mirror of
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters.git
synced 2024-11-24 20:53:05 +00:00
2021 update
This commit is contained in:
parent
a1c5710116
commit
0e4d8ab3b9
12 changed files with 459 additions and 207 deletions
|
@ -1,7 +1,7 @@
|
|||
A Big Thank You to the Main-Contributors of the Repo:<br>
|
||||
Securibee<br>
|
||||
Nahamsec<br>
|
||||
NahamSec<br>
|
||||
AshF0x<br>
|
||||
Cody Brocious (@daeken)<br>
|
||||
daeken<br>
|
||||
|
||||
and of course everyone else who sends in suggestions for the repo itself <3
|
||||
and of course everyone else who sends in suggestions for the repo itself <3
|
||||
|
|
|
@ -6,9 +6,9 @@ There are a number of new hackers joining the community on a regular basis and m
|
|||
|
||||
We understand that there are more resources other than the ones we have listed and we hope to cover more resources in the near future!<br>
|
||||
|
||||
## Current Version: 2020.08
|
||||
If you are interested in learning about top bug bounty hunters in the community check out my [Live Recon VODs](https://www.youtube.com/playlist?list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA).
|
||||
## Current Version: 2020.12
|
||||
|
||||
[Changelog: See what's new!](/assets/changelog.md) 📣
|
||||
|
||||
---
|
||||
## Table of Contents
|
||||
|
@ -17,6 +17,7 @@ We understand that there are more resources other than the ones we have listed a
|
|||
- [Setup](/assets/setup.md)
|
||||
- [Tools](/assets/tools.md)
|
||||
- [Labs & Testing Environments](/assets/labs.md)
|
||||
- [Talks](/assets/talks.md)
|
||||
- [Vulnerability Types](/assets/vulns.md)
|
||||
- [Mobile Hacking](/assets/mobile.md)
|
||||
- [Smart Contracts](/assets/smartcon.md)
|
||||
|
@ -28,6 +29,6 @@ We understand that there are more resources other than the ones we have listed a
|
|||
- [Mindset & Mental Health](/assets/health.md)
|
||||
|
||||
---
|
||||
If you have more questions or suggestions, check our [NahamSec's Discord](https://discord.gg/9jZxjQ5)!<br>
|
||||
If you have more questions or suggestions, check out [NahamSec's Discord](https://discord.gg/9jZxjQ5)!<br>
|
||||
Also, feel free to check out the other resources:
|
||||
- Nahamsec on [YouTube](https://www.youtube.com/channel/UCCZDt7MuC3Hzs6IH4xODLBw) and on [Twitch](https://www.twitch.tv/nahamsec)
|
||||
- Nahamsec on [YouTube](https://www.youtube.com/NahamSec) and on [Twitch](https://www.twitch.tv/nahamsec)
|
||||
|
|
100
assets/basics.md
100
assets/basics.md
|
@ -1,6 +1,5 @@
|
|||
# Resources-for-Beginner-Bug-Bounty-Hunters
|
||||
|
||||
|
||||
## Basics 🤓
|
||||
|
||||
### Table of Contents
|
||||
|
@ -9,68 +8,55 @@
|
|||
3. [Networking basics](#Networking-basics)
|
||||
4. [Programming Basics](#Programming-Basics)
|
||||
5. [Automation](#Automation)
|
||||
6. [Computing Fundamentals](#Computing-Fundamentals)
|
||||
6. [Linux basics](#Linux-Basics)
|
||||
7. [Web Server Basics](#Web-Server-Basics)
|
||||
8. [Computing Fundamentals](#Computing-Fundamentals)
|
||||
9. [Hacking Basics](#Hacking-Basics)
|
||||
|
||||
### Stanford CS 253 Web Security
|
||||
|
||||
- [Stanford CS 253 Web Security](https://web.stanford.edu/class/cs253/) - by [@feross](https://twitter.com/feross)
|
||||
- "This course is a comprehensive overview of web security. The goal is to build an understanding of the most common web attacks and their countermeasures. Given the pervasive insecurity of the modern web landscape, there is a pressing need for programmers and system designers to improve their understanding of web security issues."
|
||||
|
||||
### HTTP basics
|
||||
In order to be able to learn what and how an application works, you need to be able to understand how you are communicating with it. This section is dedicated to all the resources to understand the HTTP basics.
|
||||
- All in one resource: https://www.hacker101.com/sessions/web_in_depth
|
||||
- HTTP basics
|
||||
- Cookie security
|
||||
- HTML parsing
|
||||
- MIME sniffing
|
||||
- Encoding sniffing
|
||||
- Same-Origin Policy
|
||||
- [All in one resource](https://www.hacker101.com/sessions/web_in_depth)
|
||||
- HTTP basics
|
||||
- Cookie security
|
||||
- HTML parsing
|
||||
- MIME sniffing
|
||||
- Encoding sniffing
|
||||
- Same-Origin Policy
|
||||
- CSRF (Cross-Site Request Forgery)
|
||||
- Request form
|
||||
https://www.tutorialspoint.com/http/http_requests.htm
|
||||
- Response form
|
||||
https://www.tutorialspoint.com/http/http_responses.htm
|
||||
- Response codes
|
||||
https://www.tutorialspoint.com/http/http_status_codes.htm
|
||||
- URL Encoding
|
||||
https://www.tutorialspoint.com/http/http_url_encoding.htm
|
||||
- [Request form](https://www.tutorialspoint.com/http/http_requests.htm)
|
||||
- [Response form](https://www.tutorialspoint.com/http/http_responses.htm)
|
||||
- [Response codes](https://www.tutorialspoint.com/http/http_status_codes.htm)
|
||||
- [URL Encoding](https://www.tutorialspoint.com/http/http_url_encoding.htm)
|
||||
|
||||
|
||||
### Networking basics
|
||||
Recon is a common terminology used in bug bounties. It’s great if you are already using tools to scan a range of IPs for open ports or find subdomain, however, you should first understand why these things matter and how they work.
|
||||
- Terminology
|
||||
https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols
|
||||
- What is an IP?
|
||||
https://commotionwireless.net/docs/cck/networking/learn-networking-basics/
|
||||
- What are ports?
|
||||
https://www.utilizewindows.com/list-of-common-network-port-numbers/
|
||||
- What is DNS?
|
||||
https://code.tutsplus.com/tutorials/an-introduction-to-learning-and-using-dns-records--cms-24704
|
||||
- Intermediate Security Testing with Kali Linux 2
|
||||
http://www.penguintutor.com/linux/basic-network-reference
|
||||
- [Terminology](https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols)
|
||||
- [What is an IP?](https://commotionwireless.net/docs/cck/networking/learn-networking-basics/)
|
||||
- [What are ports?](https://www.utilizewindows.com/list-of-common-network-port-numbers/)
|
||||
- [What is DNS?](https://code.tutsplus.com/tutorials/an-introduction-to-learning-and-using-dns-records--cms-24704)
|
||||
- [Intermediate Security Testing with Kali Linux 2](http://www.penguintutor.com/linux/basic-network-reference)
|
||||
- [Network Fundamentals](https://www.youtube.com/playlist?list=PLDQaRcbiSnqF5U8ffMgZzS7fq1rHUI3Q8), A 19 part Video Series about Networking well explained for Beginners
|
||||
|
||||
|
||||
### Programming Basics
|
||||
Being a great programmer is not a requirement to be a successful hacker. However, having the ability to make an educated guess, may increase your chances of successfully identifying and exploiting an issue. In a number of cases, you may need to automate your work or know more than just the “basics” in order to escalate a bug with a medium severity to high/critical.
|
||||
|
||||
- HTML: HTML is very easy to learn and there are a ton of free resources for it. If you are interested in learning about XSS this should be your first step.
|
||||
If you prefer an interactive tool to learn about Javascript, I highly recommend Codecademy!
|
||||
https://www.codecademy.com/learn/learn-html
|
||||
https://www.w3schools.com/html/
|
||||
|
||||
- JavaScript: Once you have familiarized yourself with HTML, you should understand Javascript since you will be using it to exploit XSS vulnerabilities. The usage of Javascript isn’t just limited to when you are exploring XSS, so it’s a very handy programming language to know.
|
||||
If you prefer an interactive tool to learn about Javascript, I highly recommend Codecademy! https://www.codecademy.com/learn/introduction-to-javascript
|
||||
|
||||
- SQL: You may have guessed It already, but you won’t be able to exploit complex SQL injection vulnerabilities before having any SQL knowledge.
|
||||
As always, if you prefer an interactive course, feel free to use Codecademy!
|
||||
Being a great programmer is not a requirement to be a successful hacker. However, having the ability to make an educated guess, may increase your chances of successfully identifying and exploiting an issue. In a number of cases, you may need to automate your work or know more than just the “basics” in order to escalate a bug with a medium severity to high/critical.
|
||||
- HTML: HTML is very easy to learn and there are a ton of free resources for it. If you are interested in learning about XSS this should be your first step. If you prefer an interactive tool to learn about JavaScript, I highly recommend [Codecademy](http://ssqt.co/mQfH8zl) or [W3Schools](https://www.w3schools.com/html/)!
|
||||
- JavaScript: Once you have familiarized yourself with HTML, you should understand JavaScript since you will be using it to exploit XSS vulnerabilities. The usage of JavaScript isn’t just limited to when you are exploring XSS, so it’s a very handy programming language to know.
|
||||
If you prefer an interactive tool to learn about JavaScript, I highly recommend [CodeCademy](http://ssqt.co/mQfH8zl)!
|
||||
- SQL: You may have guessed It already, but you won’t be able to exploit complex SQL injection vulnerabilities before having any SQL knowledge.
|
||||
As always, if you prefer an interactive course, feel free to use [CodeCademy](http://ssqt.co/mQfH8zl)!
|
||||
https://www.codecademy.com/learn/learn-sql
|
||||
http://www.sqlcourse.com/
|
||||
http://www.sqlcourse.com/
|
||||
|
||||
### Automation
|
||||
### Automation
|
||||
You are welcome to skip this section if you think you’ll never need any automation or in depth web application knowledge. However I think learning bash in addition to one the following four languages may help you work smarter rather than harder.
|
||||
- Bash
|
||||
- https://www.learnshell.org/
|
||||
- https://www.learnshell.org/
|
||||
- https://explainshell.com/
|
||||
- Ruby
|
||||
- https://www.learnrubyonline.org/
|
||||
|
@ -83,12 +69,38 @@ You are welcome to skip this section if you think you’ll never need any automa
|
|||
- https://docs.python.org/3/tutorial/
|
||||
- http://www.sqlcourse.com/
|
||||
- https://en.wikibooks.org/wiki/Programming_Fundamentals/Advanced_Flowcharting
|
||||
- PHP
|
||||
- https://php.net
|
||||
|
||||
### Computing Fundamentals
|
||||
### Web Server Basics
|
||||
If you are looking into getting started with Bug Bounties with a focus on web, I highly recommend learning the nuts and bolts of what make a website work.
|
||||
|
||||
- [Installing Apache, MySQL, PHP on Windows 10](https://codebriefly.com/how-to-setup-apache-php-mysql-on-windows-10/)
|
||||
- [Installing Apache, MySQL, PHP on Ubuntu](https://www.digitalocean.com/community/tutorials/how-to-install-linux-apache-mysql-php-lamp-stack-ubuntu-18-04)
|
||||
- [Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation](https://www.youtube.com/watch?v=YhUiAH5SIqk)
|
||||
|
||||
After creating your own web server, I highly recommend installing a CMS (like Wordpress or drupal) on your localhost to understand how it all works.
|
||||
|
||||
### Linux Basics
|
||||
- [Install WSL on Windows 10](https://ubuntu.com/wsl)
|
||||
- [Basics Linux Commands](https://www.hostinger.com/tutorials/linux-commands)
|
||||
- [How to use curl](https://flaviocopes.com/http-curl/)
|
||||
- [Loops](https://tldp.org/HOWTO/Bash-Prog-Intro-HOWTO-7.html)
|
||||
- [xargs](https://www.cyberciti.biz/faq/linux-unix-bsd-xargs-construct-argument-lists-utility/)
|
||||
|
||||
### Computing Fundamentals
|
||||
- [Hopper's Roppers Computing Fundamentals](https://www.hoppersroppers.org/course.html)
|
||||
- This free course teaches the absolute basics of Linux, hardware, networking, operating systems, and scripting. Designed to get a complete beginner over the first big learning hurdles and so they can move on to anything else and succeed.
|
||||
- [Exeter Q-Step Resources](https://exeter-qstep-resources.github.io/)
|
||||
- Here, you will find a range of teaching materials that have been developed by members of the Q-Step Centre. If you have any questions, please contact l.brace@exeter.ac.uk or qstep@exeter.ac.uk. Details of Q-Step workshops and events can be found at https://socialsciences.exeter.ac.uk/q-step/events.
