Bug-Bounty notes
CtrlK
cipheropsInstagramLinkedinTwitterTelegram
  • ๐Ÿ’›Welcome to the Future of Cybersecurity
    • ๐Ÿ˜ŽCipherops
    • ๐ŸคฉEmbarking on Your Hacking Journey: A Guide for Beginners
    • ๐ŸŒJourneying Through the World of Ethical Hacking with Cipherops
  • Overview
    • ๐Ÿ—ฝLet's Start
      • ๐ŸฅณExploring Top Platforms and Websites for Hacking Practice and Learning
      • ๐Ÿ“Resources
        • ๐ŸŒ30 cybersecurity search engines
        • ๐ŸฆธFrom Zero to Hero: Navigating Linux Commands Like a Pro
        • ๐Ÿ“‡Cracking the Code: How Damn Vulnerabilities Lab List Can Make You a Cybersecurity Pro
        • ๐ŸฅLevel Up Your Cybersecurity Skills: A TryHackMe Roadmap for Success
        • ๐ŸฆˆThe Ultimate Guide to Mastering Offensive Virtual Machines for Ethical Hacking
        • ๐Ÿ˜คStay One Step Ahead of Hackers: Discover the Ultimate Cybersecurity YouTube Channels
        • All DAMN vulnerable resources
        • Hacking Resources
    • ๐Ÿ‘ฃOSINT
      • ๐Ÿ•น๏ธExploring the Digital Universe: Mastering Tools for IP, Domain, and Email Analysis๐ŸŒ๐Ÿ”๐Ÿ’ผ
    • ๐ŸฆGoogle Hacking using Dorks
      • ๐Ÿ“™Essential Bug Bounty Resources: Books and References
      • ๐ŸŒฏOptimizing Bug Bounty with GitHub Dorks: A Comprehensive Guide
  • โ„น๏ธRecon Tips
    • ๐Ÿ˜30 Commonly Targeted Ports by Hackers: A Comprehensive Guide
    • ๐ŸŽ—๏ธBest Recon Technique For Active Subdomain Enumeration
    • 1๏ธโƒฃUnlocking Bounty Riches: A Glimpse into the World of Awesome Bug Bounties
    • ๐ŸšกStreamlining Your Reconnaissance Workflow for Effective Bug Bounty Hunting
    • ๐ŸŒŠMastering the Art of Information Gathering
    • ๐ŸซSeries on : The Power of Reconnaissance Tools
      • ๐Ÿ”ฉTool - 1 Subscraper
      • ๐Ÿ”งTool - 2 Findomain Subdomain Enumeration Tool
      • ๐ŸนTool - 3 Assetfinder: Subdomain Enumeration Tool Manual
      • ๐Ÿ”ฌTool - 4 Subfinder: An Essential Guide for Domain Reconnaissance
  • ๐Ÿ•ธ๏ธWeb Application
    • ๐ŸบTop 100 web vulnerabilities
    • ๐ŸฅˆIntroducing 20 web-application hacking tools๐Ÿ”ฅ๐Ÿคฉ๐ŸŒต
    • ๐ŸงชComprehensive Web Application Testing Checklist
    • ๐Ÿ‘Unveiling Open Ports with Advanced Techniques
    • ๐ŸฆŠThe Art of XSS Exploitation
    • ๐Ÿ“ƒCrucial WordPress Security Misconfiguration You Need to Know
    • ๐ŸคฏUnderstanding SSRF Vulnerabilities and Their Impact
      • ๐ŸฅซExploring the Canvas: Common Exploits for Accessing Internal Pages
      • ๐Ÿ˜‰Revealing Hidden Treasures: Accessing Internal Files via URL Scheme
      • ๐ŸŽŠConnecting to Services via URL Schemes
      • ๐Ÿค–Mastering SSRF Exploits: Unraveling Gopher's Web of Intrigue
      • ๐Ÿ“ฆXSPA: Navigating the Labyrinth of Port Scanning in SSRF
      • ๐ŸŽฃUnveiling the Secrets of Cloud Provider Metadata Through SSRF
      • ๐Ÿ”“Unlocking Forbidden Territories: Mastering Blacklist Bypass Techniques
    • ๐Ÿค–Mastering Subdomain Takeovers
    • โš“Comprehensive Guide to Web Content Discovery: Tools, Techniques, and Tips
    • ๐ŸExploring XPath Injection: Basics, Techniques, and Creative Exploitation
    • โ˜ข๏ธUnderstanding JSON API: A Comprehensive Guide
      • ๐Ÿงžโ€โ™‚๏ธAPI Security Cheat Sheet PART - 1
      • ๐Ÿงžโ€โ™€๏ธAPI Security Cheat Sheet PART - 2
      • ๐Ÿงžโ€โ™€๏ธAPI Security Cheat Sheet PART - 3
