 𝚑𝚎𝚊𝚟𝚢 𝚝𝚑𝚒𝚗𝚐𝚜 𝚏𝚘𝚛 𝚏𝚞𝚗. 𝙿𝚘𝚠𝚎𝚛𝚎𝚍 𝚋𝚢 𝙱𝙱𝙰𝙲.
     135 +|[@farah_hawa01](https://twitter.com/farah_hawa01) | Farah | noobiest of the noobs | content creator
     136 +|[@filedescriptor](https://twitter.com/filedescriptor) | FD | @0xReconless
     137 +|[@foobar0x7](https://twitter.com/foobar0x7) | foobar7 | IT Security Consultant & Bug Hunter
     138 +|[@fransrosen](https://twitter.com/fransrosen) | Frans Rosén | Dev/Security/Founder at @centrahq/@detectify/@poweredbyingrid. I do not advertise doing hacking services, do not trust the ones telling you I do.
     139 +|[@garethheyes](https://twitter.com/garethheyes) | Gareth Heyes | javascript:/*--&gt;&lt;/title&gt;&lt;/style&gt;&lt;/textarea&gt;&lt;/script&gt;&lt;/xmp&gt;&lt;svg/onload='+/&quot;/+/onmouseover=1/+/[*/[]/+alert(1)//'&gt;
     140 +|[@gehaxelt](https://twitter.com/gehaxelt) | Sebastian Neef | Freelancer. Student. Traveller. Hacker. WhiteHat. Bughunter. CTFs @ENOFLAGBlogs @0daywork, @blogbasis and co-Founder of @internetwache
     141 +|[@gerben_javado](https://twitter.com/gerben_javado) | Gerben Javado | Security Engineer @Facebook. Into bug bounties. Personal opinions.
     142 +|[@gregxsunday](https://twitter.com/gregxsunday) | Grzegorz Niedziela | pentester / bughunter
     143 +|[@Gromak123_Sec](https://twitter.com/Gromak123_Sec) | Gromak123_Security | French Security Researcher and Pentester at @Unumkey. C|EH Certified. Bounty Hunter at @YesWeHack and @Hacker0x01.3 times #LeHack Bugbounty's Winner.
     144 +|[@gwendallecoguic](https://twitter.com/gwendallecoguic) | Gwendal Le Coguic | Bug hunter, tool maker.
     145 +|[@h1_sp1d3r](https://twitter.com/h1_sp1d3r) | Evgeniy Yakovchuk | Toss a coin to your hacker, A friend of humanity.
     146 +|[@hacker_](https://twitter.com/hacker_) | Corben Leo | Christian, Computer Science @DakotaState, Hacker
     147 +|[@hahwul](https://twitter.com/hahwul) | HAHWUL | Security engineer, Bugbounty hunter, Developer and H4cker. Say ha-hul but you can just call me howlhttps://t.co/FhMxZy51Qr , https://t.co/gYBnn30EHm , https://t.co/DAjEwvaq0u
     148 +|[@hakluke](https://twitter.com/hakluke) | HΔKLUKΞ | Luke StephensDad, husband, hacker. https://t.co/Zurv4bdcyFhttps://t.co/d1aqj2Q46E
     149 +|[@hateshaped](https://twitter.com/hateshaped) | hateshape |
     150 +|[@HazanaSec](https://twitter.com/HazanaSec) | ʜᴀᴢᴀɴᴀ | ␀​https://t.co/OqwyPoZFFf
     151 +|[@hgreal1](https://twitter.com/hgreal1) | hg_real | Just another random QA guy
     152 +|[@honoki](https://twitter.com/honoki) | Pieter Hiele | Cyber entomologist 🐛 amateur musician 🎹 occasional blogger 💻 https://t.co/0to21Mri4bhttps://t.co/fd9pUEXxbn
     153 +|[@HusseiN98D](https://twitter.com/HusseiN98D) | Hussein Daher | Bug bounty hunter - If you're reading this I love you. - [email protected] - https://t.co/JTJxMBZ7Qshttps://t.co/8iuIYnLHg4
     154 +|[@Hxzeroone](https://twitter.com/Hxzeroone) | Hx01 | Not evil just misunderstood.
     155 +|[@IAmMandatory](https://twitter.com/IAmMandatory) | mandatory/Matthew Bryant | Sec@Snapchat. Ex-Google, Uber, Bishop Fox. XSS Hunter author, DNS/TLD/web security researcher. parallel26(at)opsecmail(dot)com
     156 +|[@imranparray101](https://twitter.com/imranparray101) | Imran Parray | Independent cyber security researcher || Hacker || programmer || Linux Freak || Full time Bug hunter.
     157 +|[@infosec_au](https://twitter.com/infosec_au) | shubs | continuous security, @assetnote
     158 +|[@inhibitor181](https://twitter.com/inhibitor181) | Cosmin | Bug bounty hunter
     159 +|[@InsiderPhD](https://twitter.com/InsiderPhD) | Katie Paxton-Fear | PhD Student, Occasional #BugBounty hunter & Educational #CyberSecurity YouTuber. I study at @CranfieldDefSec: Insider Threats using #nlproc. she/her.