|
||||
|
||||
### Bug Bounty Basics
|
||||
- [Bug bounty reports that stand out, how to write one?](https://thehackerish.com/bug-bounty-reports-that-stand-out-how-to-write-one/)
|
||||
- [Bug Bounty Report Templates by @ZephrFish](https://github.com/ZephrFish/BugBountyTemplates/blob/master/Blank.md)
|
||||
- [Hacker101- Writing Good Reports](https://www.youtube.com/watch?v=z60CFFFyZWE)
|
||||
- [List of Bug Bounty Platforms](https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/bugbountyplatforms.md)
|
||||
- [Bug Bounty Cheatsheet](https://m0chan.github.io/2019/12/17/Bug-Bounty-Cheetsheet.html)
|
||||
- [HOW TO GET STARTED IN BUG BOUNTY](https://www.youtube.com/watch?v=CU9Iafc-Igs)
|
||||
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
|
@ -1,4 +1,31 @@
|
|||
# Resources-for-Beginner-Bug-Bounty-Hunters
|
||||
This page is designated to hosts blog posts on particular vulnerability and techniques that have led to a bounty. If you would like to learn more about specific vulnerability types, please visit [Vulnerability Types](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/assets/vulns.md)!
|
||||
|
||||
## NahamSec's Favorite Blogs & Reading Material
|
||||
- [HackerOne Hacktivity](https://hackerone.com/hacktivity)
|
||||
- [Bugcrowd Crowdstream](https://bugcrowd.com/crowdstream)
|
||||
- [Alex Champman](https://ajxchapman.github.io/)
|
||||
- [The Daily Swig](https://portswigger.net/daily-swig)
|
||||
- [Deesee](https://blog.deesee.xyz/)
|
||||
- [EdOverflow](https://edoverflow.com/)
|
||||
- [Jon Bottarini](https://jonbottarini.com/)
|
||||
- [Allyon O'Malley](http://www.allysonomalley.com/)
|
||||
- [Orange Tsai](https://blog.orange.tw/)
|
||||
- [Philippe Harewood](https://philippeharewood.com/)
|
||||
- [Ron Chan](https://ngailong.wordpress.com)
|
||||
- [Shubham Shah](https://shubs.io/)
|
||||
- [spaceraccoon](https://spaceraccoon.dev)
|
||||
- [ziot](https://buer.haus/)
|
||||
- [zlz](https://samcurry.net/blog)
|
||||
- [Vickie Li](https://vickieli.medium.com)
|
||||
|
||||
### Reddit
|
||||
- [/r/BugBounty](https://reddit.com/r/bugbounty)
|
||||
- [r/websecurityresearch/](https://www.reddit.com/r/websecurityresearch/)
|
||||
- [r/howtohack](https://reddit.com/r/howtohack)
|
||||
- [r/netsec](https://reddit.com/r/netsec)
|
||||
- [r/netsecstudents](https://reddit.com/r/netsecstudents)
|
||||
|
||||
|
||||
## Blog posts & Disclosed Reports 📝
|
||||
A collection of Blog Posts ordered by Vulnerability Types
|
||||
|
@ -7,16 +34,10 @@ A collection of Blog Posts ordered by Vulnerability Types
|
|||
- [DOM XSS](#DOM-XSS)
|
||||
- [Stored XSS](#Stored-XSS)
|
||||
- [SSRF](#SSRF)
|
||||
- [Vulnerability Scanning](#Vulnerability-Scanning)
|
||||
- [Token / Authentication](#Token-/-Authentication)
|
||||
- [SQL Injection](#SQL-Injection)
|
||||
- [Mobile](#Mobile)
|
||||
- [iOS](#iOS)
|
||||
- [Android](#Android)
|
||||
- [HTTP Desync](#HTTP-Desync)
|
||||
- [File Upload](#File-Upload)
|
||||
- [Automation](#Automation)
|
||||
- [Buffer Overflow](#Buffer-Overflow)
|
||||
- [IDOR](#IDOR)
|
||||
- [GraphQL](#GraphQL)
|
||||
- [RCE](#RCE)
|
||||
|
@ -24,6 +45,9 @@ A collection of Blog Posts ordered by Vulnerability Types
|
|||
- [Smart Contracts](#Smart-Contracts)
|
||||
- [API](#API)
|
||||
- [Misc](#Misc)
|
||||
- [Mobile](#Mobile)
|
||||
- [iOS](#iOS)
|
||||
- [Android](#Android)
|
||||
---
|
||||
## Starting out & Tips
|
||||
- [Basic Bug Bounty FAQ](http://blog.oath.ninja/basic-bug-bounty-faq/) - by [@thedawgyg](https://twitter.com/thedawgyg)
|
||||
|
@ -31,22 +55,18 @@ A collection of Blog Posts ordered by Vulnerability Types
|
|||
- [WTF is a Bug Bounty?](https://www.ceos3c.com/hacking/ethical-hacking-diaries-1-wtf-is-a-bug-bounty/) - by ceos3c
|
||||
- [How to Set up Certificate-Based SSH for Bug Hunting](https://medium.com/@c0ldbr3w/how-to-set-up-certificate-based-ssh-for-bug-hunting-bonus-ef4af95fca05) - by Mack Staples
|
||||
- [XSS in Google Colaboratory + CSP bypass](https://blog.bentkowski.info/2018/06/xss-in-google-colaboratory-csp-bypass.html) by Michał Bentkowski
|
||||
- [Zseano’s notes on hacking & mentoring](https://blog.intigriti.com/2020/04/29/bug-business-3-zseanos-notes-on-hacking-mentoring/) by Intigriti & Zseano
|
||||
- [MY BUG BOUNTY JOURNEY!](https://www.youtube.com/watch?v=ug7FzoByLFc) by Farah Hawa
|
||||
- [zseano’s notes on hacking & mentoring](https://blog.intigriti.com/2020/04/29/bug-business-3-zseanos-notes-on-hacking-mentoring/) by Intigriti & Zseano
|
||||
|
||||
## XSS
|
||||
You can find a ton of awesome XSS reports by searching through the HackerOne Hacktivity Page (https://hackerone.com/hacktivity?querystring=XSS). Here are some more complex and some of my favorite XSS related blog posts:
|
||||
|
||||
- [XSS on Google Search - Sanitizing HTML in The Client?](https://www.youtube.com/watch?v=lG7U3fuNw3A) - LiveOverflow
|
||||
- [The Fix](https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa)
|
||||
- [Cracking my windshield and earning $10,000 on the Tesla Bug Bounty Program](https://samcurry.net/cracking-my-windshield-and-earning-10000-on-the-tesla-bug-bounty-program/) - [Sam Curry](https://twitter.com/samwcyo)
|
||||
- [Effortlessly finding Cross Site Script Inclusion (XSSI) & JSONP for bug bounty](https://medium.com/bugbountywriteup/effortlessly-finding-cross-site-script-inclusion-xssi-jsonp-for-bug-bounty-38ae0b9e5c8a) - [@th3_hidd3n_mist](https://twitter.com/th3_hidd3n_mist)
|
||||
- [Microsoft Edge (Chromium) - EoP via XSS to Potential RCE](https://leucosite.com/Edge-Chromium-EoP-RCE/) - [@Qab](https://twitter.com/qab)
|
||||
- [Reflected XSS in https://blocked.myndr.net](https://hackerone.com/reports/824433) - Thilakesh
|
||||
- [Google Bug Bounty Writeup- XSS Vulnerability](https://pethuraj.com/blog/google-bug-bounty-writeup/) - [@itsmepethu](https://twitter.com/itsmepethu)
|
||||
- [How to solve the INTIGRITI Easter XSS challenge using only Chrome Devtools](https://www.youtube.com/watch?v=IhPsBMBDFcg) - by STÖK
|
||||
- [Found Stored Cross-Site Scripting — What’s Next? — Privilege Escalation like a Boss](https://medium.com/bugbountywriteup/found-stored-cross-site-scripting-whats-next-privilege-escalation-like-a-boss-d-8fb9e606ce60) - by Harsh Bothra
|
||||
- [Bypassing WAF to perform XSS](https://medium.com/bugbountywriteup/bypassing-waf-to-perform-xss-2d2f5a4367f3) - by Kleitonx00
|
||||
|
||||
- [Facebook DOM Based XSS using postMessage](https://ysamm.com/?p=493)
|
||||
|
||||
### DOM XSS
|
||||
- [Persistent DOM-based XSS in https://help.twitter.com via localStorage](https://hackerone.com/reports/297968) - harisec
|
||||
|
@ -63,22 +83,24 @@ You can find a ton of awesome XSS reports by searching through the HackerOne Hac
|
|||
- [Account Recovery XSS](https://sites.google.com/site/bughunteruniversity/best-reports/account-recovery-xss) - Gábor Molnár
|
||||
|
||||
## SSRF
|
||||
- [DEF CON 27 Conference - Ben Sadeghipour - Owning The Clout Through Server Side Request Forgery](https://www.youtube.com/watch?v=o-tL9ULF0KI)<br>- Nahamsec & daeken | DEFCON 2019
|
||||
- [Piercing The Veil: Server Side Request Forgery Attacks On Internal Networks](https://peertube.opencloud.lu/videos/watch/40f39bfe-6d3c-40f5-bcab-43f20944ca6a)<br>- Alyssa Herrera | Hack.lu 2019
|
||||
- [Pivoting from blind SSRF to RCE with HashiCorp Consul](https://www.kernelpicnic.net/2017/05/29/Pivoting-from-blind-SSRF-to-RCE-with-Hashicorp-Consul.html)
|
||||
- [Vimeo upload function SSRF](https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437) - Sayed Abdelhafiz
|
||||
- [Piercing the Veal](https://medium.com/@d0nut/piercing-the-veal-short-stories-to-read-with-friends-4aa86d606fc5) - by d0nut
|
||||
- [CVE-2020-13379 - Unauthenticated Full-Read SSRF in Grafana](https://rhynorater.github.io/CVE-2020-13379-Write-Up)
|
||||
- [MY EXPENSE REPORT RESULTED IN A SERVER-SIDE REQUEST FORGERY (SSRF) ON LYFT](https://www.nahamsec.com/posts/my-expense-report-resulted-in-a-server-side-request-forgery-ssrf-on-lyft) - by nahamsec
|
||||
|
||||
|
||||
## Vulnerability Scanning
|
||||
- [NMAP For Vulnerability Discovery](https://www.peerlyst.com/posts/nmap-for-vulnerability-discovery-sachin-wagh) - Sachin Wagh
|
||||
- [How I found SSRF on TheFacebook.com](https://w00troot.blogspot.com/2017/12/how-i-found-ssrf-on-thefacebookcom.html)
|
||||
- [How I made $31500 by submitting a bug to Facebook](https://medium.com/@win3zz/how-i-made-31500-by-submitting-a-bug-to-facebook-d31bb046e204)
|
||||
- [A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!](https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf)
|
||||
|
||||
## Token / Authentication
|
||||
- [Abusing feature to steal your tokens](https://medium.com/@rootxharsh_90844/abusing-feature-to-steal-your-tokens-f15f78cebf74) - Harsh Jaiswal
|
||||
- [How I was able to bypass OTP code requirement in Razer [The story of a critical bug]](https://medium.com/bugbountywriteup/how-i-was-able-to-bypass-otp-token-requirement-in-razer-the-story-of-a-critical-bug-fc63a94ad572?) - Ananda Dhakal
|
||||
- [Bypassing GitHub's OAuth flow](https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html) - [@not_aardvark](https://twitter.com/not_aardvark)
|
||||
- [NMAP For Vulnerability Discovery](https://www.peerlyst.com/posts/nmap-for-vulnerability-discovery-sachin-wagh) - Sachin Wagh
|
||||
- [Subdomain Takeover to Authentication bypass](https://hackerone.com/reports/335330) - by geekboy
|
||||
- [Ability to know the presence of a person in a private event even if the guest list is hidden.](https://bugreader.com/index.php?pageNav=vivekps143%40193) - by [Vivek PS](https://bugreader.com/vivekps143)
|
||||
- [Zero-day in Sign in with Apple](https://bhavukjain.com/blog/2020/05/30/zeroday-signin-with-apple/)
|
||||
|
||||
|
||||
## SQL Injection
|
||||
|
@ -89,12 +111,6 @@ You can find a ton of awesome XSS reports by searching through the HackerOne Hac
|
|||
- [Blind SQL Injection on windows10.hi-tech.mail.ru](https://hackerone.com/reports/786044) - Просто душка (api_0)
|
||||
- [How to Hack Database Links in SQL Server!](https://blog.netspi.com/how-to-hack-database-links-in-sql-server/) - Antti Rantasaari
|
||||
|
||||
## Mobile
|
||||
### iOS
|
||||
- [From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13](https://spaceraccoon.dev/from-checkra1n-to-frida-ios-app-pentesting-quickstart-on-ios-13) - spaceraccoon
|
||||
### Android
|
||||
- [A deep dive into reversing Android pre-Installed apps](https://github.com/maddiestone/ConPresentations/blob/master/Blackhat2019.SecuringTheSystem.pdf) and the [BlackHat Talk](https://www.youtube.com/watch?v=U6qTcpCfuFc) - Maddie Stone
|
||||
|
||||
## HTTP Desync
|
||||
- [HTTP Desync Attacks: Request Smuggling Reborn](https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn) in combination with this [report](https://hackerone.com/reports/510152) - [James Kettle](https://twitter.com/albinowax)
|
||||
