🤬
  • ■ ■ ■ ■
    README.md
    skipped 5 lines
    6 6   
    7 7  We understand that there are more resources other than the ones we have listed and we hope to cover more resources in the near future!<br>
    8 8   
    9  -## Current Version: 2020.06
     9 +## Current Version: 2020.08
    10 10   
    11 11  [Changelog: See what's new!](/assets/changelog.md) 📣
    12 12   
    skipped 22 lines
  • ■ ■ ■ ■ ■ ■
    assets/blogposts.md
    skipped 77 lines
    78 78  - [How I was able to bypass OTP code requirement in Razer [The story of a critical bug]](https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572?) - Ananda Dhakal
    79 79  - [Bypassing GitHub's OAuth flow](https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html) - [@not_aardvark](https://twitter.com/not_aardvark)
    80 80  - [Subdomain Takeover to Authentication bypass](https://hackerone.com/reports/335330) - by geekboy
     81 +- [Ability to know the presence of a person in a private event even if the guest list is hidden.](https://bugreader.com/index.php?pageNav=vivekps143%40193) - by [Vivek PS](https://bugreader.com/vivekps143)
    81 82   
    82 83   
    83 84  ## SQL Injection
    skipped 37 lines
    121 122  - [GraphQL IDOR leads to information disclosure](https://medium.com/@R0X4R/graphql-idor-leads-to-information-disclosure-175eb560170d) - [@R0X4R](https://twitter.com/R0X4R)
    122 123  - [From Multiple IDORs leading to Code Execution on a different Host Container](https://www.rahulr.in/2019/10/idor-to-rce.html?m=1) - [@Rahul_R95](https://twitter.com/Rahul_R95)
    123 124  - [Automating BURP to find IDORs](https://medium.com/cyberverse/automating-burp-to-find-idors-2b3dbe9fa0b8) - [Aditya Soni](https://medium.com/@hetroublemakr)
     125 +- [Another image removal vulnerability on Facebook](https://blog.darabi.me/2020/06/image-removal-vulnerability-on-facebook.html) - by Pouya
    124 126   
    125 127  ## GraphQL
    126 128  - [Private System Note Disclosure using GraphQL](https://hackerone.com/reports/633001) - Ron Chan
    skipped 38 lines
  • ■ ■ ■ ■ ■
    assets/certs.md
    skipped 10 lines
    11 11   - [ALL NEW OSCP - REVAMPED 2020](https://www.youtube.com/watch?v=wjTt-5mfyhY)
    12 12  - [OSCP Preparation](https://github.com/superhero1/OSCP-Prep) by sup3rhero1
    13 13  - [TJnull’s Preparation Guide for PWK/OSCP](https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html)
     14 +- [hax](https://github.com/unmeg/hax) by unmeg (Useful scripts for OSCP boxes and other Certs)
    14 15   
    15 16  ---
    16 17  back to [Intro Page](/README.md)
  • ■ ■ ■ ■ ■ ■
    assets/changelog.md
    skipped 4 lines
    5 5  Updates to this repo will be pushed monthly. You can read about the latest changes below.
