• Stars
    star
    2,421
  • Rank 19,000 (Top 0.4 %)
  • Language
  • Created over 4 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Mind-Maps of Several Things

MindMaps ๐Ÿ—บ๏ธ

This repository stores and houses various Mindmaps for bug bounty Hunters๐Ÿง‘โ€๐Ÿฆฐ, pentesters๐Ÿง‘โ€๐Ÿฆฐ and offensive(๐Ÿ”ด)/defensive(๐Ÿ”ต) security Professionals๐Ÿซ‚ provided by me as well as contributed by the community๐Ÿง‘๐Ÿปโ€๐Ÿคโ€๐Ÿง‘๐Ÿฝ. Your contributions and suggestions are welcomed.

Name Link Type Description Author
Bug Hunters Methodology ๐Ÿ”— ๐Ÿ”ด This Mindmap explains how to test for bugs on Bug bounty programs Jhaddix
Fiding Server side issues ๐Ÿ”— ๐Ÿ”ด This mind-map explains how to look for server side issues on your bug-bounty/pentest targets Imran parray
Javascript Recon ๐Ÿ”— ๐Ÿ”ด How to perform recon on JavaScript files Imran parray
My Recon ๐Ÿ”— ๐Ÿ”ด This mind-map explains how to look for various server side and client side bugs on Bug bounty programs Imran parray
Testing 2FA ๐Ÿ”— ๐Ÿ”ด How to test 2FA for Bugs hackerscrolls
Testing 2FA [2] ๐Ÿ”— ๐Ÿ”ด How to test 2FA for Bugs hackerscrolls
2FA Bypass Techniques ๐Ÿ”— ๐Ÿ”ด 2FA Bypass Techniques Harsh Bothra
Android Attacker Vectors ๐Ÿ”— ๐Ÿ”ด Detailed Mindmap on How to find and exploit Android bugs. hackerscrolls
Testing oAuth for Vulnerabilities ๐Ÿ”— ๐Ÿ”ด How to test Oauth for Bugs hackerscrolls
Security Assesment Mindmap ๐Ÿ”— ๐Ÿ”ด General security Assessment Mind-map Sopas
Red Teaming Mind Map from The Hacker Playbook 3 ๐Ÿ”— ๐Ÿ”ด Mind-map containing several techniques and approaches used by Red team members Marcon Lencini
SSRF MindMap ๐Ÿ”— ๐Ÿ”ด How to test SSRF for Bugs hackerscrolls
Code Review Mindmap ๐Ÿ”— ๐Ÿ”ด๐Ÿ”ต Mindmap containing several techniques and approaches that can be used during code reviews. www.amanhardikar.com
Android Application Penetration Testing Mindmap ๐Ÿ”— ๐Ÿ”ด A simple mind-map which explains various test cases around Android Application Penetration Testing Harsh Bothra
Cookie Based Authentication Vulnerabilities ๐Ÿ”— ๐Ÿ”ด a comprehensive Mind-map which includes various techniques to test Cookie based authentication mechanism. Harsh Bothra
Tesing JIRA for CVE's ๐Ÿ”— ๐Ÿ”ด Detailed Mind-map on How to find and exploit JIRA CVE's. Harsh Bothra
Scope Based Testing ๐Ÿ”— ๐Ÿ”ด This Mind-map explains how to test for bugs based on the scope of your target. Harsh Bothra
OAuth 2.0 Threat Model Pentesting Checklist ๐Ÿ”— ๐Ÿ”ด The following checklist represents a simplified visual alternative to IETF OAuth 2.0 Security Best Current Practice publication combined with various other public resources we found usefull. Binary Brotherhood
Bug Bounty Platforms ๐Ÿ”— ๐Ÿ”ด list of bug bounty platform available fujie gu
Web App Pentest ๐Ÿ”— ๐Ÿ”ด Web application Pentest Mindmap Ding Jayway
Web App Pentest ๐Ÿ”— ๐Ÿ”ด This mind-map has the list of bugs and the corresponding tools and techniques used to find those bugs Ninad Mathpati
Mobile Security Mindmap ๐Ÿ”— ๐Ÿ”ด a comprehensive Mind-map which includes various techniques to test Mobile Application for security issues Aman Hardikar
Web Security Field Mindmap ๐Ÿ”— ๐Ÿ”ด๐Ÿ”ต This mindmap is an combination of Web Attacks, AppSec and Bug Bounty stuff jois
Security Consulting & Implementation ๐Ÿ”— ๐Ÿ”ต Security Consulting & Implementation mindmap Lawrence Pingree
Information Security Technologies & Markets ๐Ÿ”— ๐Ÿ”ด๐Ÿ”ต This Mindmap is an combination of Information Security Technologies & Markets ovens ffdf
Information Security Technologies & Markets ๐Ÿ”— ๐Ÿ”ด๐Ÿ”ต This mindmap contains different Information Security Technologies & Markets John Fortner
Nmap Scans Mindmap ๐Ÿ”— ๐Ÿ”ด๐Ÿ”ต This mindmap show how different type of scans can be performed via Nmap Scanner Only Hacker
Cross Site Request Frogery Mindmap ๐Ÿ”— ๐Ÿ”ด๐Ÿ”ต This mindmap show how different type of security tests can be performed while testing CSRF alexlauerman
Access Control Vulnerabilities ๐Ÿ”— ๐Ÿ”ด List of Techniques that can be use to test access control models of an Application Pratik Gaikwad
CISO MindMap 2021 ๐Ÿ”— ๐Ÿ”ต is the latest and updated CISO MindMap for 2021 with a number of updates and new recommendations for 2021-22 Rafeeq Rehman
Common Vulnerabilites on Forgot Password Functionality ๐Ÿ”— ๐Ÿ”ด List of Test cases that can be perform on an Forgot password functionalities within the web apps Harsh Bothra
Common XML Attacks ๐Ÿ”— ๐Ÿ”ด In this Mindmap Harsh Bothra Tired to list all the attacks that can be performed on an XML endpoints/services Harsh Bothra
Copy of Vulnerability Checklist for SAML ๐Ÿ”— ๐Ÿ”ด List of all the Vulnerability that can be tested on SAML Endpoints/Services Harsh Bothra
Exploting Grafana ๐Ÿ”— ๐Ÿ”ด Possible test cases to Exploit Publicly Avilable Grafa Instance Muhammad Daffa
FILE READ vulnerabilities ๐Ÿ”— ๐Ÿ”ด Practical strategies for exploiting FILE READ vulnerabilities Lukasz Mikuล‚a
The Cyber Guy - Recon ๐Ÿ”— ๐Ÿ”ด in this mindmap the CyberGuy shares his Recon Methodology theCyberGuy0
Penetration Testing Certifications ๐Ÿ”— ๐Ÿ”ด๐Ÿ”ต in this mindmap Tahar Tries to uncover the list of Certification in the field of Penetration testing MrTaharAmine
Linux Privilege Escalation ๐Ÿ”— ๐Ÿ”ด this mindmap shows several linux privilege escalation Techniques Source

Special Thanks to all the authors for publishing these mindmaps ๐Ÿฅณ๐Ÿฅณ๐Ÿฅณ