     160 +|[@irsdl](https://twitter.com/irsdl) | Soroush | appsec \ web / https://t.co/3mMc7BsRyw @MDSecLabs | a delimiter character fan | RT/LK can be accidental or !
     161 +|[@itscachemoney](https://twitter.com/itscachemoney) | Tanner | Somewhere between a builder and a breaker | @hacknotcrime
     162 +|[@ITSecurityguard](https://twitter.com/ITSecurityguard) | Patrik Fehrenbach🤖 | rɪsˈpɒnsəbl dɪsˈkləʊʒə HackerOne
     163 +|[@jackds1986](https://twitter.com/jackds1986) | Daniel Bakker | Lead Security Analyst & Ethical Hacker
     164 +|[@jackhcable](https://twitter.com/jackhcable) | Jack Cable | Coder turned white hat hacker with public interest mindset. @Stanford ‘22. Rebel @defensedigital. @StanfordIO / @CISAGov. All tweets are in my personal capacity
     165 +|[@Jhaddix](https://twitter.com/Jhaddix) | Jason Haddix | Father, hacker, educator, gamer, & nerd. Streaming sometimes at: https://t.co/WBZcSgGOIG & posted to https://t.co/I2yhmJjGAb
     166 +|[@jinonehk](https://twitter.com/jinonehk) | Jinone | Security researcher
     167 +|[@jobertabma](https://twitter.com/jobertabma) | Jobert Abma | I tweet about security and my experience as a hacker. Co-founder of HackerOne (@Hacker0x01).
     168 +|[@JohnH4X00R](https://twitter.com/JohnH4X00R) | John H4X0R | Entrepreneur, Programmer & a Bug Hunter https://t.co/vIahtTjPHh Adobe https://t.co/GNSAsABaOl Oracle https://t.co/dObZSH4Gwb Got my👍in each 1 of those pies.
     169 +|[@JonathanBouman](https://twitter.com/JonathanBouman) | Jonathan Bouman | Medical Doctor (GP), Web Developer, Security Researcher
     170 +|[@jon_bottarini](https://twitter.com/jon_bottarini) | Jon Bottarini | Security person. I post about bug bounties, infosec, and everything in between. “insert long job title here” @Hacker0x01, but tweets are my own.
     171 +|[@joohoi](https://twitter.com/joohoi) | Joo, N/A | Hacks for beer. FOSS, infosec and privacy. Chaotic good.
     172 +|[@JR0ch17](https://twitter.com/JR0ch17) | JR0ch17 | Bug bounty hunter, penetration tester and security researcher
     173 +|[@jstnkndy](https://twitter.com/jstnkndy) | Justin Kennedy | Infosec professional & beverage snob. Research Consulting Director @ Atredis Partners.
     174 +|[@kapytein](https://twitter.com/kapytein) | Nadir | Student. Participates on bug bounty programs, kapytein on almost all platforms (h1/intigriti). AppSec @officientapp.
     175 +|[@KasperFritzo](https://twitter.com/KasperFritzo) | Kasper Borg | Danish Security Researcher.
     176 +|[@kazan71p](https://twitter.com/kazan71p) | kazan71p | https://t.co/oTV7m505NG https://t.co/HOkYMVa48M
     177 +|[@Masonhck3571](https://twitter.com/Masonhck3571) | Masonhck357 | Dominican | Cannabis Connoisseur | Hacker for Hackerone and BugCrowd | CompTIA Net+ Certified | CompTIA Sec+ certified | US Navy Vet | Vegan
     178 +|[@MasteringBurp](https://twitter.com/MasteringBurp) | Mastering Burp Suite Pro | Tweets and retweets about Burp Suite Pro | Managed by @Agarri_FR | Not affiliated with @Portswigger
     179 +|[@mcipekci](https://twitter.com/mcipekci) | Mustafa Can İPEKÇİ | I'm an engineer from Turkey, who is interested with biotechology, computer science and digital gaming.A.K.A nukedx
     180 +|[@Michael1026H1](https://twitter.com/Michael1026H1) | Michael Blake | H1: michael1026.Software engineer interested in software security.Oregon
     181 +|[@michenriksen](https://twitter.com/michenriksen) | Michael Henriksen | Freelance security engineer and consultant. Need help with web application security?
     182 +|[@Mik317_](https://twitter.com/Mik317_) | Michele Romano | The walls of Sparta are the chests of its warriors - Agesilao
     183 +|[@mongobug](https://twitter.com/mongobug) | mongo | I like bug bounty programs and breaking things that other people have built. I love kudos.