    6 6   
    7 7  ---
     8 +## ___Update 2020.08___
     9 +### Added
     10 +- [Tools](/assets/tools.md):
     11 + - **threader3000** in the Scanner section<br>
     12 + - **subfinder** in the Recon, OSINT & Discovery Section<br>
     13 + - **SUBway** in the Recon, OSINT & Discovery Section<br>
     14 + - **PenTest.ws** in the Notetaking Section<br>
     15 +- [Blogposts & Disclosed Reports](/assets/blogposts.md):
     16 + - **Ability to know the presence of a person in a private event even if the guest list is hidden.** - by Vivek PS<br>
     17 + - **Another image removal vulnerability on Facebook** - by Pouya<br>
     18 +- [Cheat Sheets](/assets/cheat.md):
     19 + - **CloudPentestCheatsheets**
     20 + - **HackTricks**
     21 + - **Everything curl**
     22 + - **GTFObins**
     23 + - **Finding ENdpoints in JS Files**
     24 + - **The Bug Hunter's Methodology v.4.01**
     25 +- [Certifications](/assets/certs.md):
     26 + - **hax**
     27 +- [Setup](/assets/setup.md):
     28 + - **Technical Project Ideas Towards Learning Cyber Security**
     29 + - **Getting Starting With Tmux Isn't That Scary**
     30 +- [Media](/assets/media.md):
     31 + - **The Linux Command Line**
     32 + - **The Mayor** in the Streamer Section
     33 + - Added **Nahamsec,Hacker101,TryHackMe,HTB,TCM,AshF0x,TheMayor,Sup3rhero1 6 Ceos3c** to Discord Servers
     34 + - Added **@PhillipWylie** on the Twitter-list
     35 +- [Health](/assets/health.md):
     36 + - **BSidesSF 2020 - Panel: Mental Health for Hackers (Chloé M • Ryan L • Susan P)**
     37 +### Changes
     38 +- Added a new section called [Cheat Sheets, Slides & More](/assets/cheat.md)
     39 +- Added a new subcategory in [Setup](/assets/setup.md) for Tools
     40 +- Added a sub category called [One Liners](/assets/cheat.md#One-Liners)
     41 +- Added a sub category called [Slides](/assets/cheat.md#Slides)
     42 +- Renamed "Media" to ["Media & Communities"](/assets/media.md)
     43 +- Added a new section called [Discord Servers](/assets/media.md#Discord-Servers) in "Media & Communities"
     44 +### Fixes
     45 +- fixed Notion Link
     46 + 
     47 +---
    8 48  ## ___Update 2020.06___
    9 49  ### Added
    10 50  - [Blogposts & Disclosed Reports](/assets/blogposts.md):
    skipped 221 lines
  • ■ ■ ■ ■ ■ ■
    assets/cheat.md
     1 +# Resources-for-Beginner-Bug-Bounty-Hunters
     2 + 
     3 +## Cheat Sheets, Slides & More 🧪
     4 + 
     5 +### Cheat Sheets
     6 +- [CloudPentestCheatsheets](https://github.com/dafthack/CloudPentestCheatsheets) by dafthack
     7 +- [HackTricks](https://book.hacktricks.xyz/) by Carlos Polop
     8 +- [Everything curl](https://ec.haxx.se/) by badger
     9 +- [GTFObins](https://gtfobins.github.io/)
     10 + 
     11 +### One Liners
     12 +- [Finding ENdpoints in JS Files](https://twitter.com/renniepak/status/1287804976669040642)
     13 + 
     14 +### Slides
     15 + 
     16 +- [The Bug Hunter's Methodology v.4.01](https://t.co/kfNNz0It7n?amp=1) - by Jason Haddix
     17 + 
     18 +---
     19 +back to [Intro Page](/README.md)
  • ■ ■ ■ ■
    assets/health.md
    skipped 7 lines
    8 8  Getting in the right Mindset:
    9 9  - [Mental Hacking 4 Better Bounties:](https://youtu.be/roVg_wgGgxQ) by STÖK
    10 10  - [Happy Hacking:](http://phrack.com/issues/68/7.html#article) Phrack Volume 0x0e, Issue 0x44, Phile #0x07 of 0x13
    11  - 
     11 +- [BSidesSF 2020 - Panel: Mental Health for Hackers (Chloé M • Ryan L • Susan P)](https://youtu.be/raH7tRy8M7g)
    12 12   
    13 13  ---
    14 14  back to [Intro Page](/README.md)
  • ■ ■ ■ ■ ■ ■
    assets/media.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Media Resources ��
     3 +## Media Resources & Communities ��
    4 4  Here you find listings to useful media creations that can help beginners in different ways.
    5 5   
    6 6  - [YouTube Channels](#Youtube-Channels)
    skipped 1 lines
    8 8  - [Podcasts](#Podcasts)
    9 9  - [Books](#Books)
    10 10  - [Twitter](#Twitter)
     11 +- [Discord Servers](#Discord-Servers)
    11 12  - [Misc](#Misc)
     13 + 
    12 14  ---
    13 15   
    14 16  ## Youtube Channels
    skipped 17 lines
    32 34  - [Jason Haddix](https://www.twitch.tv/js0n_x/) on Twitch
    33 35  - [sup3rhero1](https://www.twitch.tv/sup3rhero1) on Twitch
    34 36  - [STÖK](https://www.twitch.tv/stokfredrik) on Twitch
     37 +- [The Mayor](https://www.twitch.tv/themayor11) on Twitch
    35 38   
    36 39   
    37 40  ## Podcasts
    skipped 14 lines
    52 55  - [Web Hacking 101: How to Make Money Hacking Ethically](https://leanpub.com/web-hacking-101) by [Peter Yaworski](https://twitter.com/yaworsk)
    53 56  - [Black Hat Go](https://nostarch.com/blackhatgo) by Tom Steele, Chris Patten, and Dan Kottmann
    54 57  - [Black Hat Python](https://nostarch.com/blackhatpython) by Justin Seitz
     58 +- [The Linux Command Line](https://nostarch.com/tlcl2) by William Shotts
    55 59   
    56 60  In general ["no starch press"](https://nostarch.com/catalog/security) offers great books in the hacking category. [Humble Bundle](https://www.humblebundle.com) sometimes offfers great book deals for an awesome price, so have a eye out for those.
