Web Application

Web Application Worksheet

#Information gathered in order to be get into the bug bounty world. This repository includes:

  • CheckList = A comprehensive lists of all the vulnerabiltie to look for on a given domain
  • Methodology -
    1. Discovery:
    • TLD Discovery
    • Subdomain Discovery
    • Scanning
    • Visual Identification
    • WayBack Enumeration
    • Platform Identification
    1. Exploitation
    • Javascript Parsing
    • Content Discovery
    • Parameter Bruting
    1. Vulnerabilities
    • XSS
    • Sensitive Files
    • SQL Injection
    • LFI & RFI
    • CSRF
    • SSRF
    • CMD Injection
    • XXE
    • Open Redirect
  • Vulnerabilities = A list of vulnerabilities found on different BugBounty Programs, some are eligible and some are ooo.