     184 +|[@MrMustacheMan3](https://twitter.com/MrMustacheMan3) | MrMustacheMan | https://t.co/N9HO1Nhef0
     185 +|[@MrTuxracer](https://twitter.com/MrTuxracer) | Julien Ahrens | Vulnerability Intel | ROP Gadget Hunter | Privacy Enthusiast | Full-time #BugBounty hunter | @Hacker0x01 MVH | @SynackRedTeam
     186 +|[@nader_brandi](https://twitter.com/nader_brandi) | nader | Security Researcher / Bug Bounty Hunter / web developerhttps://t.co/1mefovxcwn
     187 +|[@NahamSec](https://twitter.com/NahamSec) | NahamSec | 🇮🇷 Co-founder @bugbountyforum | Hacker Education @Hacker0x01 | 🎥https://t.co/RXnEEloDtu | 👨🏽‍💻https://t.co/6BfCVo837Z #Hacker101 #TogetherWeHitHarder #BugBounty
     188 +|[@nahoragg](https://twitter.com/nahoragg) | Rohan Aggarwal | I spend more time on things, to understand them until they don’t understand me and start giving me what they aren’t programmed to.
     189 +|[@nbk_2000](https://twitter.com/nbk_2000) | ₦฿₭ | Script-Kitty Thought-Feeder#SemperFur #bugbounties #hacking
     190 +|[@ngalongc](https://twitter.com/ngalongc) | Ron Chan | Security Engineer at GitLab. This is a personal stream, opinions expressed are mine.
     191 +|[@ngkogkos](https://twitter.com/ngkogkos) | Nick || hunt4p1zza | I find bugs for 🍕.
     192 +|[@ngocdh](https://twitter.com/ngocdh) | Huy Ngoc | Pentester
     193 +|[@nijagaw](https://twitter.com/nijagaw) | Nico | Founder of @codegrazer, #Penetrationtester, #bughunter on https://t.co/ufQNKpG2JS, infosec enthusiast
     194 +|[@nnwakelam](https://twitter.com/nnwakelam) | n a f f y | security expert | Holistic nutritionist, reiki practitioner and drumming circle facilitator.
     195 +|[@not_an_aardvark](https://twitter.com/not_an_aardvark) | Teddy Katz | Programming language design/security/software correctness enthusiast. Working on privacy @Google (this is a personal account). he/him. ✊🏻✊🏽✊🏿
     196 +|[@nullenc0de](https://twitter.com/nullenc0de) | Paul Seekamp | I spend a significant amount of time reading security stuff.
     197 +|[@orange_8361](https://twitter.com/orange_8361) | Orange Tsai 🍊 | This is 🍊
     198 +|[@p4fg](https://twitter.com/p4fg) | Peter | Are developers better hackers? I think so...
     199 +|[@PascalSec](https://twitter.com/PascalSec) | ΡΛSCΛLSΞC | 👨‍💻 Senior Security Engineer / Pentester @Dynatrace📺 Youtuber posting hacking videos at @Hacksplained
     200 +|[@PentesterLand](https://twitter.com/PentesterLand) | Pentester Land | Resources for penetration testers and bug bounty hunters
     201 +|[@plmaltais](https://twitter.com/plmaltais) | ramsexy | French-Canadian hacker 🇨🇦. Full-time bug bounty hunter. Craft beer connoisseur 🍻. Surfing the web and hacking the waves. 🌊🏄
     202 +|[@pnig0s](https://twitter.com/pnig0s) | Terry Zhang | Security @ Ant Group (Attack & Defence)
     203 +|[@pudsec](https://twitter.com/pudsec) | Shaun |
     204 +|[@pxmme1337](https://twitter.com/pxmme1337) | Pomme | Triager @Hacker0x01 | Views and opinions are my own and do not reflect my employer's | Memes are life
     205 +|[@r0bre](https://twitter.com/r0bre) | r0bre | itsec @tudarmstadt , web- and systemsecurity, bugbounty, iOS security research, open source. /stack sommelier/code connaisseur/kernel asmr artist/ 👾📲
     206 +|[@r0hack](https://twitter.com/r0hack) | Ramazan | Researcher in @deteacthacked by r0hackhttps://t.co/xUo4swrcWM
     207 +|[@r0x33d](https://twitter.com/r0x33d) | Matt | Security Researcher | Bug Bounty Hunter https://t.co/yUegpDg1DH | Developer
     208 +|[@Regala_](https://twitter.com/Regala_) | Fisher | Half hacker, half daydreamer. DISTURBANCE. Mercenary for hire. Casabranca. Host @bounty_podcast
     209 +|[@restr1ct3d](https://twitter.com/restr1ct3d) | Niv Levy | Penetration Testing Engineer / Offensive Security Certified Professional / Bug Bounty Hunter
     210 +|[@rez0__](https://twitter.com/rez0__) | rez0 | Joseph Thacker // Sr. Security Engineer // Hacker, bug bounty hunter, & hobby jogger. Slay all the dragons that stand in your way. Talk to me about Jesus.