- [HTTP Request Smuggling on vpn.lob.com](https://hackerone.com/reports/694604) - 0X0 (painreigns)
|
||||
|
@ -106,23 +122,13 @@ You can find a ton of awesome XSS reports by searching through the HackerOne Hac
|
|||
- [A Tale of Exploitation in Spreadsheet File Conversions](https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/) - [@bbuerhaus](https://twitter.com/bbuerhaus)//[@daeken](https://twitter.com/daeken)//[@erbbysam](https://twitter.com/erbbysam)//[@smiegles](https://twitter.com/smiegles)
|
||||
- [External XML Entity via File Upload (SVG)](https://0xatul.github.io/posts/2020/02/external-xml-entity-via-file-upload-svg/) - by 0xatul
|
||||
|
||||
|
||||
## Automation
|
||||
- [Fasten your Recon process using Shell Scripting](https://medium.com/bugbountywriteup/fasten-your-recon-process-using-shell-scripting-359800905d2a) - Mohd Shibli
|
||||
- [Beginner’s Guide to recon automation](https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb) - Ashish Jha
|
||||
- [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - STÖK & Fisher
|
||||
- [gitGraber: A tool to monitor GitHub in real-time to find sensitive data](https://blog.yeswehack.com/2019/10/08/gitgraber-a-tool-to-monitor-github-in-real-time-to-find-sensitive-data/) - by [@adrien_jeanneau](https://twitter.com/adrien_jeanneau) & [@R_Marot](https://twitter.com/R_marot)
|
||||
|
||||
## Buffer Overflow
|
||||
- [Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty](https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/) - [Sam Curry](https://twitter.com/samwcyo)
|
||||
- [Writing a Simple Buffer Overflow Exploit](https://www.youtube.com/watch?v=oS2O75H57qU) - LiveOverflow
|
||||
|
||||
## IDOR
|
||||
- [Steal Earning of Airbnb hosts by Adding Bank Account/Payment Method](https://www.indoappsec.in/2019/12/airbnb-steal-earning-of-airbnb-hosts-by.html) - [Vijay Kumar ](https://twitter.com/IndoAppSec)
|
||||
- [GraphQL IDOR leads to information disclosure](https://medium.com/@R0X4R/graphql-idor-leads-to-information-disclosure-175eb560170d) - [@R0X4R](https://twitter.com/R0X4R)
|
||||
- [From Multiple IDORs leading to Code Execution on a different Host Container](https://www.rahulr.in/2019/10/idor-to-rce.html?m=1) - [@Rahul_R95](https://twitter.com/Rahul_R95)
|
||||
- [Automating BURP to find IDORs](https://medium.com/cyberverse/automating-burp-to-find-idors-2b3dbe9fa0b8) - [Aditya Soni](https://medium.com/@hetroublemakr)
|
||||
- [Another image removal vulnerability on Facebook](https://blog.darabi.me/2020/06/image-removal-vulnerability-on-facebook.html) - by Pouya
|
||||
- [Another image removal vulnerability on Facebook](https://blog.darabi.me/2020/06/image-removal-vulnerability-on-facebook.html)
|
||||
- [Stealing Your Private YouTube Videos, One Frame at a Time](https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/)
|
||||
|
||||
## GraphQL
|
||||
- [Private System Note Disclosure using GraphQL](https://hackerone.com/reports/633001) - Ron Chan
|
||||
|
@ -133,12 +139,16 @@ You can find a ton of awesome XSS reports by searching through the HackerOne Hac
|
|||
- [My First RCE (Stressed Employee gets me 2x bounty)](https://medium.com/@abhishake100/my-first-rce-stressed-employee-gets-me-2x-bounty-c4879c277e37) - [Abhishek Yadav](https://medium.com/@abhishake100)
|
||||
- [How dangerous is Request Splitting, a vulnerability in Golang or how we found the RCE in Portainer and hacked Uber](https://medium.com/@andrewaeva_55205/how-dangerous-is-request-splitting-a-vulnerability-in-golang-or-how-we-found-the-rce-in-portainer-7339ba24c871) - by Andrewaeva
|
||||
|
||||
## Recon
|
||||
## Automation & Recon
|
||||
- [How to: Recon & Content Discovery](https://www.hackerone.com/blog/how-to-recon-and-content-discovery)
|
||||
- [Subdomain Recon Using Certificate Search Technique](https://www.r00tpgp.com/2020/01/subdomain-recon-using-certificate.html?m=0)
|
||||
- [Notes about Nahamsecs Recon Sessions](https://mavericknerd.github.io/knowledgebase/nahamsec/recon_session_1/) - [maverickNerd](https://github.com/maverickNerd)
|
||||
- [Notes about NahamSec's Recon Sessions](https://mavericknerd.github.io/knowledgebase/nahamsec/recon_session_1/) - [maverickNerd](https://github.com/maverickNerd)
|
||||
- [10 Recon Tools For Bug Bounty](https://medium.com/@hackbotone/10-recon-tools-for-bug-bounty-bafa8a5961bd) - Anshuman Pattnaik
|
||||
- [Recon: Create a methodology and start your subdomain enumeration](https://failednuke.info/2020/recon-create-a-methodology-and-start-your-subdomain-enumeration/) - by FailedNuke
|
||||
- [THEY SEE ME SCANNIN’, THEY HATIN’: A BEGINNER’S GUIDE TO NMAP](https://securityqueens.co.uk/they-see-me-scannin-they-hatin-a-beginners-guide-to-nmap/) - by Sophia (https://twitter.com/SecQueens)
|
||||
- [Fasten your Recon process using Shell Scripting](https://medium.com/bugbountywriteup/fasten-your-recon-process-using-shell-scripting-359800905d2a) - Mohd Shibli
|
||||
- [Beginner’s Guide to recon automation](https://medium.com/bugbountywriteup/beginners-guide-to-recon-automation-f95b317c6dbb) - Ashish Jha
|
||||
- [gitGraber: A tool to monitor GitHub in real-time to find sensitive data](https://blog.yeswehack.com/2019/10/08/gitgraber-a-tool-to-monitor-github-in-real-time-to-find-sensitive-data/) - by [@adrien_jeanneau](https://twitter.com/adrien_jeanneau) & [@R_Marot](https://twitter.com/R_marot)
|
||||
|
||||
## Smart Contracts
|
||||
- [Steal collateral during `end` process, by earning DSR interest after `flow](https://hackerone.com/reports/672664)(Listed as Business Logic Error)
|
||||
|
@ -146,6 +156,7 @@ You can find a ton of awesome XSS reports by searching through the HackerOne Hac
|
|||
|
||||
## API
|
||||
- [31 Days of API Security Tips](https://github.com/smodnix/31-days-of-API-Security-Tips) - [smodnix](https://github.com/smodnix)
|
||||
- [Exploiting Application-Level Profile Semantics (APLS)](https://niemand.com.ar/2021/01/08/exploiting-application-level-profile-semantics-apls-from-spring-data-rest/)
|
||||
|
||||
## Misc
|
||||
- [Hacking GitHub with Unicode's dotless 'i'](https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/)
|
||||
|
@ -154,13 +165,18 @@ You can find a ton of awesome XSS reports by searching through the HackerOne Hac
|
|||
- [Cracking reCAPTCHA, Turbo Intruder style](https://portswigger.net/research/cracking-recaptcha-turbo-intruder-style) - James Kettle
|
||||
- [Abusing ImageMagick to obtain RCE](https://strynx.org/imagemagick-rce/) - [strynx](https://strynx.org/)
|
||||
- [How to Get a Finger on the Pulse of Corporate Networks via the SSL VPN](https://blog.detectify.com/2019/09/19/alyssa-herrera-pulse-corporate-networks-ssl-vpn/) - [Alyssa Herrera](https://twitter.com/Alyssa_Herrera_)
|
||||
- [2 Cases of Path Traversal](https://jlajara.gitlab.io/posts/2020/03/29/Path_Traversal.html) by [@leonishan_](https://twitter.com/leonishan_)
|
||||
- [Top 10 web hacking techniques of 2019](https://portswigger.net/research/top-10-web-hacking-techniques-of-2019) by [James Kettle](https://twitter.com/albinowax)
|
||||
- [Understanding Search Syntax on Github](https://help.github.com/en/github/searching-for-information-on-github/understanding-the-search-syntax#exclude-certain-results) by Github
|
||||
- [URL link spoofing (Slack)](https://hackerone.com/reports/481472) by Akaki Tsunoda (akaki)
|
||||
- [Abusing HTTP Path Normalization and Cache Poisoning to steal Rocket League accounts](https://samcurry.net/abusing-http-path-normalization-and-cache-poisoning-to-steal-rocket-league-accounts/) by Sam Curry
|
||||
- [The Secret sauce of bug bounty](https://medium.com/bugbountywriteup/the-secret-sauce-of-bug-bounty-bdcc2e2d45af) by Mohamed Slamat
|
||||
- [Filling in the Blanks: Exploiting Null Byte Buffer Overflow for a $40,000 Bounty](https://samcurry.net/filling-in-the-blanks-exploiting-null-byte-buffer-overflow-for-a-40000-bounty/) - [Sam Curry](https://twitter.com/samwcyo)
|
||||
## Mobile
|
||||
### iOS
|
||||
- [From checkra1n to Frida: iOS App Pentesting Quickstart on iOS 13](https://spaceraccoon.dev/from-checkra1n-to-frida-ios-app-pentesting-quickstart-on-ios-13) - spaceraccoon
|
||||
### Android
|
||||
- [A deep dive into reversing Android pre-Installed apps](https://github.com/maddiestone/ConPresentations/blob/master/Blackhat2019.SecuringTheSystem.pdf) and the
|
||||
|
||||
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
|
||||
## Changelog 📬
|
||||
|
||||
Updates to this repo will be pushed monthly. You can read about the latest changes below.
|
||||
This page is no longer maintained. If you are interested in the changelog please check out the commit.
|
||||
|
||||
---
|
||||
## ___Update 2020.08___
|
||||
|
@ -167,9 +167,9 @@ The headers for every category now links to their page instead.
|
|||
- **Updog** to [Notes & Organization](/assets/tools.md#Notes-&-Organization)
|
||||
- New Category: [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **Logger++** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **AuthMatrix** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **Autorize** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **Auto Repeater** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **AuthMatrix** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **Autorize** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **Auto Repeater** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **Progress Tracker** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- **Flow** to [Burp Extensions](/assets/tools.md#Burp-Extensions)
|
||||
- New in [Labs](/assets/labs.md):
|
||||
|
@ -207,19 +207,19 @@ The headers for every category now links to their page instead.
|
|||
## ___Update 2020.03___
|
||||
### Added
|
||||
- New: [Smart Contracts](/assets/smartcon.md) (special thanks to [@0xatul](https://twitter.com/0xatul))
|
||||
- New White-/yellowpapers in [Smart Contracts](/assets/smartcon.md):
|
||||
- New White-/yellowpapers in [Smart Contracts](/assets/smartcon.md):
|
||||
**Bitcoin whitepaper & Ethereum yellowpaper**
|
||||
- New **How to Audit a Smart Contract**
|
||||
- New **How to Audit a Smart Contract**
|
||||
- New Smart Contracts Category under [Blogposts](/assets/blogposts.md#Smart-Contracts) and added two Writeups
|
||||
- New in [Blogposts](/assets/blogposts.md):
|
||||
- New in [Blogposts](/assets/blogposts.md):
|
||||
- **10 Recon Tools for Bug Bounty**
|
||||
- New in [Setup](/assets/setup.md):
|
||||
- New in [Setup](/assets/setup.md):
|
||||
- **Finding your First Bug and getting a Bounty with InsiderPhD**
|
||||
- **Introduction to Docker for CTFs**
|
||||
- New in [Vulnerabilities](/assets/vulns.md):
|
||||
- **Finding your first Bug - CSRF**
|
||||
- **CSRF-Basics**
|
||||
- New in [Tools](/assets/tools.md):
|
||||
- New in [Tools](/assets/tools.md):
|
||||
- **Knockpy**
|
||||
- New in [Labs](/assets/labs.md):
|
||||
- **0l4bs for XSS**
|
||||
|
@ -269,4 +269,4 @@ The headers for every category now links to their page instead.