      • ๐ŸงžAPI Security Cheat Sheet PART - 4
      • ๐Ÿงžโ€โ™‚๏ธAPI Security Cheat Sheet PART - 5
      • ๐Ÿงžโ€โ™€๏ธAPI Security Cheat Sheet PART - 6
      • ๐ŸงžAPI Security Cheat Sheet PART - 7
      • ๐Ÿงžโ€โ™‚๏ธAPI Security Cheat Sheet PART - 8
      • ๐Ÿงžโ€โ™€๏ธAPI Security Cheat Sheet PART - 9
      • ๐ŸงžAPI Security Cheat Sheet PART - 10
    • ๐Ÿ‘ฟDe-serialization Attack
    • ๐Ÿ…ฐ๏ธUnderstanding Common API Vulnerabilities: A Deep Dive
    • Technology Identification
    • Link Extraction Tools
    • Parameter and Web Fuzzing Tools
    • Screenshots
    • File Inclusion,CSRF Injection,Directory Traversal
    • GraphQL Injection,Insecure Deserialization,Header Injection
    • Exploitation Tools Categorized by Vulnerability Type
    • Insecure Direct Object References, Open Redirect, Request Smuggling
    • Disclosed Reports ๐Ÿ“
    • Web Hack Tools
  • Network security
    • ๐Ÿ‡A Journey into SMB Enumeration (Port 139, 445)
      • SMB Checklist
    • ๐ŸŽ†SNMP (Simple Network Management Protocol) Notes
  • โœณ๏ธMastering the Art of Writing Clear and Effective Vulnerabilities Report
  • ๐ŸฆTwitter
    • โœ–๏ธThread by @ArchAngelDDay on Thread Reader App
      • โœ–๏ธTips and Tricks From Twitter
      • โœ–๏ธpeople to follow on twitter
  • ๐ŸŒ†Subdomain Enumeration
    • Subdomains Enumeration tools
  • โ˜๏ธCloud Pen-Testing Checklist
    • Cloud Pen-testing Part-1
    • Cloud Pen-testing Part-2
    • Cloud Pen-testing Part -3
    • Cloud Pen-testing Part -4
    • Cloud Pen-testing Part -5
    • Cloud Pen-testing Part -6
  • โš’๏ธTools
    • ๐Ÿ”‘Nmap's NSE Scripts for Ethical Password Testing
    • ๐Ÿช“Axion-Scan
    • ๐Ÿ•ถ๏ธDalFox Tool
  • Shodan Pentesting Guide
    • Shodan Dorks
  • ๐Ÿ‡ฌ๐Ÿ‡นHacking Templates
  • ๐Ÿ‘ปCheat-sheet's
    • Bug-Bounty Cheatsheet
    • Linux-Cheatsheet
    • Windows-Cheatsheet
    • Hacking-Cheatsheet
  • Medium and other articles links
  • โ—Exploitation
    • Exploitation notes
    • Post Exploitation
  • โ“Interview Question
    • Question and Answers
  • Import
    • 1729001364016279874
  • Import
    • 1729001364016279874
Powered by GitBook
On this page

๐Ÿ•ธ๏ธWeb Application

๐ŸบTop 100 web vulnerabilities๐ŸฅˆIntroducing 20 web-application hacking tools๐Ÿ”ฅ๐Ÿคฉ๐ŸŒต๐ŸงชComprehensive Web Application Testing Checklist๐Ÿ‘Unveiling Open Ports with Advanced Techniques๐ŸฆŠThe Art of XSS Exploitation๐Ÿ“ƒCrucial WordPress Security Misconfiguration You Need to Know๐ŸคฏUnderstanding SSRF Vulnerabilities and Their Impact๐Ÿค–Mastering Subdomain Takeoversโš“Comprehensive Guide to Web Content Discovery: Tools, Techniques, and Tips๐ŸExploring XPath Injection: Basics, Techniques, and Creative Exploitationโ˜ข๏ธUnderstanding JSON API: A Comprehensive Guide๐Ÿ‘ฟDe-serialization Attack๐Ÿ…ฐ๏ธUnderstanding Common API Vulnerabilities: A Deep DiveTechnology IdentificationLink Extraction ToolsParameter and Web Fuzzing ToolsScreenshotsFile Inclusion,CSRF Injection,Directory TraversalGraphQL Injection,Insecure Deserialization,Header InjectionExploitation Tools Categorized by Vulnerability TypeInsecure Direct Object References, Open Redirect, Request SmugglingDisclosed Reports ๐Ÿ“Web Hack Tools
PreviousTool - 4 Subfinder: An Essential Guide for Domain ReconnaissanceNextTop 100 web vulnerabilities