🤬
  • ■ ■ ■ ■ ■
    README.md
    skipped 19 lines
    20 20  - [Vulnerability Types](/assets/vulns.md)
    21 21  - [Mobile Hacking](/assets/mobile.md)
    22 22  - [Smart Contracts](/assets/smartcon.md)
     23 +- [Coding & Scripting](/assets/coding.md)
    23 24  - [Hardware & IoT](/assets/hardware.md)
    24 25  - [Blog posts & Talks](/assets/blogposts.md)
    25 26  - [Media Resources](/assets/media.md)
    skipped 1 lines
  • ■ ■ ■ ■ ■ ■
    assets/basics.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3 3  ## Table of Contents
    4  -1. [HTTP basics](#HTTP-basics)
    5  -2. [Networking basics](#Networking-basics)
    6  -3. [Programming Basics](#Programming-Basics)
    7  -4. [Automation](#Automation)
     4 +1. [Stanford CS 253 Web Security](#Stanford-CS-253-Web-Security)
     5 +2. [HTTP basics](#HTTP-basics)
     6 +3. [Networking basics](#Networking-basics)
     7 +4. [Programming Basics](#Programming-Basics)
     8 +5. [Automation](#Automation)
     9 + 
     10 + 
     11 +## Stanford CS 253 Web Security
     12 + 
     13 +- [Stanford CS 253 Web Security](https://web.stanford.edu/class/cs253/) - by [@feross](https://twitter.com/feross)
     14 + - "This course is a comprehensive overview of web security. The goal is to build an understanding of the most common web attacks and their countermeasures. Given the pervasive insecurity of the modern web landscape, there is a pressing need for programmers and system designers to improve their understanding of web security issues."
    8 15   
    9 16  ## HTTP basics
    10 17  In order to be able to learn what and how an application works, you need to be able to understand how you are communicating with it. This section is dedicated to all the resources to understand the HTTP basics.
    skipped 71 lines
  • ■ ■ ■ ■ ■ ■
    assets/blogposts.md
    skipped 33 lines
    34 34  - [Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty](https://medium.com/bugbountywriteup/effortlessly-finding-cross-site-script-inclusion-xssi-jsonp-for-bug-bounty-38ae0b9e5c8a) - [@th3_hidd3n_mist](https://twitter.com/th3_hidd3n_mist)
    35 35  - [Microsoft Edge (Chromium) - EoP via XSS to Potential RCE](https://leucosite.com/Edge-Chromium-EoP-RCE/) - [@Qab](https://twitter.com/qab)
    36 36  - [Reflected XSS in https://blocked.myndr.net](https://hackerone.com/reports/824433) - Thilakesh
     37 +- [Google Bug Bounty Writeup- XSS Vulnerability](https://pethuraj.com/blog/google-bug-bounty-writeup/) - [@itsmepethu](https://twitter.com/itsmepethu)
    37 38   
    38 39   
    39 40  ### DOM XSS
    skipped 56 lines
    96 97  - [Fasten your Recon process using Shell Scripting](https://medium.com/bugbountywriteup/fasten-your-recon-process-using-shell-scripting-359800905d2a) - Mohd Shibli
    97 98  - [Beginner’s Guide to recon automation](https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb) - Ashish Jha
    98 99  - [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - STÖK & Fisher
     100 +- [gitGraber: A tool to monitor GitHub in real-time to find sensitive data](https://blog.yeswehack.com/2019/10/08/gitgraber-a-tool-to-monitor-github-in-real-time-to-find-sensitive-data/) - by [@adrien_jeanneau](https://twitter.com/adrien_jeanneau) & [@R_Marot](https://twitter.com/R_marot)
    99 101   
    100 102  ## Buffer Overflow