|
|||
- Cleaned up [Setup Page](/assets/setup.md)
|
||||
- Cleaned up [Blogposts Page](/assets/blogposts.md)
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
|
@ -11,4 +11,4 @@ Getting in the right Mindset:
|
|||
- [BSidesSF 2020 - Panel: Mental Health for Hackers (Chloé M • Ryan L • Susan P)](https://youtu.be/raH7tRy8M7g)
|
||||
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
|
@ -2,22 +2,56 @@
|
|||
|
||||
## Labs & Testing Environments 🧪
|
||||
|
||||
## General
|
||||
### Web Hacking Fundamentals
|
||||
|
||||
#### Free
|
||||
- [Hacker101](https://www.hacker101.com/) | Good Exercises for Beginners, can earn you private Invites on HackerOne
|
||||
- [Pentesterlab](https://pentesterlab.com) | Good Labs with a broad variety of Topics, some very good Web Application Exercises
|
||||
- [HackTheBox](https://www.hackthebox.eu/) | provides Testing Labs, some Web Application Challenges
|
||||
- [XSS-Game](https://xss-game.appspot.com/) | Learning Platform for XSS
|
||||
- [HackEdu](https://hackedu.io)
|
||||
- [DVWA](http://www.dvwa.co.uk)
|
||||
- [Google Gruyere](https://google-gruyere.appspot.com/)
|
||||
- [Web Security Academy by PortSwigger](https://portswigger.net/web-security)
|
||||
- [XSS Labs from PwnFunction](https://xss.pwnfunction.com/) Great Labs in a beautiful layout
|
||||
- [Web Security Academy](https://portswigger.net/web-security)
|
||||
- [HackThisSite](https://hackthissite.org/)
|
||||
- [CTFChallenge](https://ctfchallenge.co.uk) | Web CTF based on real vulnerabilities
|
||||
- [XSS-Game](https://xss-game.appspot.com/) | Learning Platform for XSS
|
||||
- [Hacksplaining](https://www.hacksplaining.com/)
|
||||
|
||||
|
||||
#### Premium
|
||||
- [Pentesterlab](https://pentesterlab.com/referral/olaL4k8btE8wqA) | Good Labs with a broad variety of Topics, some very good Web Application Exercises
|
||||
- [BugBountyHunter](https://www.bugbountyhunter.com/) | Learn how to test for security vulnerabilities on web applications
|
||||
|
||||
#### Misc
|
||||
- [0l4bs - Cross-site scripting labs for web application security enthusiasts](https://github.com/tegal1337/0l4bs) - by tegal1337
|
||||
- [TryHackMe](https://tryhackme.com) | Cool Hacking & Pentesting Labs with Web Challenges
|
||||
- [Will it CORS?](https://httptoolkit.tech/will-it-cors/) | Tell this magic CORS machine what you want, and it'll tell you exactly what to do
|
||||
- [XSS Labs from PwnFunction](https://xss.pwnfunction.com/) Great Labs in a beautiful layout
|
||||
|
||||
### Vulnerable Apps
|
||||
- [Google Gruyere](https://google-gruyere.appspot.com/)
|
||||
- [DVWA](http://www.dvwa.co.uk)
|
||||
- [OWASP Juice Shop](https://owasp.org/www-project-juice-shop/)
|
||||
- [Metasploitable 3](https://github.com/rapid7/metasploitable3/wiki/Vulnerabilities)
|
||||
- [Multidae](https://sourceforge.net/projects/mutillidae/)
|
||||
- [Badstore](https://www.vulnhub.com/entry/badstore-123,41/)
|
||||
- [https://application.security/ - SSRF](https://application.security/free-application-security-training/server-side-request-forgery-in-capital-one)
|
||||
|
||||
#### XSS
|
||||
- [alert 1 to win](https://alf.nu/alert1/)
|
||||
- [prompt(1)](http://prompt.ml/0)
|
||||
- [XSS Game By Google](https://xss-game.appspot.com/)
|
||||
|
||||
### General Hacking
|
||||
|
||||
#### Free
|
||||
- [VulnHuB](https://www.vulnhub.com/)
|
||||
- [W3chhalls](https://w3challs.com/)
|
||||
- [PicoCTF][https://picoctf.org/]
|
||||
- [Root-Me](https://www.root-me.org/)
|
||||
- [OverTheWire](https://overthewire.org/wargames/natas/)
|
||||
|
||||
#### Premium
|
||||
- [TryHackMe](https://tryhackme.com/signup?referrer=nahamsec) | Cool Hacking & Pentesting Labs with Web Challenges
|
||||
- Videos: [TryHackMe! Basic Penetration Testing](https://www.youtube.com/watch?v=xl2Xx5YOKcI) // [TryHackMe! EternalBlue/MS17-010 in Metasploit](https://www.youtube.com/watch?v=s6rwS7UuMt8) // [TryHackMe! OhSINT - METADATA & Research](https://www.youtube.com/watch?v=oF0TQQmFu4w)
|
||||
- [HackTheBox](https://www.hackthebox.eu/) | provides Testing Labs, some Web Application Challenges
|
||||
- [Cyberseclabs](https://www.cyberseclabs.co.uk/)
|
||||
- [Kontra Application Security Training](https://application.security/free-application-security-training)
|
||||
- [Will it CORS?](https://httptoolkit.tech/will-it-cors/) | Tell this magic CORS machine what you want, and it'll tell you exactly what to do
|
||||
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
297
assets/media.md
297
assets/media.md
|
@ -2,17 +2,29 @@
|
|||
|
||||
## Media Resources & Communities 🎬
|
||||
Here you find listings to useful media creations that can help beginners in different ways.
|
||||
If you are interested in interviews with the top hackers and bug bounty hunters, check out NahamSec's [Live Recon Stream](https://www.youtube.com/playlist?list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA)
|
||||
|
||||
- [Discord Servers](#Discord-Servers)
|
||||
- [YouTube Channels](#Youtube-Channels)
|
||||
- [Streamers](#Streamers)
|
||||
- [Podcasts](#Podcasts)
|
||||
- [Books](#Books)
|
||||
- [Twitter](#Twitter)
|
||||
- [Discord Servers](#Discord-Servers)
|
||||
- [Misc](#Misc)
|
||||
|
||||
---
|
||||
|
||||
## Discord Servers
|
||||
- [Nahamsec](https://discord.gg/d6dENAq)
|
||||
- [Hacker101](https://discord.gg/WrCTm8h)
|
||||
- [TryHackMe](https://discord.gg/KsAEejZ)
|
||||
- [HackTheBox](https://discord.gg/FrRJ3Z8)
|
||||
- [TheCyberMentor](https://discord.gg/)
|
||||
- [AshF0x - The F0xbox](https://discord.gg/RCTy5zS)
|
||||
- [The Mayor](https://discord.gg/EN2ya9h)
|
||||
- [Ceos3c](https://discord.gg/SBK3hkR)
|
||||
- [InsiderPhD](https://discord.gg/rdQcSk7a)
|
||||
|
||||
## Youtube Channels
|
||||
- [Curated List of YT Channels](https://threader.app/thread/1248351836672872456) by TCM
|
||||
- [Nahamsec](https://www.youtube.com/nahamsec) - Educational Videos and VODs of his Stream, Vlogs
|
||||
|
@ -25,17 +37,19 @@ Here you find listings to useful media creations that can help beginners in diff
|
|||
- [DEFCONConference](https://www.youtube.com/user/DEFCONConference/videos) - Tons of Talks from Defcon.
|
||||
- [Jason Haddix](https://www.youtube.com/channel/UCk0f0svao7AKeK3RfiWxXEA) - VODs of his Stream
|
||||
- [rwxrob](https://www.twitch.tv/rwxrob) - Linux God
|
||||
- [bug Bounty Reports Explained](https://www.youtube.com/c/bugbountyreportsexplained/)
|
||||
|
||||
## Streamers
|
||||
- [Nahamsec](https://www.twitch.com/nahamsec) on Twitch
|
||||
- [d0nutptr](https://www.twitch.tv/d0nutptr/) on Twitch
|
||||
- [The Cyber Mentor](https://twitch.tv/thecybermentor) on Twitch
|
||||
- [The Blind Hacker](https://twitch.tv/theblindhacker) on Twitch
|
||||
- [Jason Haddix](https://www.twitch.tv/js0n_x/) on Twitch
|
||||
- [sup3rhero1](https://www.twitch.tv/sup3rhero1) on Twitch
|
||||
- [STÖK](https://www.twitch.tv/stokfredrik) on Twitch
|
||||
- [The Mayor](https://www.twitch.tv/themayor11) on Twitch
|
||||
|
||||
- [TheCyberMentor](https://twitch.tv/thecybermentor) on Twitch
|
||||
- [TheBlindHacker](https://twitch.tv/theblindhacker) on Twitch
|
||||
- [TheMayor](https://www.twitch.tv/themayor11) on Twitch
|
||||
- [Ash_F0x](https://www.twitch.tv/ash_f0x)
|
||||
- [mbcrump](https://www.twitch.tv/mbcrump)
|
||||
- [thealtf4stream](https://www.twitch.tv/thealtf4stream)
|
||||
- [dowright](https://www.twitch.tv/dowright)
|
||||
- [The Red Team Village](https://www.twitch.tv/redteamvillage)
|
||||
|
||||
## Podcasts
|
||||
- [Darknet Diaries](https://darknetdiaries.com/) by [Jack Rhysider](https://twitter.com/jackrhysider)
|
||||
|
@ -57,7 +71,7 @@ Michal Zalewski
|
|||
- [Black Hat Python](https://nostarch.com/blackhatpython) by Justin Seitz
|
||||
- [The Linux Command Line](https://nostarch.com/tlcl2) by William Shotts
|
||||
|
||||
In general ["no starch press"](https://nostarch.com/catalog/security) offers great books in the hacking category. [Humble Bundle](https://www.humblebundle.com) sometimes offfers great book deals for an awesome price, so have a eye out for those.
|
||||
In general ["no starch press"](https://nostarch.com/catalog/security) offers great books in the hacking category. [Humble Bundle](https://www.humblebundle.com) sometimes offers great book deals for an awesome price, so have a eye out for those.
|
||||
|
||||
## Twitter
|
||||
|
||||
|
@ -65,89 +79,194 @@ In general ["no starch press"](https://nostarch.com/catalog/security) offers gre
|
|||
|
||||
The following list does not exclusively contains Bug Bounty themed Accounts but a broad variety of InfoSec and Hacking.<br>
|
||||
|
||||
| Name | Topics |
|
||||
| ------------------------------------------------------- | ---------------------------------------------------------------------------- |
|
||||
| [@Alyssa*Herrera*](https://twitter.com/Alyssa_Herrera_) | BB |
|
||||
| [@Bugcrowd](https://twitter.com/Bugcrowd) | BB, Platform |
|
||||
| [@DailySwig](https://twitter.com/DailySwig) | Web Technologie, News |
|
||||
| [@DanielMiessler](https://twitter.com/DanielMiessler) | Security, Researcher, [SecLists](https://github.com/danielmiessler/SecLists) |
|
||||
| [@Dinosn](https://twitter.com/Dinosn) | Researcher, News, Tools |
|
||||
| [@EdOverflow](https://twitter.com/EdOverflow) | Developer, Researcher, @LiveOverflow in disguise |
|
||||
| [@GoogleVRP](https://twitter.com/GoogleVRP) | VRP, Program |
|
||||
| [@GossiTheDog](https://twitter.com/GossiTheDog) | Researcher |
|
||||
| [@Hacker0x01](https://twitter.com/Hacker0x01) | BB, Platform |
|
||||
| [@HackerSploit](https://twitter.com/HackerSploit) | General Hacking, Youtuber |
|
||||
| [@InsiderPhD](https://twitter.com/InsiderPhD) | BB, Teaching, YouTuber, Beginner friendy content |
|
||||
| [@JHaddix](https://twitter.com/Jhaddix) | BB, Bugcrowd, Streaming |
|
||||
| [@KitPloit](https://twitter.com/KitPloit) | News, Tools |
|
||||
| [@LiveOverflow](https://twitter.com/LiveOverflow) | Hacking, CTF, Teaching, YouTuber, @EdOverflow in disguise |
|
||||
| [@MalwareTechBlog](https://twitter.com/MalwareTechBlog) | RE, Security, Hacking, News |
|
||||
| [@NahamSec](https://twitter.com/NahamSec) | BB, Teaching, Streaming |
|
||||
| [@Peerlyst](https://twitter.com/Peerlyst) | Articles, Peer Powered Publications |
|
||||
| [@PortSwigger](https://twitter.com/PortSwigger) | BB, News, BurpSuite |
|
||||
| [@PwnFunction](https://twitter.com/PwnFunction) | YouTuber, Teaching, Web Technologie |
|
||||
| [@Regala\_](https://twitter.com/Regala_)(Fisher) | BB, DISTURBANCE, Podcaster |
|
||||
| [@Rosenawesome](https://twitter.com/Rosenawesome) | Hacking, Events |
|
||||
| [@TheBlindHacker](https://twitter.com/TheBlindHacker) | Hacking, Streamer |
|
||||
| [@TheHackerNews](https://twitter.com/TheHackersNews) | News |
|
||||
| [@TheParanoids](https://twitter.com/TheParanoids) | BB, "Program" |
