Bug Bounty
Browse 15 cybersecurity tools tagged with "Bug Bounty"
bWAPP
Penetration Testing
bWAPP on SecurityListing: A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.
Hacksplaining
Secure Code Training
Hacksplaining on SecurityListing: Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
hackxor
Cyber Range Training
hackxor on SecurityListing: A platform offering hacking missions to test and enhance skills.
PortSwigger
Penetration Testing
PortSwigger on SecurityListing: A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.
0xf.at Hackits
Cyber Range Training
0xf.at Hackits on SecurityListing: Solve password-riddles on a website without logins or ads.
iScan Advanced Scanning
Security Scanning
iScan Advanced Scanning Tool on SecurityListing: Scans repositories for exposed secrets, API keys, and credentials for bug bounty
GHH - Google
Security Operations
GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.
BinaryMist
Risk Assessment Services
BinaryMist on SecurityListing: A company that helps organizations create security-aware teams and produce bug-free software.
Yogosha Offensive Security
Penetration Testing
Yogosha Offensive Security Testing Platform on SecurityListing: Platform for managing offensive security tests including pentests and bug bounties
Pentesting Payloads
Offensive Security
Pentesting Payloads on SecurityListing: A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.
Secure Coding Guidelines
Secure Code Training
Secure Coding Guidelines for Java SE on SecurityListing: Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.
Yogosha Pentest as
Offensive Security
Yogosha Pentest as a Service on SecurityListing: Platform for on-demand pentests & bug bounties via vetted security researchers
Yogosha Vulnerability Disclosure
Vulnerability Assessment
Yogosha Vulnerability Disclosure Program on SecurityListing: Managed VDP platform for secure vulnerability reporting and triage
Sabotage: Code added
Software Composition Analysis
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus on SecurityListing: A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.
Twitter's Vine Source
Penetration Testing
Twitter's Vine Source Code Dump on SecurityListing: A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.