    101 103  - [Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty](https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/) - [Sam Curry](https://twitter.com/samwcyo)
    skipped 17 lines
    119 121  - [Subdomain Recon Using Certificate Search Technique](https://www.r00tpgp.com/2020/01/subdomain-recon-using-certificate.html?m=0)
    120 122  - [Notes about Nahamsecs Recon Sessions](https://mavericknerd.github.io/knowledgebase/nahamsec/recon_session_1/) - [maverickNerd](https://github.com/maverickNerd)
    121 123  - [10 Recon Tools For Bug Bounty](https://medium.com/@hackbotone/10-recon-tools-for-bug-bounty-bafa8a5961bd) - Anshuman Pattnaik
     124 +- [Recon: Create a methodology and start your subdomain enumeration](https://failednuke.info/2020/recon-create-a-methodology-and-start-your-subdomain-enumeration/) - by FailedNuke
    122 125   
    123 126  ## Smart Contracts
    124 127  - [Steal collateral during `end` process, by earning DSR interest after `flow](https://hackerone.com/reports/672664)(Listed as Business Logic Error)
    skipped 9 lines
    134 137  - [Cracking reCAPTCHA, Turbo Intruder style](https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style) - James Kettle
    135 138  - [Abusing ImageMagick to obtain RCE](https://strynx.org/imagemagick-rce/) - [strynx](https://strynx.org/)
    136 139  - [How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN](https://blog.detectify.com/2019/09/19/alyssa-herrera-pulse-corporate-networks-ssl-vpn/) - [Alyssa Herrera](https://twitter.com/Alyssa_Herrera_)
     140 +- [2 Cases of Path Traversal](https://jlajara.gitlab.io/posts/2020/03/29/Path_Traversal.html) - by [@leonishan_](https://twitter.com/leonishan_)
     141 +- [Top 10 web hacking techniques of 2019](https://portswigger.net/research/top-10-web-hacking-techniques-of-2019) - by [James Kettle](https://twitter.com/albinowax)
     142 +- [Understanding Search Syntax on Github](https://help.github.com/en/github/searching-for-information-on-github/understanding-the-search-syntax#exclude-certain-results) - by Github
    137 143   
    138 144   
    139 145  ---
    skipped 1 lines
  • ■ ■ ■ ■ ■ ■
    assets/changelog.md
    skipped 6 lines
    7 7  ---
    8 8  ## Update 2020.04
    9 9  ### Added
    10  -- New: [Hardware & IoT](/assets/hardware.md)
    11  - - Added Exploitee.rs Wiki
     10 +- New in [Basics](/assets/basics.md)
     11 + - Added **Stanford CS 253 Web Security**
     12 +- New Category: [Hardware & IoT](/assets/hardware.md)
     13 + - Added **Exploitee.rs Wiki**
     14 +- New Category: [Coding & Scripting](/assets/coding.md)
     15 + - Added **Bash Scripting Full Course 3 Hours**
     16 + - Added **ShellCheck**
     17 + - Added **Explainshell**
     18 + - Added **Discovering the Terminal**
     19 + - Added **Text Processing in the Shell**
    12 20  - New [Podcasts](/assets/media.md#Podcasts):
    13  - - Darknet Diaries Episode 60 with dawgyg
    14  - - The Bug Bounty Podscast Episode 3 with nahamsec
     21 + - **Darknet Diaries Episode 60** with dawgyg
     22 + - **The Bug Bounty Podscast Episode 3** with nahamsec
    15 23  - New in [Tools](/assets/tools.md):
    16  - - objection - A new Mobile tool
    17  - - CyberChef
     24 + - **crithit**
     25 + - **objection - A new Mobile tool**
     26 + - **CyberChef**
     27 + - **RMS - Runtime Mobile Security**
    18 28   - New Category: [Notes & Organization](/assets/tools.md#Notes-&-Organization)