|
||||
| [@TomNomNom](https://twitter.com/TomNomNom) | Coding, BB, Hacking, DISTURBANCE, Tools |
|
||||
| [@\_johnhammond](https://twitter.com/_johnhammond) | Hacking, Web Technologies, Coding, CTF |
|
||||
| [@\_sn0ww](https://twitter.com/_sn0ww) | Social Enineering, OSINT |
|
||||
| [@ajxchapman](https://twitter.com/ajxchapman) | BB, Researcher |
|
||||
| [@albinowax](https://twitter.com/albinowax) | News, BB, Web Technologies, Researcher, BurpSuite |
|
||||
| [@autothreat](https://twitter.com/autothreat) | Hacking, Cars |
|
||||
| [@brutelogic](https://twitter.com/brutelogic) | Researcher, Teaching, XSS |
|
||||
| [@ceos3c](https://twitter.com/ceos3c) | YouTuber, General Hacking, Teaching |
|
||||
| [@codingo_](https://twitter.com/codingo_) | General Hacking, Bug Bounty, Coding |
|
||||
| [@d0nutptr](https://twitter.com/d0nutptr) | BB, Researcher, (Rust.) |
|
||||
| [@daeken](https://twitter.com/daeken) | BB, Researcher |
|
||||
| [@evilsocket](https://twitter.com/evilsocket) | Hacking, Coding, Hardware, Tools |
|
||||
| [@firebounty](https://twitter.com/firebounty) | BB, Platform |
|
||||
| [@fluxfingers](https://twitter.com/fluxfingers) | CTF |
|
||||
| [@fs0c131y](https://twitter.com/fs0c131y) | Mobile Applications, Hacking, Web Technologies, Researcher |
|
||||
| [@hakluke](https://twitter.com/hakluke) | Researcher, Coding, Tools |
|
||||
| [@intigriti](https://twitter.com/intigriti) | BB, Platform |
|
||||
| [@jerh17](https://twitter.com/jerh17) | BB, Researcher, Platform |
|
||||
| [@lorenzofb](https://twitter.com/lorenzofb) | Journalist |
|
||||
| [@maddiestone](https://twitter.com/maddiestone) | Project Zero, Researcher |
|
||||
| [@malwareunicorn](https://twitter.com/malwareunicorn) | Researcher, RE, Malware, Unicorn |
|
||||
| [@mongobug](https://twitter.com/mongobug) | BB, Researcher |
|
||||
| [@nahamsec](https://twitter.com/nahamsec) | BB, Researcher, YouTuber, Streamer, Teaching, Recon |
|
||||
| [@nnwakelam](https://twitter.com/nnwakelam) | BB, Researcher |
|
||||
| [@openbugbounty](https://twitter.com/openbugbounty) | Platform |
|
||||
| [@orange_8361](https://twitter.com/orange_8361) | BB, Researcher |
|
||||
| [@owasp](https://twitter.com/owasp) | OWASP |
|
||||
| [@samykamkar](https://twitter.com/samykamkar) | Hacking, News, Tools, Hardware |
|
||||
| [@securinti](https://twitter.com/securinti) | Researcher, BB |
|
||||
| [@spaceraccoonsec](https://twitter.com/spaceraccoonsec) | Researcher, BB |
|
||||
| [@stokfredrik](https://twitter.com/stokfredrik) | Researcher, BB, YouTuber, Teaching, Sunglasses |
|
||||
| [@synack](https://twitter.com/synack) | Platform, Team, BB |
|
||||
| [@thecybermentor](https://twitter.com/thecybermentor) | Streamer, Youtuber, General Hacking, Teaching |
|
||||
| [@thedawgyg](https://twitter.com/thedawgyg) | BB |
|
||||
| [@thegrugq](https://twitter.com/thegrugq) | Researcher |
|
||||
| [@yaworsk](https://twitter.com/yaworsk) | BB, Researcher, Author |
|
||||
| [@yeswehack](https://twitter.com/yeswehack) | BB, Platform |
|
||||
| [@zseano](https://twitter.com/zseano) | BB, Teaching |
|
||||
| [@ZephrFish](https://twitter.com/ZephrFish) | BB,Researcher |
|
||||
| [@CalumBoal](https://twitter.com/CalumBoal) | Pentester, Software dev, Coder |
|
||||
| [@_superhero1](https://twitter.com/_superhero1) | Streamer, Content Creator, BB |
|
||||
| [@PhillipWylie](https://twitter.com/PhillipWylie) | BB, Researcher, Pentester |
|
||||
### Members
|
||||
| handle | name | description |
|
||||
|--------|------|-------------|
|
||||
|[@0x0luke](https://twitter.com/0x0luke) | Luke | MSc Cyber Security | BSc Computer Forensics and Security | Web/Hardware hacker. HoF @Tesla @Apple @DeptofDefense @Uber @RockstarGames @Cloudinary @Dell
|
||||
|[@0xacb](https://twitter.com/0xacb) | André Baptista | 🇵🇹 Security researcher and bug bounty hunter living somewhere between 3D and 7D. Freedφm. 1128350274
|
||||
|[@0xd0m7](https://twitter.com/0xd0m7) | 0xd0m7 | Security Researcher
|
||||
|[@0xInfection](https://twitter.com/0xInfection) | Pinaki | I am just an infected geek. 🤠
|
||||
|[@0xpatrik](https://twitter.com/0xpatrik) | Patrik Hudak | Outcome over ego.
|
||||
|[@0xteknogeek](https://twitter.com/0xteknogeek) | Joel Margolis | Engineer by day, researcher by night • 50% grad of @RITtigers • ProdSec @Uber • DISTURBANCE • Views and opinions are my own.
|
||||
|[@11xuxx](https://twitter.com/11xuxx) | Ashkan Jahanbakhsh | developer, pentester and bug hunter(OSCP, OSCE, OSWE)
|
||||
|[@1ndianl33t](https://twitter.com/1ndianl33t) | Shiv chouhan | Web & Mobile Application Security Researcher | Hackerone | Bugcrowd |Apk Mod | Graphics Designer |CEH | CHFI | SEO | CCNA | CCNP |https://t.co/GueVYZ7uLi
|
||||
|[@adrien_jeanneau](https://twitter.com/adrien_jeanneau) | Adrien | Cybersecurity Lover - I love to break things (and I'm paid for that) - Bug Hunter - Creator of gitGraber https://t.co/DKteWrVYt2 #InfoSec #BugBounty
|
||||
|[@AEMSecurity](https://twitter.com/AEMSecurity) | AEMSecurity | Dedicated to Adobe AEM Security - Bugbounty - Vulnerability & Exploit Research. CVE-2016-0956, CVE-2013-6674
|
||||
|[@Agarri_FR](https://twitter.com/Agarri_FR) | Nicolas Grégoire | Web hacker && Official Burp Suite Pro trainer https://t.co/oaXuAFhYWp…Follow @MasteringBurp for free tips and tricks
|
||||
|[@ajxchapman](https://twitter.com/ajxchapman) | Alex Chapman | Bug Hunter | Vulnerability Researcher | On Recovery | DMs Open
|
||||
|[@akita_zen](https://twitter.com/akita_zen) | Akita 🇦🇷 | bugbounty hunter & zen monk
|
||||
|[@albinowax](https://twitter.com/albinowax) | James Kettle | Director of Research at PortSwigger Web Security aka @Burp_Suite
|
||||
|[@alicanact60](https://twitter.com/alicanact60) | Ali Tütüncü | Bug Researcher
|
||||
|[@Almroot](https://twitter.com/Almroot) | Fredrik N. Almroth | Co-Founder, Researcher and Head of Engineering at @detectify. Coder of stuff, breaker of things. PGP/MIT: 0xEDF8D9828B06A7F7
|
||||
|[@Alra3ees](https://twitter.com/Alra3ees) | Emad Shanab | A Lawyer & A noooob. Every Law has its own Bugs. I have no Facebook. https://t.co/n9U5HPkWcV https://t.co/46EDOU8gnq
|
||||
|[@alxbrsn](https://twitter.com/alxbrsn) | Alex Birsan |
|
||||
|[@Alyssa_Herrera_](https://twitter.com/Alyssa_Herrera_) | Alyssa Herrera Perez 🇩🇰 🏳️⚧️ | Sr. App Sec engineer. Bug bounty hunter on @Hacker0x01. @detectify crowdsource hacker, and @hacknotcrime Advocate. Loves birbs. Furry Hacker. NB-They/them
|
||||
|[@ameenmaali](https://twitter.com/ameenmaali) | Ameen | appsec infant, bug bounty fetus - Blog: https://t.co/IULDdK4Wh1 (@abugzlife1)
|
||||
|[@andirrahmani1](https://twitter.com/andirrahmani1) | Andi Rrahmani | Security Researcherhttps://t.co/Xenw3BiShq
|
||||
|[@anshuman_bh](https://twitter.com/anshuman_bh) | Anshuman Bhartiya | I love Security, Automation, Innovation, Challenges and Changes. My opinions here, not my employers. https://t.co/RyQUQzkYzm
|
||||
|[@ap_ceng](https://twitter.com/ap_ceng) | Ashish Padelkar |
|
||||
|[@ArchAngelDDay](https://twitter.com/ArchAngelDDay) | Douglas Day | Born again. Libertarian. Bug Bounty Hunter. Crypto Enthusiast.Views are correct. BTC to 3Jo3Yn7Xt3SYUmm49LiqF1nsKwa9R9wNhi for bugbounty mentorship
|
||||
|[@arneswinnen](https://twitter.com/arneswinnen) | Arne Swinnen | IT Security. Bug Bounty Hunter.
|
||||
|[@atul_hax](https://twitter.com/atul_hax) | Atul | I love pwn, reading RFCs, and I just dabble on the keyboard until things happen but Emacs gave me carpal tunnel.
|
||||
|[@avlidienbrunn](https://twitter.com/avlidienbrunn) | Mathias Karlsson | Web security fiddler. Bug bounty bastard. CTF with @HackingForSoju.
|
||||
|[@B3nac](https://twitter.com/B3nac) | Kyle | Full time Security Researcher. I really enjoy everything Android. Creator of InjuredAndroid and BountyPay apk. Send me all the apks plz. https://t.co/myQCNOp959
|
||||
|[@bbuerhaus](https://twitter.com/bbuerhaus) | Brett Buerhaus | https://t.co/usMDC8wsVM - websec research, bug bounties, CTF (@hackingforsoju) and puzzles (@fomo_team).
|
||||
|[@bendtheory](https://twitter.com/bendtheory) | bend theory | 1 1 2 3 5 8 13 21 34 55 69 420 666 911
|
||||
|[@bitquark](https://twitter.com/bitquark) | bitquark ✪ | Tesla red team by day, |redacted| by night. Black Hat EU review board. Former Bugcrowd #1. Tweets may contain traces of cat. He/him. // nb ỉrt ḫt
|
||||
|[@Black2Fan](https://twitter.com/Black2Fan) | Sergey Bobrov |
|
||||
|[@BonJarber](https://twitter.com/BonJarber) | Jon Barber 🤖 | AppSec engineer @Cruise | Ex @facebook, @NCCsecurityUS | Building and breaking things
|
||||
|[@brxxnh1](https://twitter.com/brxxnh1) | brxxn (security) | views and opinions are those of a wild ostrich on the loose
|
||||
|[@bsysop](https://twitter.com/bsysop) | bsysop | If you can dream with it, you can do it🤘🏻!
|
||||
|[@BugBountyHQ](https://twitter.com/BugBountyHQ) | BugBountyHQ |
|
||||
|[@bug_dutch](https://twitter.com/bug_dutch) | Floerer | Bug Bounty Hunter - CS Student - 🇳🇱 - https://t.co/a2pvqTuEF9
|
||||
|[@chevonphillip](https://twitter.com/chevonphillip) | Chevon Phillip | Bugcrowd Ambassador | Synack Red Team Member | Security Researcher | Penetration Tester
|
||||
|[@codecancare](https://twitter.com/codecancare) | todayisnew | May you be well on your side of the screen.
|
||||
|[@codingo_](https://twitter.com/codingo_) | Michael Skelton | Global Head of Security Ops and Researcher Enablement @bugcrowd, Ex-pentester. Maintainer of NoSQLMap, VHostScan, Reconnoitre, Interlace, Crithit
|
||||
|[@Corb3nik](https://twitter.com/Corb3nik) | Ian Bouchard | Security Enthusiast, CTF Fanatic, Bug Bounty Hunter, @opentoallctf/perfect.blue Web guy, NorthernCoalition Co-Founder
|
||||
|[@d0nutptr](https://twitter.com/d0nutptr) | d0nut | Lead Security Engineer @graplsec, part-time bug hunter (https://t.co/INDLSLS2Qu). (he/they). Formerly @Dropbox, @Cruise.My tweets are my own.
|
||||
|[@damian_89_](https://twitter.com/damian_89_) | Damian Strobel | #webdev #php #machinelearning #python #laravel #python #websec #bugbounty #pentest
|
||||
|[@dee__see](https://twitter.com/dee__see) | Dominic | Outdoor enthusiast, friend of all dogs, hacker, AppSec engineer @gitlab - fighting inertia
|
||||
|[@defparam](https://twitter.com/defparam) | Evan Custodio | FPGA/Hardware Hacker. Web Security Researcher. I break web servers so that others can't.@awscloud - My opinions are my own
|
||||
|[@dhauenstein](https://twitter.com/dhauenstein) | Daniel Hauenstein | I am the Klaus Kinski of IT security. I do bug bounties (H1/BC/SynAck/zerocopter). I know memes and drink beer. Co-Founder of Last Unicorn Con. Hacking magician
|
||||
|[@eboda_](https://twitter.com/eboda_) | eboda | full-spectrum cyber warrior
|
||||
|[@EdOverflow](https://twitter.com/EdOverflow) | Ed | Web developer & security researcher.
