Bug Bounty
Browse 15 cybersecurity tools tagged with "Bug Bounty"

Hacksplaining
Secure Code Training
Hacksplaining on SecurityListing: Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.

bWAPP
Penetration Testing
bWAPP on SecurityListing: A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

hackxor
Cyber Range Training
hackxor on SecurityListing: A platform offering hacking missions to test and enhance skills.

PortSwigger
Penetration Testing
PortSwigger on SecurityListing: A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.

GHH - Google
Security Operations
GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

iScan Advanced Scanning
Security Scanning
iScan Advanced Scanning Tool on SecurityListing: Scans repositories for exposed secrets, API keys, and credentials for bug bounty

0xf.at Hackits
Cyber Range Training
0xf.at Hackits on SecurityListing: Solve password-riddles on a website without logins or ads.

BinaryMist
Risk Assessment Services
BinaryMist on SecurityListing: A company that helps organizations create security-aware teams and produce bug-free software.

Yogosha Vulnerability Disclosure
Vulnerability Assessment
Yogosha Vulnerability Disclosure Program on SecurityListing: Managed VDP platform for secure vulnerability reporting and triage

Secure Coding Guidelines
Secure Code Training
Secure Coding Guidelines for Java SE on SecurityListing: Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.

Yogosha Offensive Security
Penetration Testing
Yogosha Offensive Security Testing Platform on SecurityListing: Platform for managing offensive security tests including pentests and bug bounties

Pentesting Payloads
Offensive Security
Pentesting Payloads on SecurityListing: A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.

Yogosha Pentest as
Offensive Security
Yogosha Pentest as a Service on SecurityListing: Platform for on-demand pentests & bug bounties via vetted security researchers

Sabotage: Code added
Software Composition Analysis
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus on SecurityListing: A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

Twitter's Vine Source
Penetration Testing
Twitter's Vine Source Code Dump on SecurityListing: A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.