🤬
  • ■ ■ ■ ■ ■
    README.md
    skipped 5 lines
    6 6   
    7 7  We understand that there are more resources other than the ones we have listed and we hope to cover more resources in the near future!<br>
    8 8   
    9  -[Changelog: See what's new!](/assets/changelog.md)
     9 +## Current Version: 2020.02
     10 + 
     11 +[Changelog: See what's new!](/assets/changelog.md) 📣
    10 12   
    11 13  ---
    12 14  ## Table of Contents
    skipped 10 lines
  • ■ ■ ■ ■ ■
    assets/blogposts.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Blog posts
     3 +## Blog posts
    4 4  A collection of Blog Posts ordered by Vulnerability Types
    5 5  - [XSS](#XSS)
    6 6   - [DOM XSS](#DOM-XSS)
    skipped 12 lines
    19 19  - [Buffer Overflow](#Buffer-Overflow)
    20 20  - [IDOR](#IDOR)
    21 21  - [GraphQL](#GraphQL)
     22 +- [RCE](#RCE)
     23 +- [Recon](#Recon)
    22 24  - [Misc](#Misc)
     25 +---
    23 26  ## XSS
    24 27  You can find a ton of awesome XSS reports by searching through the HackerOne Hacktivity Page (https://hackerone.com/hacktivity?querystring=XSS). Here are some more complex and some of my favorite XSS related blog posts:
    25 28   
    skipped 66 lines
    92 95  - [Steal Earning of Airbnb hosts by Adding Bank Account/Payment Method](https://www.indoappsec.in/2019/12/airbnb-steal-earning-of-airbnb-hosts-by.html) - [Vijay Kumar ](https://twitter.com/IndoAppSec)
    93 96  - [GraphQL IDOR leads to information disclosure](https://medium.com/@R0X4R/graphql-idor-leads-to-information-disclosure-175eb560170d) - [@R0X4R](https://twitter.com/R0X4R)
    94 97  - [From Multiple IDORs leading to Code Execution on a different Host Container](https://www.rahulr.in/2019/10/idor-to-rce.html?m=1) - [@Rahul_R95](https://twitter.com/Rahul_R95)
     98 +- [Automating BURP to find IDORs](https://medium.com/cyberverse/automating-burp-to-find-idors-2b3dbe9fa0b8) - [Aditya Soni](https://medium.com/@hetroublemakr)
    95 99   
    96 100  ## GraphQL
    97 101  - [Private System Note Disclosure using GraphQL](https://hackerone.com/reports/633001) - Ron Chan
    98 102  - [Graphql Abuse to Steal Anyone’s Address](https://blog.usejournal.com/graphql-bug-to-steal-anyones-address-fc34f0374417) - pratik yadav
    99 103   
    100  -## Misc
     104 +## RCE
     105 +- [My First RCE (Stressed Employee gets me 2x bounty)](https://medium.com/@abhishake100/my-first-rce-stressed-employee-gets-me-2x-bounty-c4879c277e37) - [Abhishek Yadav](https://medium.com/@abhishake100)
     106 + 
     107 +## Recon
     108 +- [Subdomain Recon Using Certificate Search Technique](https://www.r00tpgp.com/2020/01/subdomain-recon-using-certificate.html?m=0)
    101 109  - [Notes about Nahamsecs Recon Sessions](https://mavericknerd.github.io/knowledgebase/nahamsec/recon_session_1/) - [maverickNerd](https://github.com/maverickNerd)
     110 + 
     111 +## Misc
    102 112  - [Hacking GitHub with Unicode's dotless 'i'](https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/)
    103 113  - [Abusing autoresponders and email bounces](https://medium.com/intigriti/abusing-autoresponders-and-email-bounces-9b1995eb53c2) - securinti
    104 114  - [Abusing HTTP hop-by-hop request headers](https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers) - [@nj_dav](https://twitter.com/nj_dav)
    105 115  - [Cracking reCAPTCHA, Turbo Intruder style](https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style) - James Kettle
    106 116  - [Abusing ImageMagick to obtain RCE](https://strynx.org/imagemagick-rce/) - [strynx](https://strynx.org/)
     117 +- [How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN](https://blog.detectify.com/2019/09/19/alyssa-herrera-pulse-corporate-networks-ssl-vpn/) - [Alyssa Herrera](https://twitter.com/Alyssa_Herrera_)
    107 118   
    108 119  ---
    109 120  back to [Intro Page](/README.md)
  • ■ ■ ■ ■ ■ ■
    assets/changelog.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Changelog
     3 +## Changelog
    4 4   
    5 5  Updates to this repo will be pushed monthly. You can read about the latest changes below.