     211 +|[@Rhynorater](https://twitter.com/Rhynorater) | Justin Gardner | Christian | OSCP I Bug Bounty Hunter | Lover of Python | https://t.co/NsnHpys7Ej | 🗣️ English, 日本語, Italiano | Married to 💖@mariahchan_💖
     212 +|[@rhyselsmore](https://twitter.com/rhyselsmore) | 🥯 | xfitter, bjj newb, oz shep dad. internet mall cop at @heroku, bugs at https://t.co/MFzfzsrYBp. opinions my own, not employers
     213 +|[@RockyBandana](https://twitter.com/RockyBandana) | Rocky Bandana | Hacking for Good | whoami: @NathanCavitt
     214 +|[@rohk_infosec](https://twitter.com/rohk_infosec) | Kevin | senior application security engineer at @Okta - all tweets are my own
     215 +|[@rootxharsh](https://twitter.com/rootxharsh) | Harsh Jaiswal | Views are my own | AppSec @vimeo.
     216 +|[@rub003](https://twitter.com/rub003) | 003random | [ 'student', 'system and network engineering', 'bug bounty', 'developer', 'bbac' ]
     217 +|[@_ruby](https://twitter.com/_ruby) | ruby nealon | 😷
     218 +|[@rwincey](https://twitter.com/rwincey) | b0yd | software construction & deconstruction
     219 +|[@Sambal0x](https://twitter.com/Sambal0x) | Richard Tan | Father, security researcher, pentester, proficient diaperchanger.
     220 +|[@samengmg](https://twitter.com/samengmg) | samuel eng |
     221 +|[@Samm0uda](https://twitter.com/Samm0uda) | Youssef Sammouda | Cyber Security Expert. YES™ team member.
     222 +|[@samwcyo](https://twitter.com/samwcyo) | Sam Curry | Full time bug bounty hunter. Run a blog to better explain web application security. Somewhere between high school and pretending to be an adult.
     223 +|[@santi_lopezz99](https://twitter.com/santi_lopezz99) | Santiago Lopez | 1# Millon Dollar hacker on @Hacker0x01 #bugbounty. Instagram: https://t.co/fLSrAlKf4Q
     224 +|[@satishb3](https://twitter.com/satishb3) | Satish Bommisetty |
     225 +|[@_SaxX_](https://twitter.com/_SaxX_) | S. A. X. X. | #BugBounty ¦¦ #Hacker ¦¦ @HexpressoCTF member ¦¦ @breizhctf Org ¦¦ #WebSec ¦¦ Sometimes breaks stuff ¦¦ Building #Cybersecurity in #Africa ¦¦ #OSINT & #Recon
     226 +|[@seanmeals](https://twitter.com/seanmeals) | Sean Melia | I bug bounty when I can. Thoughts are my own. etc.
     227 +|[@seanyeoh](https://twitter.com/seanyeoh) | notsy | I only tweet when I'm mad cuz bad.
     228 +|[@SebMorin1](https://twitter.com/SebMorin1) | Sébastien Morin | Bug bounty hunter, pentester and security researcher
     229 +|[@securibee](https://twitter.com/securibee) | Big Body Bee 🐝 | Creative problem solver that gets things done.Bee different, bee yourself.
     230 +|[@securinti](https://twitter.com/securinti) | Inti De Ceukelaire | Uncertified Ethical Hacker (UEH) and bug bounty bro. @intidc (dutch)­­­, community dude @intigriti. Tweets are mine and so is your computer.
     231 +|[@securitybites](https://twitter.com/securitybites) | Jesse Kinser | Hackerone/bugcrowd: randomdeduction
     232 +|[@SecurityMB](https://twitter.com/SecurityMB) | Michał Bentkowski | Penetration testing, bounty hunting
     233 +|[@shailesh4594](https://twitter.com/shailesh4594) | Shailesh Suthar | An independent security researcher :-)https://t.co/V7JrsztJK4
     234 +|[@shmilylty](https://twitter.com/shmilylty) | Jing Ling | Developer, pentester and bug hunter.
     235 +|[@shub66452](https://twitter.com/shub66452) | $!|3nt_4unt3r | Bug hunter#coder#blockchain enthusiast
     236 +|[@skeltavik](https://twitter.com/skeltavik) | Bram Ruttens | Penetration Tester @OrangeCyberBE 💉 | Crypto Investor & Enthusiast 💰 | Beer Lover 🍺 | Techno Raver 🎹 | BBAC is a lifestyle 🧬
     237 +|[@smiegles](https://twitter.com/smiegles) | Olivier Beg | Head of researchers at @zerocopter, Co-founder @bugbountyforum
     238 +|[@sml555_](https://twitter.com/sml555_) | Sajeeb Lohani (sml555) | Platform Security Engineer @Bugcrowd | Top 50 Bugcrowd | 120+ CVEs
     239 +|[@snyff](https://twitter.com/snyff) | Louis Nyffenegger | CVE connoisseur @PentesterLab. Security engineer. Bugs are my own, not of my employer. I just want to be a webservice...
