Sumit Subhajyoti's repositories
awesome-blockchain-bug-bounty
A comprehensive curated list of available Blockchain Bug Bounty Programs.
awesome-bug-bounty
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
awesome-exploit-development
A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development
Books
Free Online Books
bounty
Misc bounty and vulndisc things
Bug-Bounty-Dorks
Dorks for bugbounty websites
bug-bounty-dorks-1
List of Google Dorks for sites that have responsible disclosure program / bug bounty program
Bug-Bounty-Dorks-And-Platforms
This are some Dorks and Platform to find the Bug Bounty Programs.
bug-bounty-platforms
A community-powered collection of all known bug bounty platforms, vulnerability disclosure platforms, and crowdsourced security platforms currently active on the Internet.
Bug-Bounty-Platforms-1
Sites which you permission to check their security
bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters.
bugbountyDorks
This repo contains all the Bug Bounty Dorks sourced from different awesome sources and compiled at one place
Offensive-Resources
A Huge Learning Resources with Labs For Offensive Security Players
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
PENTESTING-BIBLE
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
public-bugbounty-programs
Community curated list of public bug bounty and responsible disclosure programs.
public-reports
bug bounty disclosed reports
Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.