     6 + 
     7 +---
     8 + 
     9 +## Update 2020.02
     10 +### Added
     11 +- New XSS Lab: **XSS Labs from PwnFunction**
     12 +- New Recon & OSINT Tool: **Reconness**
     13 +- New [IDOR Blogspost](/assets/blogposts.md#IDOR): **Automating BURP to find IDORs**
     14 +- New [Misc Blogpost](/assets/blogposts.md#Misc): **How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN**
     15 +- New Blogspost Category: [RCE](/assets/blogposts.md#RCE)
     16 + - New RCE Blogpost: **My First RCE (Stressed Employee gets me 2x bounty)**
     17 +- New Blogpost Cetegory: [Recon](/assets/blogposts.md#Recon)
     18 + - New Recon Blogpost/Guide: **Subdomain Recon Using Certificate Search Technique**
     19 +- New Vulnerabilities Post: **The 7 main XSS cases everyone should know**
     20 +- Added Jason Haddix to [Media](/assets/media.md) (contributed by [securibee](https://github.com/securibee))
     21 + 
     22 +## Changed
     23 +- Moved **Notes about Nahamsecs Recon Sessions** from [Misc](/assets/blogposts.md#Misc) to [Recon](/assets/blogposts.md#Recon)
     24 + 
     25 +### Fixed
     26 +- Typos in [Media](/assets/media.md) (contributed by [securibee](https://github.com/securibee))
     27 + 
     28 +---
    6 29   
    7 30  ## Update 2020.01
    8 31  ### Added
    skipped 12 lines
  • ■ ■ ■ ■ ■
    assets/labs.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Labs & Testing Environments
     3 +## Labs & Testing Environments
    4 4   
    5 5  ## General
    6 6  - [Hacker101](https://www.hacker101.com/) | Good Exercises for Beginners, can earn you private Invites on HackerOne
    skipped 4 lines
    11 11  - [DWVA](http://www.dvwa.co.uk)
    12 12  - [Google Gruyere](https://google-gruyere.appspot.com/)
    13 13  - [Web Security Academy by PortSwigger](https://portswigger.net/web-security)
     14 +- [XSS Labs from PwnFunction](https://xss.pwnfunction.com/) Great Labs in a beautiful layout
    14 15   
    15 16  ---
    16 17  back to [Intro Page](/README.md)
  • ■ ■ ■ ■ ■ ■
    assets/media.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Media Resources
     3 +## Media Resources
    4 4  Here you find listings to useful media creations that can help beginners in different ways.
    5 5   
    6  -- [YoutTube Channels](#Youtube-Channels)
     6 +- [YouTube Channels](#Youtube-Channels)
    7 7  - [Streamers](#Streamers)
    8 8  - [Podcasts](#Podcasts)
    9 9  - [Books](#Books)
    skipped 9 lines
    19 19  - [InsiderPhD](https://www.youtube.com/channel/UCPiN9NPjIer8Do9gUFxKv7A) - An excellent Introduction series for beginners to help them find their first bug.
    20 20  - [PwnFunction](https://www.youtube.com/PwnFunction) explanatory videos about Web App vulnerabilities
    21 21  - [DEFCONConference](https://www.youtube.com/user/DEFCONConference/videos) - Tons of Talks from Defcon.