     240 +|[@soaj1664ashar](https://twitter.com/soaj1664ashar) | Ashar Javed | Web AppSec Researcher | #❶ in Microsoft's Top 100 Security Researcher List -2018 | #❹ in Microsoft's Most Valuable Researcher List -2019 & 2020 | Thanks #🆇🆂🆂
     241 +|[@spaceraccoonsec](https://twitter.com/spaceraccoonsec) | spaceraccoon 🦝 | Here to learn! Hackerone: https://t.co/UK9KDsRVlL
     242 +|[@_staaldraad](https://twitter.com/_staaldraad) | Etienne Stalmans | Security researcher and breaker of things. &
     243 +|[@StanFaas](https://twitter.com/StanFaas) | StanFaas 🦉 | Father - Full-time developer - Wannabe hacker / Night-time bug hunter (GangsterSquad) https://t.co/Ew6Xw2eyST
     244 +|[@steve_mcilwain](https://twitter.com/steve_mcilwain) | Steve Mcilwain | Cybersecurity / Bug Bounty Hunter / Pen Tester / Tool Developer / Illustrator / Animator / Cat Dude
     245 +|[@stokfredrik](https://twitter.com/stokfredrik) | STÖK ✌️ | Hi.. im that hacker that your friends told you about. I used to travel the world, hack & vlog about it. Hackfluencer - Creative - Sustainable Fashion - he/him
     246 +|[@streaak](https://twitter.com/streaak) | streaak (on a break) | BBAC kidnapped me | I hack things and occasionally take photographs
     247 +|[@sushiwushi2](https://twitter.com/sushiwushi2) | iamsushi | I tweet strange things and find bugs #OSCP
     248 +|[@sw33tLie](https://twitter.com/sw33tLie) | sw33tLie | Bug bounty hunter and CS student, 20yo.Playing with software since I can remember.https://t.co/qABvqCl1Pxhttps://t.co/DFfjocm4aR
     249 +|[@Th3G3nt3lman](https://twitter.com/Th3G3nt3lman) | Th3g3nt3lman | a born terror, a rebel without a pause, i never had a good christmas so who is santa claus?
     250 +|[@thedawgyg](https://twitter.com/thedawgyg) | dawgyg | 1 of 8 Millionaire Hackers thanks to @hacker0x01 #h1415 2020 MVH, Bug Bounty Hunter, Reformed Blackhat, Synack Red Team Member, Nissan Skyline Collector
     251 +|[@theflofly](https://twitter.com/theflofly) | Florian Courtial | 0x00
     252 +|[@TomNomNom](https://twitter.com/TomNomNom) | TomNomNom | Open-source tool maker, security researcher, trainer, talker, fixer, eater, not really a sheep. He/him.
     253 +|[@twitt3raccnt](https://twitter.com/twitt3raccnt) | psaux | https://t.co/yQUH0WHaJo
     254 +|[@uraniumhacker](https://twitter.com/uraniumhacker) | Uranium238 | CS undergrad 3rd year, I hack companies. Team: Ophion. Personal Twitter: @mallocsys. forbes top 20 hackers ever (100% legit)
     255 +|[@vinodsparrow](https://twitter.com/vinodsparrow) | Vinoth Kumar | DevSecOps. Partime Bug Bounty Hunter. Views are obviously mine
     256 +|[@vortexau](https://twitter.com/vortexau) | vortex | I work @ Bugcrowd (personal account). Ex-Pentester, Ex-DevTweets about infosec, bounty hunting, homebrewing and cars.SecTalks Adelaide Co-organiser. OSCP/OSWP
     257 +|[@vp440](https://twitter.com/vp440) | Felix Veillette-Potvin | Pentester @gosecure_inc, Bug bounty hunter, general security enthusiast. Opinions and views expressed are my own.
     258 +|[@Wh11teW0lf](https://twitter.com/Wh11teW0lf) | Wh11teW0lf | @Synack MEMBER | Security researcher | BugBounty Hunter | https://t.co/Jqu4kV7EjZ | https://t.co/CbOfcB8r0c
     259 +|[@x1m_martijn](https://twitter.com/x1m_martijn) | x1m | hacker from Groningen
     260 +|[@xEHLE_](https://twitter.com/xEHLE_) | xEHLE | true(1)
     261 +|[@Yassineaboukir](https://twitter.com/Yassineaboukir) | Yassine Aboukir 🐐 | Popping shells for flight tickets at your nearest airport departure terminal. AppSec consulting, and bug bounties (11th ranked) on @Hacker0x01 🇲🇦🇫🇷
     262 +|[@yaworsk](https://twitter.com/yaworsk) | yaworsk | Author of https://t.co/4sI75efGSk, Hacker Interviewer https://t.co/Utz8Qr1kUR, @shopify AppSec. Tweets are my own. Unless you wrote them.
