Coding
- Home
- Coding
5 Common Coder Mistakes in Bug Bounty Hunting (with Code Fixes)
Here are some common mistakes coders make when doing bug bounty, along with code examples and tips for avoiding them:
Nodesub - A command-line tool for finding subdomains in bug bounty programs
Nodesub is a command-line tool for finding subdomains in bug bounty programs. It supports various subdomain enumeration techniques and provi...
♠️ Noir - An attack surface detector form source code.
♠️ Noir is an attack surface detector form source code.
HackBot - AI Cybersecurity Chatbot
A simple cli chatbot having Llama2 as its backend chat AI.
Indicator-Intelligence - Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.
Graphcat.py - Generate graphs and charts based on password cracking result
Simple script to generate graphs and charts on hashcat (and john) potfile and ntds.
How to Install and Use CodeGPT in VS Code
One of the many ways AI is transforming the world is through intelligent code completion and translating natural language to code. In this d...
Ator - Authentication Token Obtain and Replace Extender
Authentication Token Obtain and Replace (ATOR) Burp Plugin: Fast and Reliable plugin to handle Complex Login Sequences
Reverse Engineering: Conceptual Logic
Conceptual logic essentially is the logical processing and the thought or understanding of a given concept, in our case these concepts may m...
𝐏𝐎𝐏𝐔𝐋𝐀𝐑 𝐏𝐎𝐒𝐓𝐒
𝐂𝐀𝐓𝐄𝐆𝐎𝐑𝐈𝐄𝐒
- 2FA/MFA[10]
- AI[14]
- Alexa[2]
- Amazon[1]
- Android[30]
- Automotive[3]
- Banned[1]
- BeEF[1]
- Bitcoin[1]
- Blue Team[2]
- Breaches[4]
- Browser[3]
- Brute-Force Attack[9]
- Bug Bounty[9]
- Canva[1]
- ChatGPT[17]
- Coding[16]
- Cryptocurrency[1]
- Cyber Attacks[36]
- CyberSecurity[87]
- DarkWeb[9]
- DataLeak[21]
- DDoS Attack[3]
- DeepFake[2]
- DeepSeek[3]
- Discord[4]
- Earning[4]
- Earth Day[1]
- Eid[1]
- Ethical Hacking[32]
- Exploiting[20]
- Facebook[4]
- Failure[2]
- Firefox[1]
- Flippper Zero[1]
- Gaming[10]
- GIthub[130]
- Google[19]
- GPT-4[7]
- Hacked[27]
- Hacker101[2]
- Hackers[23]
- Html[1]
- HTTP[2]
- Hydra[2]
- injection[2]
- Instagram[5]
- IOS[27]
- Islamic[2]
- Jobs[3]
- Kali Linux[18]
- Laptop[9]
- Life[1]
- Linux[31]
- Linux Hunters[2]
- Malware[6]
- Metasploit[6]
- Microsoft[5]
- Mobile[23]
- Motivation[2]
- NetCat[1]
- Networking[9]
- News[1]
- Nmap[4]
- Offensive Security[3]
- OSNIT[9]
- Parrot OS[2]
- Passwords[10]
- Payloads[9]
- Paypal[4]
- Penetration[2]
- Pentesting[37]
- Phishing[6]
- PlayStation[1]
- PowerShell[8]
- PowerSploit[2]
- Proxy[1]
- Pwned[1]
- Python[44]
- Quantum Computing[1]
- Ramadan[1]
- Red Team[17]
- Restrictions[2]
- Reverse Engineering[7]
- Roadmap[1]
- Security[80]
- Sniffing[2]
- Social[11]
- Steam[2]
- Success[4]
- Tech[92]
- Termux[12]
- Testing[1]
- TikTok[1]
- Tools[128]
- tracking[6]
- TryHackMe[4]
- UI/UX[1]
- VirtualBox[2]
- Vulnerabilities[31]
- Webtalk[3]
- WhatsApp[9]
- Wifi[9]
- Windows[34]
- Wireshark[2]
- Youtube[3]
- Zero-Day[5]
- Zoom[3]