|
||||
|[@erbbysam](https://twitter.com/erbbysam) | erbbysamᐸscriptᐳaler | software, cryptography, etc. DEFCON black badge with https://t.co/UBvdIM5TW6
|
||||
|[@eur0pa_](https://twitter.com/eur0pa_) | europa | 𝙸 𝚑𝚊𝚌𝚔 𝚜𝚝𝚞𝚏𝚏 𝚏𝚘𝚛 𝚙𝚛𝚘𝚏𝚒𝚝, 𝚊𝚗𝚍 𝚕𝚒𝚏𝚝 𝚑𝚎𝚊𝚟𝚢 𝚝𝚑𝚒𝚗𝚐𝚜 𝚏𝚘𝚛 𝚏𝚞𝚗. 𝙿𝚘𝚠𝚎𝚛𝚎𝚍 𝚋𝚢 𝙱𝙱𝙰𝙲.
|
||||
|[@farah_hawa01](https://twitter.com/farah_hawa01) | Farah | noobiest of the noobs | content creator
|
||||
|[@filedescriptor](https://twitter.com/filedescriptor) | FD | @0xReconless
|
||||
|[@foobar0x7](https://twitter.com/foobar0x7) | foobar7 | IT Security Consultant & Bug Hunter
|
||||
|[@fransrosen](https://twitter.com/fransrosen) | Frans Rosén | Dev/Security/Founder at @centrahq/@detectify/@poweredbyingrid. I do not advertise doing hacking services, do not trust the ones telling you I do.
|
||||
|[@garethheyes](https://twitter.com/garethheyes) | Gareth Heyes | javascript:/*--></title></style></textarea></script></xmp><svg/onload='+/"/+/onmouseover=1/+/[*/[]/+alert(1)//'>
|
||||
|[@gehaxelt](https://twitter.com/gehaxelt) | Sebastian Neef | Freelancer. Student. Traveller. Hacker. WhiteHat. Bughunter. CTFs @ENOFLAGBlogs @0daywork, @blogbasis and co-Founder of @internetwache
|
||||
|[@gerben_javado](https://twitter.com/gerben_javado) | Gerben Javado | Security Engineer @Facebook. Into bug bounties. Personal opinions.
|
||||
|[@gregxsunday](https://twitter.com/gregxsunday) | Grzegorz Niedziela | pentester / bughunter
|
||||
|[@Gromak123_Sec](https://twitter.com/Gromak123_Sec) | Gromak123_Security | French Security Researcher and Pentester at @Unumkey. C|EH Certified. Bounty Hunter at @YesWeHack and @Hacker0x01.3 times #LeHack Bugbounty's Winner.
|
||||
|[@gwendallecoguic](https://twitter.com/gwendallecoguic) | Gwendal Le Coguic | Bug hunter, tool maker.
|
||||
|[@h1_sp1d3r](https://twitter.com/h1_sp1d3r) | Evgeniy Yakovchuk | Toss a coin to your hacker, A friend of humanity.
|
||||
|[@hacker_](https://twitter.com/hacker_) | Corben Leo | Christian, Computer Science @DakotaState, Hacker
|
||||
|[@hahwul](https://twitter.com/hahwul) | HAHWUL | Security engineer, Bugbounty hunter, Developer and H4cker. Say ha-hul but you can just call me howlhttps://t.co/FhMxZy51Qr , https://t.co/gYBnn30EHm , https://t.co/DAjEwvaq0u
|
||||
|[@hakluke](https://twitter.com/hakluke) | HΔKLUKΞ | Luke StephensDad, husband, hacker. https://t.co/Zurv4bdcyFhttps://t.co/d1aqj2Q46E
|
||||
|[@hateshaped](https://twitter.com/hateshaped) | hateshape |
|
||||
|[@HazanaSec](https://twitter.com/HazanaSec) | ʜᴀᴢᴀɴᴀ | ␀https://t.co/OqwyPoZFFf
|
||||
|[@hgreal1](https://twitter.com/hgreal1) | hg_real | Just another random QA guy
|
||||
|[@honoki](https://twitter.com/honoki) | Pieter Hiele | Cyber entomologist 🐛 amateur musician 🎹 occasional blogger 💻 https://t.co/0to21Mri4bhttps://t.co/fd9pUEXxbn
|
||||
|[@HusseiN98D](https://twitter.com/HusseiN98D) | Hussein Daher | Bug bounty hunter - If you're reading this I love you. - hussein98d@gmail.com - https://t.co/JTJxMBZ7Qshttps://t.co/8iuIYnLHg4
|
||||
|[@Hxzeroone](https://twitter.com/Hxzeroone) | Hx01 | Not evil just misunderstood.
|
||||
|[@IAmMandatory](https://twitter.com/IAmMandatory) | mandatory/Matthew Bryant | Sec@Snapchat. Ex-Google, Uber, Bishop Fox. XSS Hunter author, DNS/TLD/web security researcher. parallel26(at)opsecmail(dot)com
|
||||
|[@imranparray101](https://twitter.com/imranparray101) | Imran Parray | Independent cyber security researcher || Hacker || programmer || Linux Freak || Full time Bug hunter.
|
||||
|[@infosec_au](https://twitter.com/infosec_au) | shubs | continuous security, @assetnote
|
||||
|[@inhibitor181](https://twitter.com/inhibitor181) | Cosmin | Bug bounty hunter
|
||||
|[@InsiderPhD](https://twitter.com/InsiderPhD) | Katie Paxton-Fear | PhD Student, Occasional #BugBounty hunter & Educational #CyberSecurity YouTuber. I study at @CranfieldDefSec: Insider Threats using #nlproc. she/her.
|
||||
|[@irsdl](https://twitter.com/irsdl) | Soroush | appsec \ web / https://t.co/3mMc7BsRyw @MDSecLabs | a delimiter character fan | RT/LK can be accidental or !
|
||||
|[@itscachemoney](https://twitter.com/itscachemoney) | Tanner | Somewhere between a builder and a breaker | @hacknotcrime
|
||||
|[@ITSecurityguard](https://twitter.com/ITSecurityguard) | Patrik Fehrenbach🤖 | rɪsˈpɒnsəbl dɪsˈkləʊʒə HackerOne
|
||||
|[@jackds1986](https://twitter.com/jackds1986) | Daniel Bakker | Lead Security Analyst & Ethical Hacker
|
||||
|[@jackhcable](https://twitter.com/jackhcable) | Jack Cable | Coder turned white hat hacker with public interest mindset. @Stanford ‘22. Rebel @defensedigital. @StanfordIO / @CISAGov. All tweets are in my personal capacity
|
||||
|[@Jhaddix](https://twitter.com/Jhaddix) | Jason Haddix | Father, hacker, educator, gamer, & nerd. Streaming sometimes at: https://t.co/WBZcSgGOIG & posted to https://t.co/I2yhmJjGAb
|
||||
|[@jinonehk](https://twitter.com/jinonehk) | Jinone | Security researcher
|
||||
|[@jobertabma](https://twitter.com/jobertabma) | Jobert Abma | I tweet about security and my experience as a hacker. Co-founder of HackerOne (@Hacker0x01).
|
||||
|[@JohnH4X00R](https://twitter.com/JohnH4X00R) | John H4X0R | Entrepreneur, Programmer & a Bug Hunter https://t.co/vIahtTjPHh Adobe https://t.co/GNSAsABaOl Oracle https://t.co/dObZSH4Gwb Got my👍in each 1 of those pies.
|
||||
|[@JonathanBouman](https://twitter.com/JonathanBouman) | Jonathan Bouman | Medical Doctor (GP), Web Developer, Security Researcher
|
||||
|[@jon_bottarini](https://twitter.com/jon_bottarini) | Jon Bottarini | Security person. I post about bug bounties, infosec, and everything in between. “insert long job title here” @Hacker0x01, but tweets are my own.
|
||||
|[@joohoi](https://twitter.com/joohoi) | Joo, N/A | Hacks for beer. FOSS, infosec and privacy. Chaotic good.
|
||||
|[@JR0ch17](https://twitter.com/JR0ch17) | JR0ch17 | Bug bounty hunter, penetration tester and security researcher
|
||||
|[@jstnkndy](https://twitter.com/jstnkndy) | Justin Kennedy | Infosec professional & beverage snob. Research Consulting Director @ Atredis Partners.
|
||||
|[@kapytein](https://twitter.com/kapytein) | Nadir | Student. Participates on bug bounty programs, kapytein on almost all platforms (h1/intigriti). AppSec @officientapp.
|
||||
|[@KasperFritzo](https://twitter.com/KasperFritzo) | Kasper Borg | Danish Security Researcher.
|
||||
|[@kazan71p](https://twitter.com/kazan71p) | kazan71p | https://t.co/oTV7m505NG https://t.co/HOkYMVa48M
|
||||
|[@Masonhck3571](https://twitter.com/Masonhck3571) | Masonhck357 | Dominican | Cannabis Connoisseur | Hacker for Hackerone and BugCrowd | CompTIA Net+ Certified | CompTIA Sec+ certified | US Navy Vet | Vegan
|
||||
|[@MasteringBurp](https://twitter.com/MasteringBurp) | Mastering Burp Suite Pro | Tweets and retweets about Burp Suite Pro | Managed by @Agarri_FR | Not affiliated with @Portswigger
|
||||
|[@mcipekci](https://twitter.com/mcipekci) | Mustafa Can İPEKÇİ | I'm an engineer from Turkey, who is interested with biotechology, computer science and digital gaming.A.K.A nukedx
|
||||
|[@Michael1026H1](https://twitter.com/Michael1026H1) | Michael Blake | H1: michael1026.Software engineer interested in software security.Oregon
|
||||
|[@michenriksen](https://twitter.com/michenriksen) | Michael Henriksen | Freelance security engineer and consultant. Need help with web application security?
|
||||
|[@Mik317_](https://twitter.com/Mik317_) | Michele Romano | The walls of Sparta are the chests of its warriors - Agesilao
|
||||
|[@mongobug](https://twitter.com/mongobug) | mongo | I like bug bounty programs and breaking things that other people have built. I love kudos.
|
||||
|[@MrMustacheMan3](https://twitter.com/MrMustacheMan3) | MrMustacheMan | https://t.co/N9HO1Nhef0
|
||||
|[@MrTuxracer](https://twitter.com/MrTuxracer) | Julien Ahrens | Vulnerability Intel | ROP Gadget Hunter | Privacy Enthusiast | Full-time #BugBounty hunter | @Hacker0x01 MVH | @SynackRedTeam
|
||||
|[@nader_brandi](https://twitter.com/nader_brandi) | nader | Security Researcher / Bug Bounty Hunter / web developerhttps://t.co/1mefovxcwn
|
||||
|[@NahamSec](https://twitter.com/NahamSec) | NahamSec | 🇮🇷 Co-founder @bugbountyforum | Hacker Education @Hacker0x01 | 🎥https://t.co/RXnEEloDtu | 👨🏽💻https://t.co/6BfCVo837Z #Hacker101 #TogetherWeHitHarder #BugBounty
|
||||
|[@nahoragg](https://twitter.com/nahoragg) | Rohan Aggarwal | I spend more time on things, to understand them until they don’t understand me and start giving me what they aren’t programmed to.
|
||||
|[@nbk_2000](https://twitter.com/nbk_2000) | ₦฿₭ | Script-Kitty Thought-Feeder#SemperFur #bugbounties #hacking
|
||||
|[@ngalongc](https://twitter.com/ngalongc) | Ron Chan | Security Engineer at GitLab. This is a personal stream, opinions expressed are mine.
|
||||
|[@ngkogkos](https://twitter.com/ngkogkos) | Nick || hunt4p1zza | I find bugs for 🍕.
|
||||
|[@ngocdh](https://twitter.com/ngocdh) | Huy Ngoc | Pentester
|
||||
|[@nijagaw](https://twitter.com/nijagaw) | Nico | Founder of @codegrazer, #Penetrationtester, #bughunter on https://t.co/ufQNKpG2JS, infosec enthusiast
|
||||
|[@nnwakelam](https://twitter.com/nnwakelam) | n a f f y | security expert | Holistic nutritionist, reiki practitioner and drumming circle facilitator.
|
||||
|[@not_an_aardvark](https://twitter.com/not_an_aardvark) | Teddy Katz | Programming language design/security/software correctness enthusiast. Working on privacy @Google (this is a personal account). he/him. ✊🏻✊🏽✊🏿
|
||||
|[@nullenc0de](https://twitter.com/nullenc0de) | Paul Seekamp | I spend a significant amount of time reading security stuff.
|
||||
|[@orange_8361](https://twitter.com/orange_8361) | Orange Tsai 🍊 | This is 🍊
|
||||
|[@p4fg](https://twitter.com/p4fg) | Peter | Are developers better hackers? I think so...