     263 +|[@yip404](https://twitter.com/yip404) | Mohamed Ebrahem |
     264 +|[@zeroxyele](https://twitter.com/zeroxyele) | xyele | 🇹🇷https://t.co/PEtNHYrIVKhttps://t.co/p67rsc3GE9
     265 +|[@zseano](https://twitter.com/zseano) | @zseano | webapp hacker and also that annoying lucio 🐸 Recognised by @Amazon in 2018 for my security research work. ~busy working on @bugbountynotes v2!~
    137 266   
    138  -## Discord Servers
    139  -- [Nahamsec](https://discord.gg/d6dENAq)
    140  -- [Hacker101](https://discord.gg/WrCTm8h)
    141  -- [TryHackMe](https://discord.gg/KsAEejZ)
    142  -- [HackTheBox](https://discord.gg/FrRJ3Z8)
    143  -- [TheCyberMentor](https://discord.gg/)
    144  -- [AshF0x - The F0xbox](https://discord.gg/RCTy5zS)
    145  -- [The Mayor](https://discord.gg/EN2ya9h)
    146  -- [Sup3rhero1](https://discord.gg/pHfgvns)
    147  -- [Ceos3c](https://discord.gg/SBK3hkR)
    148 267   
    149 268  ## Misc
    150 269   - [ChaosComputerClub Germany Media Resources](https://media.ccc.de/) - bunch of conference talks and other media
    151 270   - [Phrack](http://www.phrack.org/)
    152 271  ---
    153 272  back to [Intro Page](/README.md)
     273 + 
  • ■ ■ ■ ■ ■ ■
    assets/setup.md
    skipped 1 lines
    2 2   
    3 3  ## Setup 💻
    4 4  This section will help you set up your testing environement.
    5  -- [Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation](https://www.youtube.com/watch?v=YhUiAH5SIqk) - by nahamsec
     5 +- [Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation](https://www.youtube.com/watch?v=YhUiAH5SIqk) - by NahamSec
    6 6  - [Setting up your own web server on a VPS](https://www.linux.com/learn/easy-lamp-server-installation)
    7 7  - [Setting up virtualbox + linux](https://linuxconfig.org/how-to-install-kali-linux-on-virtualbox)
    8 8  - [Docker For Pentesting And Bug Bounty Hunting](https://www.youtube.com/watch?v=5G6tA8Q9AuQ)
    9 9  - [Basics of UNIX](https://lifehacker.com/5633909/who-needs-a-mouse-learn-to-use-the-command-line-for-almost-anything)
    10  -- [Previously Disclosed Vulnerabilities / HackerOne Hacktivity](https://hackerone.com/hacktivity)
    11 10  - [Finding your First Bug and Getting a Bounty - Personal Story by @InsiderPhD](https://www.youtube.com/watch?v=iEDoIEBD7gM) - YouTube Discussion
    12 11  - [Introduction to Docker for CTFs](https://www.youtube.com/watch?v=cPGZMt4cJ0I) (Works for Bug Bounty too) - by LiveOverflow
    13 12  - [Docker Tutorial for Beginners - A Full DevOps Course on How to Run Applications in Containers](https://www.youtube.com/watch?v=fqMOX6JJhGo) - freecodecamp
    14 13  - [Creating Wordlists for Pentesting & Bug Bounty](https://www.youtube.com/watch?v=QGbTaxtEQlg) - by nahamsec
    15 14  - [Setup bugbounty hunting env on termux](https://www.hahwul.com/2020/05/setup-bugbounty-hunting-env-on-termux-d.html?m=1) - by @hahwul
    16 15  - [Technical Project Ideas Towards Learning Cyber Security](https://mchow01.github.io/education/security/projects/2020/06/19/technical_projects_security.html) - by [Ming Y. Chow](https://mchow01.github.io/)
     16 + 
    17 17  ## Burp Suite
    18 18  This section should help you get familiar with BurpSuite.
