search
Join or Log In

Bug Bounty

Browse 15 cybersecurity tools tagged with "Bug Bounty"

Hacksplaining

Hacksplaining

language

Secure Code Training

Hacksplaining on SecurityListing: Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.

4.7(2)
bWAPP

bWAPP

language

Penetration Testing

bWAPP on SecurityListing: A free and open-source deliberately insecure web application for security enthusiasts, developers, and students to discover and prevent web vulnerabilities.

4.7(2)
hackxor

hackxor

language

Cyber Range Training

hackxor on SecurityListing: A platform offering hacking missions to test and enhance skills.

4.5(1)
PortSwigger

PortSwigger

language

Penetration Testing

PortSwigger on SecurityListing: A comprehensive toolkit for web application security testing, offering a range of products and solutions for identifying vulnerabilities and improving security posture.

4.5(1)
GHH - Google Hack Honeypot

GHH - Google

language

Security Operations

GHH - Google Hack Honeypot on SecurityListing: GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

4.5(1)
iScan Advanced Scanning Tool

iScan Advanced Scanning

language

Security Scanning

iScan Advanced Scanning Tool on SecurityListing: Scans repositories for exposed secrets, API keys, and credentials for bug bounty

4.5(1)
0xf.at Hackits

0xf.at Hackits

language

Cyber Range Training

0xf.at Hackits on SecurityListing: Solve password-riddles on a website without logins or ads.

4.5(1)
BinaryMist

BinaryMist

language

Risk Assessment Services

BinaryMist on SecurityListing: A company that helps organizations create security-aware teams and produce bug-free software.

3.8(1)
Yogosha Vulnerability Disclosure Program

Yogosha Vulnerability Disclosure

language

Vulnerability Assessment

Yogosha Vulnerability Disclosure Program on SecurityListing: Managed VDP platform for secure vulnerability reporting and triage

Secure Coding Guidelines for Java SE

Secure Coding Guidelines

language

Secure Code Training

Secure Coding Guidelines for Java SE on SecurityListing: Guidelines for secure coding in Java SE to avoid bugs that could weaken security and open holes in Java's security features.

Yogosha Offensive Security Testing Platform

Yogosha Offensive Security

language

Penetration Testing

Yogosha Offensive Security Testing Platform on SecurityListing: Platform for managing offensive security tests including pentests and bug bounties

Pentesting Payloads

Pentesting Payloads

language

Offensive Security

Pentesting Payloads on SecurityListing: A web-based payload repository that generates and encodes ready-to-use exploits for SQL injection, XSS, file inclusion, and command injection vulnerabilities.

Yogosha Pentest as a Service

Yogosha Pentest as

language

Offensive Security

Yogosha Pentest as a Service on SecurityListing: Platform for on-demand pentests & bug bounties via vetted security researchers

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus

Sabotage: Code added

language

Software Composition Analysis

Sabotage: Code added to popular NPM package wiped files in Russia and Belarus on SecurityListing: A developer added malicious code to a popular open-source package, wiping files on computers in Russia and Belarus as a protest.

Twitter's Vine Source Code Dump

Twitter's Vine Source

language

Penetration Testing

Twitter's Vine Source Code Dump on SecurityListing: A disclosure of a bug found in Twitter's Vine and the process of procuring the source code.