     22 +- [Jason Haddix](https://www.youtube.com/channel/UCk0f0svao7AKeK3RfiWxXEA) - VODs of his Stream
    22 23   
    23 24  ## Streamers
    24 25  - [Nahamsec](https://www.twitch.com/nahamsec) on Twitch
    25 26  - [d0nutptr](https://www.twitch.tv/d0nutptr/) on Twitch
    26  -- [The Cyber Mentor](https://twitch.tv/theblindhackercybermentor) on Twitch
     27 +- [The Cyber Mentor](https://twitch.tv/thecybermentor) on Twitch
    27 28  - [The Blind Hacker](https://twitch.tv/theblindhacker) on Twitch
     29 +- [Jason Haddix](https://www.twitch.tv/js0n_x/) on Twitch
    28 30   
    29 31   
    30 32  ## Podcasts
    skipped 85 lines
  • ■ ■ ■ ■
    assets/mobile.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Mobile Hacking
     3 +## Mobile Hacking
    4 4  Since there are quite a lot of people asking for Beginner Guides to Mobile Hacking specificaly we gave it a section on itself.
    5 5   
    6 6  ## Getting Started
    skipped 9 lines
  • ■ ■ ■ ■
    assets/setup.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Setup
     3 +## Setup
    4 4  This section will help you set up your testing environement.
    5 5  - [Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation](https://www.youtube.com/watch?v=YhUiAH5SIqk) by nahamsec
    6 6  - [Setting up your own web server on a VPS](https://www.linux.com/learn/easy-lamp-server-installation)
    skipped 13 lines
  • ■ ■ ■ ■ ■
    assets/tools.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Tools
     3 +## Tools
    4 4   
    5 5  Here you can find links to a bunch of useful tools for Bug Bounty Hunting.
    6 6   
    skipped 26 lines
    33 33  |[httprobe](https://github.com/tomnomnom/httprobe)|Take a list of domains and probe for working http and https servers.|Go|[Tom Hudson](https://github.com/tomnomnom)|
    34 34  |[Osmedeus](https://github.com/j3ssie/Osmedeus)|Fully automated offensive security framework for reconnaissance and vulnerability scanning|Python|[j3ssie](https://github.com/j3ssie)|
    35 35  |[hakrawler](https://github.com/hakluke/hakrawler)|hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover Forms, Endpoints, Subdomains, Related documents and JS Files|Go|[@hakluke](https://twitter.com/hakluke)|
     36 +|[Reconness](https://github.com/reconness)|A Web App Tool to Run and Keep all your #recon in the same place.|C#|[@reconness](https://twitter.com/reconness)|
    36 37   
    37 38  #### OSINT Webpages
    38 39  | Name | Description | Created by |
    skipped 46 lines
  • ■ ■ ■ ■ ■
    assets/vulns.md
    1 1  # Resources-for-Beginner-Bug-Bounty-Hunters
    2 2   
    3  -## Vulnerabilities
     3 +## Vulnerabilities
    4 4  Compact descriptions of common vulnerability types with links to useful resources.
    5 5  ### Online Resources
    6 6  - [Owasp Top 10](https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project)
    skipped 9 lines
    16 16  - [Google Application Security (XSS Guide)](https://www.google.com/intl/am_AD/about/appsecurity/learning/xss/)
    17 17  - [What is PHP and why is XSS so common there?](https://www.youtube.com/watch?v=Q2mGcbkX550) - by LiveOverflow
    18 18  - [Finding Your First Bug: Cross Site Scripting (XSS)](https://www.youtube.com/watch?v=IWbmP0Z-yQg) - by InsiderPhD
     19 +- [The 7 main XSS cases everyone should know](https://brutelogic.com.br/blog/the-7-main-xss-cases-everyone-should-know/) - [brutelogic](https://brutelogic.com.br/blog/about/)
    19 20   
    20 21  ## Cross-Site Request Forgery (CSRF)
    21 22  - [Cross-Site Request Forgery Attack](https://www.youtube.com/watch?v=eWEgUcHPle0) - by PwnFunction
    skipped 17 lines
Please wait...
Page is in error, reload to recover