    19 19  - [Setting up Burp (Video Series)](https://www.hacker101.com/playlists/burp_suite) by Hacker101
    20 20  - [Burp Suite Introduction](https://github.com/bugcrowd/bugcrowd_university/blob/master/An_introduction_to_Burp_Suite/Bugcrowd%20University%20-%20Burp%20Suite%20Introduction.pdf) by Jason Haddix
    21 21  - [Beginners Guide to Burpsuite Payloads (Part 1)](https://www.hackingarticles.in/beginners-guide-burpsuite-payloads-part-1/) by Raj Chandel
    22 22  - [Burp Hacks for Bounty Hunters](https://www.youtube.com/watch?v=boHIjDHGmIo) by James Kettle
     23 + 
    23 24  ## Tools
    24 25  - [Getting Starting With Tmux Isn't That Scary](https://www.youtube.com/watch?v=Z5sEEbwngd0)
     26 +-
    25 27  ---
    26 28  back to [Intro Page](/README.md)
     29 + 
  • ■ ■ ■ ■ ■ ■
    assets/talks.md
     1 +# Resources-for-Beginner-Bug-Bounty-Hunters
     2 +
     3 +## Talks 🤓
     4 +
     5 +### Table of Contents
     6 +1. [General Bug Bounty Talks](#General-Bug-Bounty-Talks)
     7 +2. [Recon and Automation](#Recon-and-Automation)
     8 +3. [Research and Exploitation](#Research-and-Exploitation)
     9 +4. [Vulnerabilities Explained](#Vulnerabilities-Explained)
     10 +5. [Mobile Hacking](#Mobile-Hacking)
     11 +6. [Miscellaneous](#Miscellaneous)
     12 +
     13 +### General Bug Bounty Talks
     14 +- [How To Get Started In Bug Bounties](https://www.youtube.com/watch?v=kn0jClWSdD8) by [DC CyberSec](https://www.youtube.com/channel/UC3sccPO4v8YqCTn8sezZGTw)
     15 +- [Is it too late to start doing BUG BOUNTY in 2020?](https://www.youtube.com/watch?v=PTTkA_gHgxE) [STOK](https://youtube.com/stokfredrik)
     16 +- [MY BUG BOUNTY JOURNEY!](https://www.youtube.com/watch?v=ug7FzoByLFc) by Farah Hawa
     17 +- [DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015](https://www.youtube.com/watch?v=-FAjxUOKbdI)
     18 +- [Google Hacking (Dorking)](https://www.youtube.com/watch?v=hrVa_dhD-iA)
     19 +
     20 +### Recon and Automation
     21 +- [The Truth About Recon](https://www.youtube.com/watch?v=amihlWTtkMA)
     22 +- [The Bug Hunter's Methodology v4.0 - Recon Edition by @jhaddix #NahamCon2020!](https://www.youtube.com/watch?v=p4JgIu1mceI)
     23 +-[It’s the Little Things - BSides Portland 2018 by @NahamSec](https://www.youtube.com/watch?v=YT5Zl2jW3wg)
     24 +- [Who, What, Where, When, Wordlist by @TomNomNom #NahamCon2020](https://www.youtube.com/watch?v=W4_QCSIujQ4)
     25 +- [GitHub Recon and Sensitive Data Exposure](https://www.youtube.com/watch?v=l0YsEk_59fQ)
     26 +- [Creating Wordlists for Hacking, Pentesting & Bug Bounty Hunting Using Seclists, Bigquery, and More!](https://www.youtube.com/watch?v=QGbTaxtEQlg)
     27 +- [Hacking IIS (Recon) by infosec_au](https://www.youtube.com/watch?v=HrJW6Y9kHC4)
     28 +- [Knock knock, Who's There? Identifying Assets in the Cloud](https://www.youtube.com/watch?v=W5htGHdIc-M&)
     29 +
     30 +### Research and Exploitation
     31 +- [XSS on Google Search - Sanitizing HTML in The Client?](https://www.youtube.com/watch?v=lG7U3fuNw3A) - LiveOverflow
     32 + - [The Fix](https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa)
     33 +- [DEF CON 27 Conference - By NahamSec - Owning The Clout Through Server Side Request Forgery](https://www.youtube.com/watch?v=o-tL9ULF0KI)
     34 +- [Orange Tsai - Infiltrating Corporate Intranet Like NSA Preauth RCE - DEF CON 27 Conference](https://www.youtube.com/watch?v=1IoythC_pIY)
     35 +- [Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!](https://www.youtube.com/watch?v=CIhHpkybYsY)
     36 +- [You've Got Pwned: Exploiting E-Mail Systems by @securinti #NahamCon2020!](https://www.youtube.com/watch?v=cThFNXrBYQU)
     37 +- [Practical Attacks Using HTTP Request Smuggling by @defparam #NahamCon2020](https://www.youtube.com/watch?v=3tpnuzFLU8g)
     38 +
     39 +### Vulnerabilities Explained
     40 +- [Subdomain Takeovers, beyond the basics for Pentesters and Bug Bounty Hunters](https://www.youtube.com/watch?v=q_A8aXLO1gA)
     41 +- [albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference](https://www.youtube.com/watch?v=w-eJM2Pc0KI)
     42 +- [Server-Side Template Injection: RCE For The Modern Web App](https://www.youtube.com/watch?v=3cT0uE7Y87s)
     43 +- [A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!](https://www.youtube.com/watch?v=voTHFdL9S2k)
     44 +- [Finding DOMXSS with DevTools | Untrusted Types Chrome Extension](https://www.youtube.com/watch?v=CNNCCgDkt5k)
     45 +- [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - STÖK & Fisher