    19  - - Reconness to [Notes & Organization](/assets/tools.md#Notes-&-Organization)
    20  - - Updog to [Notes & Organization](/assets/tools.md#Notes-&-Organization)
     29 + - **Reconness** to [Notes & Organization](/assets/tools.md#Notes-&-Organization)
     30 + - **Updog** to [Notes & Organization](/assets/tools.md#Notes-&-Organization)
    21 31   - New Category: [Burp Extensions](/assets/tools.md#Burp-Extensions)
    22  - - Logger++ to [Burp Extensions](/assets/tools.md#Burp-Extensions)
    23  - - AuthMatrix to [Burp Extensions](/assets/tools.md#Burp-Extensions)
    24  - - Autorize to [Burp Extensions](/assets/tools.md#Burp-Extensions)
    25  - - Auto Repeater to [Burp Extensions](/assets/tools.md#Burp-Extensions)
    26  - - Progress Tracker to [Burp Extensions](/assets/tools.md#Burp-Extensions)
    27  - - Flow to [Burp Extensions](/assets/tools.md#Burp-Extensions)
     32 + - **Logger++** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
     33 + - **AuthMatrix** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
     34 + - **Autorize** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
     35 + - **Auto Repeater** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
     36 + - **Progress Tracker** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
     37 + - **Flow** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
    28 38  - New in [Labs](/assets/labs.md):
    29  - - TryHackMe & Videos
     39 + - **TryHackMe & Videos**
     40 +- New in Media:
     41 + - **@codingo_** now in Twitter-List
    30 42  - New [Streamers](/assets/media.md#Streamers):
    31 43   - [sup3rhero1](https://www.twitch.tv/sup3rhero1)
    32 44   - [STÖK](https://www.twitch.tv/stokfredrik)
    33 45  - New in [BlogPosts](/assets/blogposts.md):
    34 46   - New Category: [API](/assets/blogposts.md#API)
    35  - - Added "31 Days of API Security Tips" - Misc
    36  - - Added "Blind SQL Injection on windows10.hi-tech.mail.ru" - SQLInjection
    37  - - Added "DOM XSS on app.starbucks.com via ReturnUrl" - DOMXSS
    38  - - Added "Email address of any user can be queried on Report Invitation GraphQL type when username is known" - GraphQL
    39  - - Added "External XML Entity via File Upload (SVG)" - File Upload
    40  - - Added "Mass account takeovers using HTTP Request Smuggling on https://slackb.com/ to steal session cookies" - HTTP Desync
     47 + - Added **31 Days of API Security Tips**- Misc
     48 + - Added **Blind SQL Injection on windows10.hi-tech.mail.ru** - SQLInjection
     49 + - Added **DOM XSS on app.starbucks.com via ReturnUrl** - DOMXSS
     50 + - Added **Email address of any user can be queried on Report Invitation GraphQL type when username is known** - GraphQL
     51 + - Added **External XML Entity via File Upload (SVG)** - File Upload
     52 + - Added **Mass account takeovers using HTTP Request Smuggling on https://slackb.com/ to steal session cookies** - HTTP Desync
     53 + - Added **gitGraber: A tool to monitor GitHub in real-time to find sensitive data** - by [@adrien_jeanneau](https://twitter.com/adrien_jeanneau) & [@R_Marot](https://twitter.com/R_marot)
     54 + - Added **2 Cases of Path Traversal** by [@leonishan_](https://twitter.com/leonishan_)
     55 + - Added **Google Bug Bounty Writeup- XSS Vulnerability** - by [@itsmepethu](https://twitter.com/itsmepethu)
     56 + - Added **Top 10 web hacking techniques of 2019** by [James Kettle](https://twitter.com/albinowax)