|
||||
|[@PascalSec](https://twitter.com/PascalSec) | ΡΛSCΛLSΞC | 👨💻 Senior Security Engineer / Pentester @Dynatrace📺 Youtuber posting hacking videos at @Hacksplained
|
||||
|[@PentesterLand](https://twitter.com/PentesterLand) | Pentester Land | Resources for penetration testers and bug bounty hunters
|
||||
|[@plmaltais](https://twitter.com/plmaltais) | ramsexy | French-Canadian hacker 🇨🇦. Full-time bug bounty hunter. Craft beer connoisseur 🍻. Surfing the web and hacking the waves. 🌊🏄
|
||||
|[@pnig0s](https://twitter.com/pnig0s) | Terry Zhang | Security @ Ant Group (Attack & Defence)
|
||||
|[@pudsec](https://twitter.com/pudsec) | Shaun |
|
||||
|[@pxmme1337](https://twitter.com/pxmme1337) | Pomme | Triager @Hacker0x01 | Views and opinions are my own and do not reflect my employer's | Memes are life
|
||||
|[@r0bre](https://twitter.com/r0bre) | r0bre | itsec @tudarmstadt , web- and systemsecurity, bugbounty, iOS security research, open source. /stack sommelier/code connaisseur/kernel asmr artist/ 👾📲
|
||||
|[@r0hack](https://twitter.com/r0hack) | Ramazan | Researcher in @deteacthacked by r0hackhttps://t.co/xUo4swrcWM
|
||||
|[@r0x33d](https://twitter.com/r0x33d) | Matt | Security Researcher | Bug Bounty Hunter https://t.co/yUegpDg1DH | Developer
|
||||
|[@Regala_](https://twitter.com/Regala_) | Fisher | Half hacker, half daydreamer. DISTURBANCE. Mercenary for hire. Casabranca. Host @bounty_podcast
|
||||
|[@restr1ct3d](https://twitter.com/restr1ct3d) | Niv Levy | Penetration Testing Engineer / Offensive Security Certified Professional / Bug Bounty Hunter
|
||||
|[@rez0__](https://twitter.com/rez0__) | rez0 | Joseph Thacker // Sr. Security Engineer // Hacker, bug bounty hunter, & hobby jogger. Slay all the dragons that stand in your way. Talk to me about Jesus.
|
||||
|[@Rhynorater](https://twitter.com/Rhynorater) | Justin Gardner | Christian | OSCP I Bug Bounty Hunter | Lover of Python | https://t.co/NsnHpys7Ej | 🗣️ English, 日本語, Italiano | Married to 💖@mariahchan_💖
|
||||
|[@rhyselsmore](https://twitter.com/rhyselsmore) | 🥯 | xfitter, bjj newb, oz shep dad. internet mall cop at @heroku, bugs at https://t.co/MFzfzsrYBp. opinions my own, not employers
|
||||
|[@RockyBandana](https://twitter.com/RockyBandana) | Rocky Bandana | Hacking for Good | whoami: @NathanCavitt
|
||||
|[@rohk_infosec](https://twitter.com/rohk_infosec) | Kevin | senior application security engineer at @Okta - all tweets are my own
|
||||
|[@rootxharsh](https://twitter.com/rootxharsh) | Harsh Jaiswal | Views are my own | AppSec @vimeo.
|
||||
|[@rub003](https://twitter.com/rub003) | 003random | [ 'student', 'system and network engineering', 'bug bounty', 'developer', 'bbac' ]
|
||||
|[@_ruby](https://twitter.com/_ruby) | ruby nealon | 😷
|
||||
|[@rwincey](https://twitter.com/rwincey) | b0yd | software construction & deconstruction
|
||||
|[@Sambal0x](https://twitter.com/Sambal0x) | Richard Tan | Father, security researcher, pentester, proficient diaperchanger.
|
||||
|[@samengmg](https://twitter.com/samengmg) | samuel eng |
|
||||
|[@Samm0uda](https://twitter.com/Samm0uda) | Youssef Sammouda | Cyber Security Expert. YES™ team member.
|
||||
|[@samwcyo](https://twitter.com/samwcyo) | Sam Curry | Full time bug bounty hunter. Run a blog to better explain web application security. Somewhere between high school and pretending to be an adult.
|
||||
|[@santi_lopezz99](https://twitter.com/santi_lopezz99) | Santiago Lopez | 1# Millon Dollar hacker on @Hacker0x01 #bugbounty. Instagram: https://t.co/fLSrAlKf4Q
|
||||
|[@satishb3](https://twitter.com/satishb3) | Satish Bommisetty |
|
||||
|[@_SaxX_](https://twitter.com/_SaxX_) | S. A. X. X. | #BugBounty ¦¦ #Hacker ¦¦ @HexpressoCTF member ¦¦ @breizhctf Org ¦¦ #WebSec ¦¦ Sometimes breaks stuff ¦¦ Building #Cybersecurity in #Africa ¦¦ #OSINT & #Recon
|
||||
|[@seanmeals](https://twitter.com/seanmeals) | Sean Melia | I bug bounty when I can. Thoughts are my own. etc.
|
||||
|[@seanyeoh](https://twitter.com/seanyeoh) | notsy | I only tweet when I'm mad cuz bad.
|
||||
|[@SebMorin1](https://twitter.com/SebMorin1) | Sébastien Morin | Bug bounty hunter, pentester and security researcher
|
||||
|[@securibee](https://twitter.com/securibee) | Big Body Bee 🐝 | Creative problem solver that gets things done.Bee different, bee yourself.
|
||||
|[@securinti](https://twitter.com/securinti) | Inti De Ceukelaire | Uncertified Ethical Hacker (UEH) and bug bounty bro. @intidc (dutch), community dude @intigriti. Tweets are mine and so is your computer.
|
||||
|[@securitybites](https://twitter.com/securitybites) | Jesse Kinser | Hackerone/bugcrowd: randomdeduction
|
||||
|[@SecurityMB](https://twitter.com/SecurityMB) | Michał Bentkowski | Penetration testing, bounty hunting
|
||||
|[@shailesh4594](https://twitter.com/shailesh4594) | Shailesh Suthar | An independent security researcher :-)https://t.co/V7JrsztJK4
|
||||
|[@shmilylty](https://twitter.com/shmilylty) | Jing Ling | Developer, pentester and bug hunter.
|
||||
|[@shub66452](https://twitter.com/shub66452) | $!|3nt_4unt3r | Bug hunter#coder#blockchain enthusiast
|
||||
|[@skeltavik](https://twitter.com/skeltavik) | Bram Ruttens | Penetration Tester @OrangeCyberBE 💉 | Crypto Investor & Enthusiast 💰 | Beer Lover 🍺 | Techno Raver 🎹 | BBAC is a lifestyle 🧬
|
||||
|[@smiegles](https://twitter.com/smiegles) | Olivier Beg | Head of researchers at @zerocopter, Co-founder @bugbountyforum
|
||||
|[@sml555_](https://twitter.com/sml555_) | Sajeeb Lohani (sml555) | Platform Security Engineer @Bugcrowd | Top 50 Bugcrowd | 120+ CVEs
|
||||
|[@snyff](https://twitter.com/snyff) | Louis Nyffenegger | CVE connoisseur @PentesterLab. Security engineer. Bugs are my own, not of my employer. I just want to be a webservice...
|
||||
|[@soaj1664ashar](https://twitter.com/soaj1664ashar) | Ashar Javed | Web AppSec Researcher | #❶ in Microsoft's Top 100 Security Researcher List -2018 | #❹ in Microsoft's Most Valuable Researcher List -2019 & 2020 | Thanks #🆇🆂🆂
|
||||
|[@spaceraccoonsec](https://twitter.com/spaceraccoonsec) | spaceraccoon 🦝 | Here to learn! Hackerone: https://t.co/UK9KDsRVlL
|
||||
|[@_staaldraad](https://twitter.com/_staaldraad) | Etienne Stalmans | Security researcher and breaker of things. &
|
||||
|[@StanFaas](https://twitter.com/StanFaas) | StanFaas 🦉 | Father - Full-time developer - Wannabe hacker / Night-time bug hunter (GangsterSquad) https://t.co/Ew6Xw2eyST
|
||||
|[@steve_mcilwain](https://twitter.com/steve_mcilwain) | Steve Mcilwain | Cybersecurity / Bug Bounty Hunter / Pen Tester / Tool Developer / Illustrator / Animator / Cat Dude
|
||||
|[@stokfredrik](https://twitter.com/stokfredrik) | STÖK ✌️ | Hi.. im that hacker that your friends told you about. I used to travel the world, hack & vlog about it. Hackfluencer - Creative - Sustainable Fashion - he/him
|
||||
|[@streaak](https://twitter.com/streaak) | streaak (on a break) | BBAC kidnapped me | I hack things and occasionally take photographs
|
||||
|[@sushiwushi2](https://twitter.com/sushiwushi2) | iamsushi | I tweet strange things and find bugs #OSCP
|
||||
|[@sw33tLie](https://twitter.com/sw33tLie) | sw33tLie | Bug bounty hunter and CS student, 20yo.Playing with software since I can remember.https://t.co/qABvqCl1Pxhttps://t.co/DFfjocm4aR
|
||||
|[@Th3G3nt3lman](https://twitter.com/Th3G3nt3lman) | Th3g3nt3lman | a born terror, a rebel without a pause, i never had a good christmas so who is santa claus?
|
||||
|[@thedawgyg](https://twitter.com/thedawgyg) | dawgyg | 1 of 8 Millionaire Hackers thanks to @hacker0x01 #h1415 2020 MVH, Bug Bounty Hunter, Reformed Blackhat, Synack Red Team Member, Nissan Skyline Collector
|
||||
|[@theflofly](https://twitter.com/theflofly) | Florian Courtial | 0x00
|
||||
|[@TomNomNom](https://twitter.com/TomNomNom) | TomNomNom | Open-source tool maker, security researcher, trainer, talker, fixer, eater, not really a sheep. He/him.
|
||||
|[@twitt3raccnt](https://twitter.com/twitt3raccnt) | psaux | https://t.co/yQUH0WHaJo
|
||||
|[@uraniumhacker](https://twitter.com/uraniumhacker) | Uranium238 | CS undergrad 3rd year, I hack companies. Team: Ophion. Personal Twitter: @mallocsys. forbes top 20 hackers ever (100% legit)
|
||||
|[@vinodsparrow](https://twitter.com/vinodsparrow) | Vinoth Kumar | DevSecOps. Partime Bug Bounty Hunter. Views are obviously mine
|
||||
|[@vortexau](https://twitter.com/vortexau) | vortex | I work @ Bugcrowd (personal account). Ex-Pentester, Ex-DevTweets about infosec, bounty hunting, homebrewing and cars.SecTalks Adelaide Co-organiser. OSCP/OSWP
|
||||
|[@vp440](https://twitter.com/vp440) | Felix Veillette-Potvin | Pentester @gosecure_inc, Bug bounty hunter, general security enthusiast. Opinions and views expressed are my own.
|
||||
|[@Wh11teW0lf](https://twitter.com/Wh11teW0lf) | Wh11teW0lf | @Synack MEMBER | Security researcher | BugBounty Hunter | https://t.co/Jqu4kV7EjZ | https://t.co/CbOfcB8r0c
|
||||
|[@x1m_martijn](https://twitter.com/x1m_martijn) | x1m | hacker from Groningen
|
||||
|[@xEHLE_](https://twitter.com/xEHLE_) | xEHLE | true(1)
|
||||
|[@Yassineaboukir](https://twitter.com/Yassineaboukir) | Yassine Aboukir 🐐 | Popping shells for flight tickets at your nearest airport departure terminal. AppSec consulting, and bug bounties (11th ranked) on @Hacker0x01 🇲🇦🇫🇷
|
||||
|[@yaworsk](https://twitter.com/yaworsk) | yaworsk | Author of https://t.co/4sI75efGSk, Hacker Interviewer https://t.co/Utz8Qr1kUR, @shopify AppSec. Tweets are my own. Unless you wrote them.
|
||||
|[@yip404](https://twitter.com/yip404) | Mohamed Ebrahem |
|
||||
|[@zeroxyele](https://twitter.com/zeroxyele) | xyele | 🇹🇷https://t.co/PEtNHYrIVKhttps://t.co/p67rsc3GE9
|
||||
|[@zseano](https://twitter.com/zseano) | @zseano | webapp hacker and also that annoying lucio 🐸 Recognised by @Amazon in 2018 for my security research work. ~busy working on @bugbountynotes v2!~
|
||||
|
||||
|
||||
## Discord Servers
|
||||
- [Nahamsec](https://discord.gg/d6dENAq)
|
||||
- [Hacker101](https://discord.gg/WrCTm8h)
|
||||
- [TryHackMe](https://discord.gg/KsAEejZ)
|
||||
- [HackTheBox](https://discord.gg/FrRJ3Z8)
|
||||
- [TheCyberMentor](https://discord.gg/)
|
||||
- [AshF0x - The F0xbox](https://discord.gg/RCTy5zS)
|
||||
- [The Mayor](https://discord.gg/EN2ya9h)
|
||||
- [Sup3rhero1](https://discord.gg/pHfgvns)
|
||||
- [Ceos3c](https://discord.gg/SBK3hkR)
|
||||
|
||||
## Misc
|
||||
- [ChaosComputerClub Germany Media Resources](https://media.ccc.de/) - bunch of conference talks and other media
|
||||
- [Phrack](http://www.phrack.org/)
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
|
@ -2,25 +2,27 @@
|
|||
|
||||
## Setup 💻
|
||||
This section will help you set up your testing environement.
