Bug Bounty

Explore 31 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

HexStrike AI MCP Agents Logo

MCP server enabling AI agents to autonomously run 150+ security tools

2
Pentesting Payloads Logo

A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.

0
Jsmon Logo

A JavaScript security scanning platform that detects exposed secrets, API keys, and vulnerabilities in JavaScript files through continuous monitoring and automated discovery.

0
SecTemplates Logo

SecTemplates provides free security program templates, runbooks, and documentation resources for information security professionals and engineering teams.

2
Naabu Logo

A fast and reliable port scanner written in Go, designed for attack surface discovery in bug bounties and penetration testing.

0
bugcrowd-levelup-subdomain-enumeration Logo

Educational repository containing materials on advanced subdomain enumeration techniques from Bugcrowd LevelUp 2017 conference.

0
s3reverse Logo

A format conversion tool for S3 buckets designed to assist bug bounty hunters and security testers in standardizing bucket data during reconnaissance activities.

0
Sudomy Logo

A subdomain enumeration tool for bug hunting and pentesting

0
BinaryMist Logo

A company that helps organizations create security-aware teams and produce bug-free software.

0
ParamSpider Logo

A Python tool that mines URLs from web archives to assist security researchers in discovering potential attack surfaces for bug hunting and vulnerability assessment.

1
hakrawler Logo

A fast web crawler for discovering endpoints and assets within web applications during security reconnaissance.

1
Git Scanner Framework Logo

A bash-based framework for discovering and extracting exposed .git repositories from web servers during penetration testing and bug bounty activities.

0
CloudBrute Logo

A black-box reconnaissance tool that discovers cloud infrastructure, files, and applications across major cloud providers for security testing purposes.

0
Secure Coding Guidelines for Java SE Logo

Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.

0
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus Logo

A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

0
Axiom Logo

A dynamic multi-cloud infrastructure framework that enables rapid deployment of disposable instances pre-loaded with security tools for distributed offensive and defensive security operations.

0
Twitter's Vine Source Code Dump Logo

A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.

0
Node.js Bug Bounty Program Logo

A HackerOne-managed bug bounty program dedicated to identifying and fixing security vulnerabilities in the Node.js ecosystem.

0
Bug Bounty Cheat Sheet Logo

A comprehensive reference guide covering various web application vulnerabilities, testing techniques, and resources for bug bounty hunters and security researchers.

0
bounty-targets-data Logo

A repository providing hourly-updated data dumps of bug bounty platform scopes from major platforms like HackerOne, Bugcrowd, and Intigriti for security researchers.

0
PortSwigger Logo

A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.

0
0xf.at Hackits Logo

Solve password-riddles on a website without logins or ads.

0
hackxor Logo

A platform offering hacking missions to test and enhance skills.

1
Hack Yourself First Logo

Platform for users to test cybersecurity skills by exploiting vulnerabilities.

0