Title here
Summary here
A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques!
More than 200 custom test cases
A list of services and how to claim (sub)domain with dangling DNS records.
A collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
1337 Wordlists for Bug Bounty Hunting