     57 + - Added **Recon: Create a methodology and start your subdomain enumeration** - by FailedNuke
     58 + - Added **Understanding Search Syntax on Github** - by Github
    41 59  - New in [Mobile](/assets/mobile.md):
    42 60   - [Android-Reports-and-Resources](https://github.com/B3nac/Android-Reports-and-Resources)
     61 +- New in [Vulnerabilities](/assets/vulns.md):
     62 + - New Video: **Cross-Site Scripting (XSS) Explained** -by PwnFunction
     63 +- New in [Setup](/assets/setup.md):
     64 + - Added **Docker Tutorial for Beginners - A Full DevOps Course on How to Run Applications in Containers**
    43 65  ### Changed
    44 66  ### Fixed
    45 67   
    skipped 71 lines
  • ■ ■ ■ ■ ■ ■
    assets/coding.md
     1 +# Resources-for-Beginner-Bug-Bounty-Hunters
     2 + 
     3 +## Coding & Scripting ⚙️
     4 + 
     5 +### Info
     6 + 
     7 +### Resources
     8 +- [Bash Scripting Full Course 3 Hours](https://www.youtube.com/watch?v=e7BufAVwDiM)
     9 +- [Explainshell](https://explainshell.com/)
     10 +- [Discovering the Terminal](https://blog.balthazar-rouberol.com/discovering-the-terminal)
     11 +- [Text Processing in the Shell](https://blog.balthazar-rouberol.com/text-processing-in-the-shell)
     12 +- [Subdomain Enumeration Script](https://twitter.com/Sin_Khe/status/1242785016884625409)
     13 +- [ShellCheck](https://www.shellcheck.net/) - for finding Bugs in your Shell Scripts
     14 + 
     15 +---
     16 +back to [Intro Page](/README.md)
  • ■ ■ ■ ■
    assets/hardware.md
    skipped 2 lines
    3 3  ## Hardware & IoT ⚙️
    4 4   
    5 5  ### Resources
    6  -- [Exploitee.rs Wiki](https://www.exploitee.rs/index.php/Main_Page) - IoT Wiki Page with a bunch of Info when getting into Hardware
     6 +- [Exploitee.rs Wiki](https://www.exploitee.rs/index.php/Main_Page) - IoT Wiki Page with a bunch of Info when getting into Hardware (provided by @securibee )
    7 7  ---
    8 8  back to [Intro Page](/README.md)
  • ■ ■ ■ ■ ■
    assets/media.md
    skipped 85 lines
    86 86  | [@autothreat](https://twitter.com/autothreat) | Hacking, Cars |
    87 87  | [@brutelogic](https://twitter.com/brutelogic) | Researcher, Teaching, XSS |
    88 88  | [@ceos3c](https://twitter.com/ceos3c) | YouTuber, General Hacking, Teaching |
     89 +| [@codingo_](https://twitter.com/codingo_) | General Hacking, Bug Bounty, Coding |
    89 90  | [@d0nutptr](https://twitter.com/d0nutptr) | BB, Researcher, (Rust.) |
    90 91  | [@daeken](https://twitter.com/daeken) | BB, Researcher |
    91 92  | [@evilsocket](https://twitter.com/evilsocket) | Hacking, Coding, Hardware, Tools |
    skipped 30 lines
  • ■ ■ ■ ■
    assets/setup.md
    skipped 9 lines
    10 10  - [Previously Disclosed Vulnerabilities / HackerOne Hacktivity](https://hackerone.com/hacktivity)
    11 11  - [Finding your First Bug and Getting a Bounty - Personal Story by @InsiderPhD](https://www.youtube.com/watch?v=iEDoIEBD7gM) - YouTube Discussion
    12 12  - [Introduction to Docker for CTFs](https://www.youtube.com/watch?v=cPGZMt4cJ0I) (Works for Bug Bounty too) - by LiveOverflow
    13  - 
     13 +- [Docker Tutorial for Beginners - A Full DevOps Course on How to Run Applications in Containers](https://www.youtube.com/watch?v=fqMOX6JJhGo) - freecodecamp
    14 14  ## Burp Suite
    15 15  This section should help you get familiar with BurpSuite.