    57 61   
    skipped 70 lines
    128 132  | [@ZephrFish](https://twitter.com/ZephrFish) | BB,Researcher |
    129 133  | [@CalumBoal](https://twitter.com/CalumBoal) | Pentester, Software dev, Coder |
    130 134  | [@_superhero1](https://twitter.com/_superhero1) | Streamer, Content Creator, BB |
     135 +| [@PhillipWylie](https://twitter.com/PhillipWylie) | BB, Researcher, Pentester |
    131 136   
     137 + 
     138 +## Discord Servers
     139 +- [Nahamsec](https://discord.gg/d6dENAq)
     140 +- [Hacker101](https://discord.gg/WrCTm8h)
     141 +- [TryHackMe](https://discord.gg/KsAEejZ)
     142 +- [HackTheBox](https://discord.gg/FrRJ3Z8)
     143 +- [TheCyberMentor](https://discord.gg/)
     144 +- [AshF0x - The F0xbox](https://discord.gg/RCTy5zS)
     145 +- [The Mayor](https://discord.gg/EN2ya9h)
     146 +- [Sup3rhero1](https://discord.gg/pHfgvns)
     147 +- [Ceos3c](https://discord.gg/SBK3hkR)
    132 148   
    133 149  ## Misc
    134 150   - [ChaosComputerClub Germany Media Resources](https://media.ccc.de/) - bunch of conference talks and other media
    skipped 3 lines
  • ■ ■ ■ ■ ■ ■
    assets/setup.md
    skipped 12 lines
    13 13  - [Docker Tutorial for Beginners - A Full DevOps Course on How to Run Applications in Containers](https://www.youtube.com/watch?v=fqMOX6JJhGo) - freecodecamp
    14 14  - [Creating Wordlists for Pentesting & Bug Bounty](https://www.youtube.com/watch?v=QGbTaxtEQlg) - by nahamsec
    15 15  - [Setup bugbounty hunting env on termux](https://www.hahwul.com/2020/05/setup-bugbounty-hunting-env-on-termux-d.html?m=1) - by @hahwul
     16 +- [Technical Project Ideas Towards Learning Cyber Security](https://mchow01.github.io/education/security/projects/2020/06/19/technical_projects_security.html) - by [Ming Y. Chow](https://mchow01.github.io/)
    16 17  ## Burp Suite
    17 18  This section should help you get familiar with BurpSuite.