|
||||
- [Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation](https://www.youtube.com/watch?v=YhUiAH5SIqk) - by nahamsec
|
||||
- [Setting Up Your Ubuntu Box for Pentest and Bug Bounty Automation](https://www.youtube.com/watch?v=YhUiAH5SIqk) - by NahamSec
|
||||
- [Setting up your own web server on a VPS](https://www.linux.com/learn/easy-lamp-server-installation)
|
||||
- [Setting up virtualbox + linux](https://linuxconfig.org/how-to-install-kali-linux-on-virtualbox)
|
||||
- [Docker For Pentesting And Bug Bounty Hunting](https://www.youtube.com/watch?v=5G6tA8Q9AuQ)
|
||||
- [Basics of UNIX](https://lifehacker.com/5633909/who-needs-a-mouse-learn-to-use-the-command-line-for-almost-anything)
|
||||
- [Previously Disclosed Vulnerabilities / HackerOne Hacktivity](https://hackerone.com/hacktivity)
|
||||
- [Finding your First Bug and Getting a Bounty - Personal Story by @InsiderPhD](https://www.youtube.com/watch?v=iEDoIEBD7gM) - YouTube Discussion
|
||||
- [Introduction to Docker for CTFs](https://www.youtube.com/watch?v=cPGZMt4cJ0I) (Works for Bug Bounty too) - by LiveOverflow
|
||||
- [Docker Tutorial for Beginners - A Full DevOps Course on How to Run Applications in Containers](https://www.youtube.com/watch?v=fqMOX6JJhGo) - freecodecamp
|
||||
- [Creating Wordlists for Pentesting & Bug Bounty](https://www.youtube.com/watch?v=QGbTaxtEQlg) - by nahamsec
|
||||
- [Setup bugbounty hunting env on termux](https://www.hahwul.com/2020/05/setup-bugbounty-hunting-env-on-termux-d.html?m=1) - by @hahwul
|
||||
- [Technical Project Ideas Towards Learning Cyber Security](https://mchow01.github.io/education/security/projects/2020/06/19/technical_projects_security.html) - by [Ming Y. Chow](https://mchow01.github.io/)
|
||||
|
||||
## Burp Suite
|
||||
This section should help you get familiar with BurpSuite.
|
||||
- [Setting up Burp (Video Series)](https://www.hacker101.com/playlists/burp_suite) by Hacker101
|
||||
- [Burp Suite Introduction](https://github.com/bugcrowd/bugcrowd_university/blob/master/An_introduction_to_Burp_Suite/Bugcrowd%20University%20-%20Burp%20Suite%20Introduction.pdf) by Jason Haddix
|
||||
- [Beginners Guide to Burpsuite Payloads (Part 1)](https://www.hackingarticles.in/beginners-guide-burpsuite-payloads-part-1/) by Raj Chandel
|
||||
- [Burp Hacks for Bounty Hunters](https://www.youtube.com/watch?v=boHIjDHGmIo) by James Kettle
|
||||
|
||||
## Tools
|
||||
- [Getting Starting With Tmux Isn't That Scary](https://www.youtube.com/watch?v=Z5sEEbwngd0)
|
||||
-
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
60
assets/talks.md
Normal file
60
assets/talks.md
Normal file
|
@ -0,0 +1,60 @@
|
|||
# Resources-for-Beginner-Bug-Bounty-Hunters
|
||||
|
||||
## Talks 🤓
|
||||
|
||||
### Table of Contents
|
||||
1. [General Bug Bounty Talks](#General-Bug-Bounty-Talks)
|
||||
2. [Recon and Automation](#Recon-and-Automation)
|
||||
3. [Research and Exploitation](#Research-and-Exploitation)
|
||||
4. [Vulnerabilities Explained](#Vulnerabilities-Explained)
|
||||
5. [Mobile Hacking](#Mobile-Hacking)
|
||||
6. [Miscellaneous](#Miscellaneous)
|
||||
|
||||
### General Bug Bounty Talks
|
||||
- [How To Get Started In Bug Bounties](https://www.youtube.com/watch?v=kn0jClWSdD8) by [DC CyberSec](https://www.youtube.com/channel/UC3sccPO4v8YqCTn8sezZGTw)
|
||||
- [Is it too late to start doing BUG BOUNTY in 2020?](https://www.youtube.com/watch?v=PTTkA_gHgxE) [STOK](https://youtube.com/stokfredrik)
|
||||
- [MY BUG BOUNTY JOURNEY!](https://www.youtube.com/watch?v=ug7FzoByLFc) by Farah Hawa
|
||||
- [DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015](https://www.youtube.com/watch?v=-FAjxUOKbdI)
|
||||
- [Google Hacking (Dorking)](https://www.youtube.com/watch?v=hrVa_dhD-iA)
|
||||
|
||||
### Recon and Automation
|
||||
- [The Truth About Recon](https://www.youtube.com/watch?v=amihlWTtkMA)
|
||||
- [The Bug Hunter's Methodology v4.0 - Recon Edition by @jhaddix #NahamCon2020!](https://www.youtube.com/watch?v=p4JgIu1mceI)
|
||||
-[It’s the Little Things - BSides Portland 2018 by @NahamSec](https://www.youtube.com/watch?v=YT5Zl2jW3wg)
|
||||
- [Who, What, Where, When, Wordlist by @TomNomNom #NahamCon2020](https://www.youtube.com/watch?v=W4_QCSIujQ4)
|
||||
- [GitHub Recon and Sensitive Data Exposure](https://www.youtube.com/watch?v=l0YsEk_59fQ)
|
||||
- [Creating Wordlists for Hacking, Pentesting & Bug Bounty Hunting Using Seclists, Bigquery, and More!](https://www.youtube.com/watch?v=QGbTaxtEQlg)
|
||||
- [Hacking IIS (Recon) by infosec_au](https://www.youtube.com/watch?v=HrJW6Y9kHC4)
|
||||
- [Knock knock, Who's There? Identifying Assets in the Cloud](https://www.youtube.com/watch?v=W5htGHdIc-M&)
|
||||
|
||||
### Research and Exploitation
|
||||
- [XSS on Google Search - Sanitizing HTML in The Client?](https://www.youtube.com/watch?v=lG7U3fuNw3A) - LiveOverflow
|
||||
- [The Fix](https://github.com/google/closure-library/commit/c79ab48e8e962fee57e68739c00e16b9934c0ffa)
|
||||
- [DEF CON 27 Conference - By NahamSec - Owning The Clout Through Server Side Request Forgery](https://www.youtube.com/watch?v=o-tL9ULF0KI)
|
||||
- [Orange Tsai - Infiltrating Corporate Intranet Like NSA Preauth RCE - DEF CON 27 Conference](https://www.youtube.com/watch?v=1IoythC_pIY)
|
||||
- [Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!](https://www.youtube.com/watch?v=CIhHpkybYsY)
|
||||
- [You've Got Pwned: Exploiting E-Mail Systems by @securinti #NahamCon2020!](https://www.youtube.com/watch?v=cThFNXrBYQU)
|
||||
- [Practical Attacks Using HTTP Request Smuggling by @defparam #NahamCon2020](https://www.youtube.com/watch?v=3tpnuzFLU8g)
|
||||
|
||||
### Vulnerabilities Explained
|
||||
- [Subdomain Takeovers, beyond the basics for Pentesters and Bug Bounty Hunters](https://www.youtube.com/watch?v=q_A8aXLO1gA)
|
||||
- [albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference](https://www.youtube.com/watch?v=w-eJM2Pc0KI)
|
||||
- [Server-Side Template Injection: RCE For The Modern Web App](https://www.youtube.com/watch?v=3cT0uE7Y87s)
|
||||
- [A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!](https://www.youtube.com/watch?v=voTHFdL9S2k)
|
||||
- [Finding DOMXSS with DevTools | Untrusted Types Chrome Extension](https://www.youtube.com/watch?v=CNNCCgDkt5k)
|
||||
- [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - STÖK & Fisher
|
||||
- [AppSec EU 2017 Exploiting CORS Misconfigurations For Bitcoins And Bounties by James Kettle](https://www.youtube.com/watch?v=wgkj4ZgxI4c)
|
||||
|
||||
### Mobile Hacking
|
||||
- [Getting Started with Android App Testing with Genymotion](https://www.youtube.com/watch?v=_HRpLPrlg1U)
|
||||
- [Exploiting Android deep links and exported components - Ekoparty Mobile Hacking Space Talk](https://www.youtube.com/watch?v=lg1sN8njSYs)
|
||||
- [Android Hacking #VirSecCon2020](https://www.youtube.com/watch?v=mr64si_-YwI)
|
||||
- [Advanced Android Bug Bounty skills - Ben Actis](https://www.youtube.com/watch?v=OLgmPxTHLuY)
|
||||
- [Android Application Exploitation - Red Team Village](https://www.youtube.com/watch?v=uWT15hEM1dQ)
|
||||
- [Android App Reverse Engineering LIVE!](https://www.youtube.com/watch?v=BijZmutY0CQ)
|
||||
- [Android App Penetration Testing 101](https://www.youtube.com/watch?v=2uwhrfXCl4I)
|
||||
- [Fun with Frida on Mobile](https://www.youtube.com/watch?v=dqA38-1UMxI)
|
||||
|
||||
### Miscellaneous
|
||||
- [Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps](https://www.youtube.com/watch?v=U6qTcpCfuFc)
|
||||
- [Hacker101 - JavaScript for Hackers (Created by @STÖK)](https://www.youtube.com/watch?v=FTeE3OrTNoA)
|
|
@ -57,6 +57,7 @@ Here you can find links to a bunch of useful tools for Bug Bounty Hunting.
|
|||
#### OSINT Webpages
|
||||
| Name | Description | Created by |
|
||||
|------ |------------- |------------- |
|
||||
|[Recon.Dev](https://www.recon.dev)|Recon Data specifically created for bug bounty hunters|[NahamSec & StaticFlow](https://www.recon.dev)|
|
||||
|[hunter.io](https://www.hunter.io)|Email Enumeration for big corps|[Hunter Team](https://hunter.io/about)|
|
||||
|[intelx.io](https://intelx.io/)|Swiss army Knife of OSINT|[Intelligence X](https://twitter.com/_IntelligenceX)|
|
||||
|[Shodan](https://www.shodan.io/)|Search engine that lets you find systems connected to the internet with a variety of filters|John Matherly|
|
||||
|
@ -119,4 +120,4 @@ Here you can find links to a bunch of useful tools for Bug Bounty Hunting.
|
|||
|[canarytokens](https://canarytokens.org/)|[Description](https://blog.thinkst.com/p/canarytokensorg-quick-free-detection.html)||[Thinkst Canary](canary.tools)|
|
||||
|
||||
---
|
||||
back to [Intro Page](/README.md)
|
||||
back to [Intro Page](/README.md)
|
||||
|
|
|
@ -1,12 +1,14 @@
|
|||
# Resources-for-Beginner-Bug-Bounty-Hunters
|
||||
|
||||
## Vulnerabilities 💉
|
||||
Compact descriptions of common vulnerability types with links to useful resources.
|
||||
This page is created to help hackers understand a specific vulnerability type in details. If you would like to read blog posts and see example vulnerability, please read the [blog posts](https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters/assets/blogsposts.md) page
|
||||
|
||||
### Online Resources
|
||||
- [Owasp Top 10](https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project)
|
||||
- [OWASP Testing Guide v4](https://www.owasp.org/index.php/OWASP_Testing_Project)
|
||||
- [Bug Bounty Cheat Sheets](https://github.com/EdOverflow/bugbounty-cheatsheet) - by EdOverflow
|
||||
---
|
||||
|
||||
## Cross-Site Scripting (XSS)
|
||||
As we start to build this repository, we'll be adding more vulnerability types and resources for each one. XSS is a great place to start as it's one of the most popular and easiest vulnerabilities to find in a web application.
|
||||
|
||||
|
@ -26,16 +28,21 @@ As we start to build this repository, we'll be adding more vulnerability types a
|
|||
|
||||
## XML External Entities (XXE)
|
||||
- [XML External Entities ft. JohnHammond](https://www.youtube.com/watch?v=gjm6VHZa_8s) - by PwnFunction
|
||||
|
||||
## Insecure Direct Object Reference (IDOR)
|
||||
- [Insecure Direct Object Reference Vulnerability](https://www.youtube.com/watch?v=rloqMGcPMkI) - by PwnFunction
|
||||
- [Finding Your First Bug: Manual IDOR Hunting](https://www.youtube.com/watch?v=gINAtzdccts) - by Insider PhD
|
||||
- [Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty)](https://www.youtube.com/watch?v=3K1-a7dnA60) - by STÖK & Fisher
|
||||
|
||||
## Open Redirect
|
||||
- [Open Redirect Vulnerability](https://www.youtube.com/watch?v=4Jk_I-cw4WE) - by PwnFunction
|
||||
|
||||
## HTTP Parameter Pollution
|
||||
- [HTTP Parameter Pollution Attacks](https://www.youtube.com/watch?v=QVZBl8yxVX0) - by PwnFunction
|
||||
|
||||
## Logic Errors
|
||||
- [Finding Your First Bug: Business Logic Errors](https://www.youtube.com/watch?v=RobCqW2KwGs) - by InsiderPhD
|
||||
|
||||
## Remote Code Execution
|
||||
- [Finding Your First Bug: Goal Setting / Remote Code Execution (RCE)](https://www.youtube.com/watch?v=5BTvTE3gEq8) - by InsiderPhD
|
||||
---
|
||||
|
|
Loading…
Reference in a new issue