    16 16  - [Setting up Burp (Video Series)](https://www.hacker101.com/playlists/burp_suite) by Hacker101
    skipped 5 lines
  • ■ ■ ■ ■ ■
    assets/tools.md
    skipped 45 lines
    46 46  |[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning|Python|[j3ssie](https://github.com/j3ssie)|
    47 47  |[hakrawler](https://github.com/hakluke/hakrawler)|hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover Forms, Endpoints, Subdomains, Related documents and JS Files|Go|[@hakluke](https://twitter.com/hakluke)|
    48 48  |[Reconness](https://github.com/reconness)|A Web App Tool to Run and Keep all your #recon in the same place.|C#|[@reconness](https://twitter.com/reconness)|
    49  -|[Kockpy](https://github.com/guelfoweb/knock)|A python tool designed to enumerate subdomains on a target domain through a wordlist|Python|[@guelforweb](http://twitter.com/guelfoweb)|
     49 +|[Knockpy](https://github.com/guelfoweb/knock)|A python tool designed to enumerate subdomains on a target domain through a wordlist|Python|[@guelforweb](http://twitter.com/guelfoweb)|
     50 +|[crithit](https://github.com/codingo/crithit)|Takes a single wordlist item and tests it one by one over a large collection of hosts before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.|C++|[codingo](https://github.com/codingo)|
    50 51   
    51 52   
    52 53  #### OSINT Webpages
    skipped 36 lines
    89 90  |[andriller](https://github.com/den4uk/andriller)|Andriller - is software utility with a collection of forensic tools for smartphones. It performs read-only, forensically sound, non-destructive acquisition from Android devices. [andriller.com](https://www.andriller.com/)|Python|[Denis Sazonov](https://github.com/den4uk)|
    90 91  |[Mobile Security Framework (MobSF)](https://github.com/MobSF/Mobile-Security-Framework-MobSF/)|Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. MobSF support mobile app binaries (APK, IPA & APPX) along with zipped source code and provides REST APIs for seamless integration with your CI/CD or DevSecOps pipeline.The Dynamic Analyzer helps you to perform runtime security assessment and interactive instrumented testing.|Python|MobSF Team|
    91 92  |[objection](https://github.com/sensepost/objection)|"objection is a runtime mobile exploration toolkit, powered by Frida, built to help you assess the security posture of your mobile applications, without needing a jailbreak."|Python & TypeScript|[sensepost](https://github.com/sensepost)|
     93 +|[RMS - Runtime Mobile Security](https://github.com/m0bilesecurity/RMS-Runtime-Mobile-Security)|Runtime Mobile Security (RMS) is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime|Python|[@mobilesecurity_](https://twitter.com/mobilesecurity_)|
    92 94   
    93 95  ### Notes & Organization
    94 96  | Name | Description | Written in | Created by |
    skipped 14 lines
  • ■ ■ ■ ■ ■
    assets/vulns.md
    skipped 16 lines
    17 17  - [What is PHP and why is XSS so common there?](https://www.youtube.com/watch?v=Q2mGcbkX550) - by LiveOverflow
    18 18  - [Finding Your First Bug: Cross Site Scripting (XSS)](https://www.youtube.com/watch?v=IWbmP0Z-yQg) - by InsiderPhD
    19 19  - [The 7 main XSS cases everyone should know](https://brutelogic.com.br/blog/the-7-main-xss-cases-everyone-should-know/) - [brutelogic](https://brutelogic.com.br/blog/about/)
     20 +- [Cross-Site Scripting (XSS) Explained](https://www.youtube.com/watch?v=EoaDgUgS6QA) - by LiveOverflow
    20 21   
    21 22  ## Cross-Site Request Forgery (CSRF)
    22 23  - [Cross-Site Request Forgery Attack](https://www.youtube.com/watch?v=eWEgUcHPle0) - by PwnFunction
    skipped 19 lines
Please wait...
Page is in error, reload to recover