     46 +- [AppSec EU 2017 Exploiting CORS Misconfigurations For Bitcoins And Bounties by James Kettle](https://www.youtube.com/watch?v=wgkj4ZgxI4c)
     47 +
     48 +### Mobile Hacking
     49 +- [Getting Started with Android App Testing with Genymotion](https://www.youtube.com/watch?v=_HRpLPrlg1U)
     50 +- [Exploiting Android deep links and exported components - Ekoparty Mobile Hacking Space Talk](https://www.youtube.com/watch?v=lg1sN8njSYs)
     51 +- [Android Hacking #VirSecCon2020](https://www.youtube.com/watch?v=mr64si_-YwI)
     52 +- [Advanced Android Bug Bounty skills - Ben Actis](https://www.youtube.com/watch?v=OLgmPxTHLuY)
     53 +- [Android Application Exploitation - Red Team Village](https://www.youtube.com/watch?v=uWT15hEM1dQ)
     54 +- [Android App Reverse Engineering LIVE!](https://www.youtube.com/watch?v=BijZmutY0CQ)
     55 +- [Android App Penetration Testing 101](https://www.youtube.com/watch?v=2uwhrfXCl4I)
     56 +- [Fun with Frida on Mobile](https://www.youtube.com/watch?v=dqA38-1UMxI)
     57 +
     58 +### Miscellaneous
     59 +- [Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps](https://www.youtube.com/watch?v=U6qTcpCfuFc)
     60 +- [Hacker101 - JavaScript for Hackers (Created by @STÖK)](https://www.youtube.com/watch?v=FTeE3OrTNoA)
     61 + 
  • ■ ■ ■ ■ ■ ■
    assets/tools.md
    skipped 56 lines
    57 57  #### OSINT Webpages
    58 58  | Name | Description | Created by |
    59 59  |------ |------------- |------------- |
     60 +|[Recon.Dev](https://www.recon.dev)|Recon Data specifically created for bug bounty hunters|[NahamSec & StaticFlow](https://www.recon.dev)|
    60 61  |[hunter.io](https://www.hunter.io)|Email Enumeration for big corps|[Hunter Team](https://hunter.io/about)|
    61 62  |[intelx.io](https://intelx.io/)|Swiss army Knife of OSINT|[Intelligence X](https://twitter.com/_IntelligenceX)|
    62 63  |[Shodan](https://www.shodan.io/)|Search engine that lets you find systems connected to the internet with a variety of filters|John Matherly|
    skipped 57 lines
    120 121   
    121 122  ---
    122 123  back to [Intro Page](/README.md)
     124 + 
  • ■ ■ ■ ■ ■
    assets/vulns.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3 3  ## Vulnerabilities 💉
    4  -Compact descriptions of common vulnerability types with links to useful resources.
     4 +This page is created to help hackers understand a specific vulnerability type in details. If you would like to read blog posts and see example vulnerability, please read the [blog posts](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/assets/blogsposts.md) page
     5 + 
    5 6  ### Online Resources
    6 7  - [Owasp Top 10](https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project)
    7 8  - [OWASP Testing Guide v4](https://www.owasp.org/index.php/OWASP_Testing_Project)
    8 9  - [Bug Bounty Cheat Sheets](https://github.com/EdOverflow/bugbounty-cheatsheet) - by EdOverflow
    9 10  ---
     11 + 
    10 12  ## Cross-Site Scripting (XSS)
    11 13  As we start to build this repository, we'll be adding more vulnerability types and resources for each one. XSS is a great place to start as it's one of the most popular and easiest vulnerabilities to find in a web application.
    12 14   
    skipped 13 lines
    26 28   
    27 29  ## XML External Entities (XXE)
    28 30  - [XML External Entities ft. JohnHammond](https://www.youtube.com/watch?v=gjm6VHZa_8s) - by PwnFunction
     31 + 
    29 32  ## Insecure Direct Object Reference (IDOR)
    30 33  - [Insecure Direct Object Reference Vulnerability](https://www.youtube.com/watch?v=rloqMGcPMkI) - by PwnFunction
    31 34  - [Finding Your First Bug: Manual IDOR Hunting](https://www.youtube.com/watch?v=gINAtzdccts) - by Insider PhD
    32 35  - [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - by STÖK & Fisher
     36 + 
    33 37  ## Open Redirect
    34 38  - [Open Redirect Vulnerability](https://www.youtube.com/watch?v=4Jk_I-cw4WE) - by PwnFunction
     39 + 
    35 40  ## HTTP Parameter Pollution
    36 41  - [HTTP Parameter Pollution Attacks](https://www.youtube.com/watch?v=QVZBl8yxVX0) - by PwnFunction
     42 + 
    37 43  ## Logic Errors
    38 44  - [Finding Your First Bug: Business Logic Errors](https://www.youtube.com/watch?v=RobCqW2KwGs) - by InsiderPhD
     45 + 
    39 46  ## Remote Code Execution
    40 47  - [Finding Your First Bug: Goal Setting / Remote Code Execution (RCE)](https://www.youtube.com/watch?v=5BTvTE3gEq8) - by InsiderPhD
    41 48  ---
    skipped 2 lines
Please wait...
Page is in error, reload to recover