    18 19  - [Setting up Burp (Video Series)](https://www.hacker101.com/playlists/burp_suite) by Hacker101
    19 20  - [Burp Suite Introduction](https://github.com/bugcrowd/bugcrowd_university/blob/master/An_introduction_to_Burp_Suite/Bugcrowd%20University%20-%20Burp%20Suite%20Introduction.pdf) by Jason Haddix
    20 21  - [Beginners Guide to Burpsuite Payloads (Part 1)](https://www.hackingarticles.in/beginners-guide-burpsuite-payloads-part-1/) by Raj Chandel
    21 22  - [Burp Hacks for Bounty Hunters](https://www.youtube.com/watch?v=boHIjDHGmIo) by James Kettle
     23 +## Tools
     24 +- [Getting Starting With Tmux Isn't That Scary](https://www.youtube.com/watch?v=Z5sEEbwngd0)
    22 25  ---
    23 26  back to [Intro Page](/README.md)
  • ■ ■ ■ ■ ■
    assets/tools.md
    skipped 49 lines
    50 50  |[crithit](https://github.com/codingo/crithit)|Takes a single wordlist item and tests it one by one over a large collection of hosts before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.|C++|[codingo](https://github.com/codingo)|
    51 51  |[nuclei](https://github.com/projectdiscovery/nuclei)|"Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use."|Go|[ProjectDiscovery](https://github.com/projectdiscovery)|
    52 52  |[SpiderFoot](https://github.com/smicallef/spiderfoot)|SpiderFoot is an OSINT automation tool that queries over 100 data sources to build up a complete profile of your target, from host enumeration, to breached e-mail addresses and more.|Python|[SpiderFoot](http://twitter.com/spiderfoot)|
     53 +|[subfinder](https://github.com/projectdiscovery/subfinder)|subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and is optimized for speed. subfinder is built for doing one thing only - passive subdomain enumeration, and it does that very well.|Go|[ProjectDiscovery](https://github.com/projectdiscovery)|
     54 +|[SUBway](https://github.com/Sam-Lane/subway)|Enumerate subdomains by either using DNS lookup or by virtual hosting HTTP requests, useful for things like Hack The Box or Try Hack Me. SUBway requires a wordlist to use for subdomain discovery, SecLists is the recomended pairing for use with this tool.|Go|[Sam Lane](https://github.com/Sam-Lane)|
    53 55   
    54 56   
    55 57  #### OSINT Webpages
    skipped 26 lines
    82 84  |[Masscan](https://github.com/robertdavidgraham/masscan)|This is an Internet-scale port scanner. It can scan the entire Internet in under 6 minutes, transmitting 10 million packets per second, from a single machine.|C|Robert David Graham|
    83 85  |[KeyHacks](https://github.com/streaak/keyhacks)|Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.|/|streaak|
    84 86  |[Nmap command helper](https://competent-goldberg-e5eefe.netlify.app/)|A tool that helps you with nmap commands. Has a build in training feature to help memorizing them.||0x0n0x|
     87 +|[threader3000](https://github.com/dievus/threader3000)|Threader3000 is a script written in Python3 that allows multi-threaded port scanning. The program is interactive and simply requires you to run it to begin. Once started, you will be asked to input an IP address or a FQDN as Threader3000 does resolve hostnames. A full port scan should take less than 1 minute 30 seconds depending on your internet connection.|Python|[Joe Helle](https://github.com/dievus),[Tittimus](https://github.com/Sam-Lane),[plasticuproject](https://github.com/plasticuproject)|
    85 88  ### Mobile Hacking
    86 89  | Name | Description | Written in | Created by |
    87 90  |------ |------------- | ------------ |------------- |
    skipped 11 lines
    99 102  |------ |------------- | ------------ |------------- |
    100 103  |[Reconness](https://github.com/reconness/reconness)|"ReconNess helps you to run and keep all your #recon in the same place allowing you to focus only on the potentially vulnerable targets without distraction and without required a lot of bash skill or programing skill in general."|C#|[Reconness](https://github.com/reconness)|
    101 104  |[Updog](https://github.com/sc0tfree/updog)|"Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use HTTP basic auth."|Python|[sc0tfree](https://github.com/sc0tfree)|
    102  -|[Notion](notion.so)|"Write, plan, collaborate, and get organized — all in one tool."||Notion Labs|
     105 +|[Notion](https://notion.so)|"Write, plan, collaborate, and get organized — all in one tool."||Notion Labs|
    103 106  |[Joplin](https://joplinapp.org/)|"Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. The notes are searchable, can be copied, tagged and modified either from the applications directly or from your own text editor. The notes are in Markdown format."|JavaScript|Laurent Cozic|
    104 107  |[Xmind](https://www.xmind.net/)|XMind, a full-featured mind mapping and brainstorming tool, designed to generate ideas, inspire creativity, brings productivity in a remote WFH team.|/|XMind Ltd.|
    105 108  |[Axiom](https://github.com/pry0cc/axiom)|Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting.|Bash|[@pry0cc](https://twitter.com/pry0cc)|
     109 +|[PenTest.ws](https://pentest.ws/features)|PenTest.WS is a penetration testing web application for organizing hosts, services, vulnerabilities and credentials during a penetration test. A reporting module is available for documenting and delivering a full penetration test.||PenTest.ws|
    106 110   
    107 111  ### Others
    108 112  | Name | Description | Written in | Created by |
    skipped 10 lines
Please wait...
Page is in error, reload to recover