Bug-Bounty notes
cipheropsInstagramLinkedinTwitterTelegram
  • πŸ’›Welcome to the Future of Cybersecurity
    • 😎Cipherops
    • 🀩Embarking on Your Hacking Journey: A Guide for Beginners
    • 🌏Journeying Through the World of Ethical Hacking with Cipherops
  • Overview
    • πŸ—½Let's Start
      • πŸ₯³Exploring Top Platforms and Websites for Hacking Practice and Learning
      • πŸ“Resources
        • 🌏30 cybersecurity search engines
        • 🦸From Zero to Hero: Navigating Linux Commands Like a Pro
        • πŸ“‡Cracking the Code: How Damn Vulnerabilities Lab List Can Make You a Cybersecurity Pro
        • πŸ₯Level Up Your Cybersecurity Skills: A TryHackMe Roadmap for Success
        • 🦈The Ultimate Guide to Mastering Offensive Virtual Machines for Ethical Hacking
        • 😀Stay One Step Ahead of Hackers: Discover the Ultimate Cybersecurity YouTube Channels
        • All DAMN vulnerable resources
        • Hacking Resources
    • πŸ‘£OSINT
      • πŸ•ΉοΈExploring the Digital Universe: Mastering Tools for IP, Domain, and Email AnalysisπŸŒπŸ”πŸ’Ό
    • 🦝Google Hacking using Dorks
      • πŸ“™Essential Bug Bounty Resources: Books and References
      • 🌯Optimizing Bug Bounty with GitHub Dorks: A Comprehensive Guide
  • ℹ️Recon Tips
    • 😍30 Commonly Targeted Ports by Hackers: A Comprehensive Guide
    • πŸŽ—οΈBest Recon Technique For Active Subdomain Enumeration
    • 1️⃣Unlocking Bounty Riches: A Glimpse into the World of Awesome Bug Bounties
    • 🚑Streamlining Your Reconnaissance Workflow for Effective Bug Bounty Hunting
    • 🌊Mastering the Art of Information Gathering
    • 🫐Series on : The Power of Reconnaissance Tools
      • πŸ”©Tool - 1 Subscraper
      • πŸ”§Tool - 2 Findomain Subdomain Enumeration Tool
      • 🏹Tool - 3 Assetfinder: Subdomain Enumeration Tool Manual
      • πŸ”¬Tool - 4 Subfinder: An Essential Guide for Domain Reconnaissance
  • πŸ•ΈοΈWeb Application
    • 🏺Top 100 web vulnerabilities
    • πŸ₯ˆIntroducing 20 web-application hacking toolsπŸ”₯🀩🌡
    • πŸ§ͺComprehensive Web Application Testing Checklist
    • πŸ‘Unveiling Open Ports with Advanced Techniques
    • 🦊The Art of XSS Exploitation
    • πŸ“ƒCrucial WordPress Security Misconfiguration You Need to Know
    • 🀯Understanding SSRF Vulnerabilities and Their Impact
      • πŸ₯«Exploring the Canvas: Common Exploits for Accessing Internal Pages
      • πŸ˜‰Revealing Hidden Treasures: Accessing Internal Files via URL Scheme
      • 🎊Connecting to Services via URL Schemes
      • πŸ€–Mastering SSRF Exploits: Unraveling Gopher's Web of Intrigue
      • πŸ“¦XSPA: Navigating the Labyrinth of Port Scanning in SSRF
      • 🎣Unveiling the Secrets of Cloud Provider Metadata Through SSRF
      • πŸ”“Unlocking Forbidden Territories: Mastering Blacklist Bypass Techniques
    • πŸ€–Mastering Subdomain Takeovers
    • βš“Comprehensive Guide to Web Content Discovery: Tools, Techniques, and Tips
    • 🐝Exploring XPath Injection: Basics, Techniques, and Creative Exploitation
    • ☒️Understanding JSON API: A Comprehensive Guide
      • πŸ§žβ€β™‚οΈAPI Security Cheat Sheet PART - 1
      • πŸ§žβ€β™€οΈAPI Security Cheat Sheet PART - 2
      • πŸ§žβ€β™€οΈAPI Security Cheat Sheet PART - 3
      • 🧞API Security Cheat Sheet PART - 4
      • πŸ§žβ€β™‚οΈAPI Security Cheat Sheet PART - 5
      • πŸ§žβ€β™€οΈAPI Security Cheat Sheet PART - 6
      • 🧞API Security Cheat Sheet PART - 7
      • πŸ§žβ€β™‚οΈAPI Security Cheat Sheet PART - 8
      • πŸ§žβ€β™€οΈAPI Security Cheat Sheet PART - 9
      • 🧞API Security Cheat Sheet PART - 10
    • πŸ‘ΏDe-serialization Attack
    • πŸ…°οΈUnderstanding Common API Vulnerabilities: A Deep Dive
    • Technology Identification
    • Link Extraction Tools
    • Parameter and Web Fuzzing Tools
    • Screenshots
    • File Inclusion,CSRF Injection,Directory Traversal
    • GraphQL Injection,Insecure Deserialization,Header Injection
    • Exploitation Tools Categorized by Vulnerability Type
    • Insecure Direct Object References, Open Redirect, Request Smuggling
    • Disclosed Reports πŸ“
    • Web Hack Tools
  • Network security
    • πŸ‡A Journey into SMB Enumeration (Port 139, 445)
      • SMB Checklist
    • πŸŽ†SNMP (Simple Network Management Protocol) Notes
  • ✳️Mastering the Art of Writing Clear and Effective Vulnerabilities Report
  • 🐦Twitter
    • βœ–οΈThread by @ArchAngelDDay on Thread Reader App
      • βœ–οΈTips and Tricks From Twitter
      • βœ–οΈpeople to follow on twitter
  • πŸŒ†Subdomain Enumeration
    • Subdomains Enumeration tools
  • ☁️Cloud Pen-Testing Checklist
    • Cloud Pen-testing Part-1
    • Cloud Pen-testing Part-2
    • Cloud Pen-testing Part -3
    • Cloud Pen-testing Part -4
    • Cloud Pen-testing Part -5
    • Cloud Pen-testing Part -6
  • βš’οΈTools
    • πŸ”‘Nmap's NSE Scripts for Ethical Password Testing
    • πŸͺ“Axion-Scan
    • πŸ•ΆοΈDalFox Tool
  • Shodan Pentesting Guide
    • Shodan Dorks
  • πŸ‡¬πŸ‡ΉHacking Templates
  • πŸ‘»Cheat-sheet's
    • Bug-Bounty Cheatsheet
    • Linux-Cheatsheet
    • Windows-Cheatsheet
    • Hacking-Cheatsheet
  • Medium and other articles links
  • ❗Exploitation
    • Exploitation notes
    • Post Exploitation
  • ❓Interview Question
    • Question and Answers
  • Import
    • 1729001364016279874
  • Import
    • 1729001364016279874
Powered by GitBook

πŸ‘»Cheat-sheet's

Bug-Bounty CheatsheetLinux-CheatsheetWindows-CheatsheetHacking-Cheatsheet
PreviousHacking TemplatesNextBug-Bounty Cheatsheet

Last updated 1 year ago

Was this helpful?