• Stars
    star
    868
  • Rank 52,564 (Top 2 %)
  • Language
    Shell
  • Created almost 4 years ago
  • Updated almost 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

This script grab public report from hacker one and make some folders with poc videos

AllPocsFromHackerOne

Contact me on

Twitter Telegram

This script grabs public report from hacker one and download all JSON files to be grepable

The main goal is make easy categorize vulns by technique

Would you have a suggestion?

Please open it on issues tab =)

I would love hear from you.

TOP 20 Weakness from HackerOne disclosed Reports

From 9k disclosed reports

   1019 Information Disclosure
    915 Cross-site Scripting (XSS) - Generic
    723 Violation of Secure Design Principles
    610 Improper Authentication - Generic
    416 Cross-Site Request Forgery (CSRF)
    415 Cross-site Scripting (XSS) - Stored
    357 Denial of Service
    324 Cross-site Scripting (XSS) - Reflected
    320 Privilege Escalation
    314 Memory Corruption - Generic
    293 Improper Access Control - Generic
    261 Open Redirect
    226 Code Injection
    198 Business Logic Errors
    197 SQL Injection
    186 Command Injection - Generic
    169 Insecure Direct Object Reference (IDOR)
    165 Server-Side Request Forgery (SSRF)
    165 Cryptographic Issues - Generic
    130 Path Traversal

All Categorized Vulns

Allocation of Resources Without Limits or Throttling

Array Index Underflow

Authentication Bypass Using an Alternate Path or Channel

Brute Force

Buffer Over-read

Buffer Underflow

Buffer Under-read

Business Logic Errors

Classic Buffer Overflow

Cleartext Storage of Sensitive Information

Cleartext Transmission of Sensitive Information

Client-Side Enforcement of Server-Side Security

Code Injection

Command Injection - Generic

CRLF Injection

Cross-Site Request Forgery (CSRF)

Cross-site Scripting (XSS) - DOM

Cross-site Scripting (XSS) - Generic

Cross-site Scripting (XSS) - Reflected

Cross-site Scripting (XSS) - Stored

Cryptographic Issues - Generic

Denial of Service

Deserialization of Untrusted Data

Double Free

Embedded Malicious Code

Execution with Unnecessary Privileges

Exposed Dangerous Method or Function

Externally Controlled Reference to a Resource in Another Sphere

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)

File and Directory Information Exposure

Forced Browsing

Heap Overflow

HTTP Request Smuggling

HTTP Response Splitting

Improper Access Control - Generic

Improper Authentication - Generic

Improper Authorization

Improper Certificate Validation

Improper Check or Handling of Exceptional Conditions

Improper Export of Android Application Components

Improper Handling of Insufficient Permissions or Privileges

Improper Handling of URL Encoding (Hex Encoding)

Improper Input Validation

Improper Neutralization of Escape, Meta, or Control Sequences

Improper Neutralization of HTTP Headers for Scripting Syntax

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Improper Null Termination

Improper Privilege Management

Inadequate Encryption Strength

Incorrect Authorization

Incorrect Calculation of Buffer Size

Information Disclosure

Information Exposure Through an Error Message

Information Exposure Through Debug Information

Information Exposure Through Directory Listing

Information Exposure Through Sent Data

Insecure Direct Object Reference (IDOR)

Insecure Storage of Sensitive Information

Insecure Temporary File

Insufficiently Protected Credentials

Insufficient Session Expiration

Integer Overflow

Integer Underflow

Key Exchange without Entity Authentication

LDAP Injection

Malware

Man-in-the-Middle

Memory Corruption - Generic

Misconfiguration

Missing Authentication for Critical Function

Missing Authorization

Missing Encryption of Sensitive Data

Missing Required Cryptographic Step

Modification of Assumed-Immutable Data (MAID)

NULL Pointer Dereference

Off-by-one Error

Open Redirect

OS Command Injection

Out-of-bounds Read

Password in Configuration File

Path Traversal

Phishing

Plaintext Storage of a Password

Privacy Violation

Privilege Escalation

Reliance on Cookies without Validation and Integrity Checking in a Security Decision

Reliance on Reverse DNS Resolution for a Security-Critical Action

Reliance on Untrusted Inputs in a Security Decision

Remote File Inclusion

Resource Injection

Reusing a Nonce, Key Pair in Encryption

Security Through Obscurity

Server-Side Request Forgery (SSRF)

Session Fixation

SQL Injection

Stack Overflow

Time-of-check Time-of-use (TOCTOU) Race Condition

Type Confusion

UI Redressing (Clickjacking)

Unprotected Transport of Credentials

Unrestricted Upload of File with Dangerous Type

Unverified Password Change

Use After Free

Use of a Broken or Risky Cryptographic Algorithm

Use of a Key Past its Expiration Date

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

Use of Externally-Controlled Format String

Use of Hard-coded Credentials

Use of Hard-coded Cryptographic Key

Use of Hard-coded Password

Use of Inherently Dangerous Function

User Interface (UI) Misrepresentation of Critical Information

Violation of Secure Design Principles

Weak Cryptography for Passwords

Weak Password Recovery Mechanism for Forgotten Password

Write-what-where Condition

XML Entity Expansion

XML External Entities (XXE)

XML Injection

Requirements

Gron

go get -u github.com/tomnomnom/gron

JQ

apt install jq

Tree

Weakness

All weakness categorized

jsonReports

All json files from disclosed reports from hackerone. Already downloaded.

reportLinksHackerOne file

All ids from hackerOne disclosed reports

Utils Folder

searchIntoJson.sh (gron required)

Script helping you finding keys and values into JSON

buildRepo.sh

Do your own jsonReports folder, downloading all disclosed reports from hackerone

More Repositories

1

ReconNotes

Just some public notes that can be useful and i want let the world knows.
78
star
2

BashitRecon

A collection of famous recon public scripts, but in bash <3
Shell
26
star
3

zeroapk

Shell
19
star
4

AEMusefulKnowledges

7
star
5

CVE-2022-34305

5
star
6

spiderKing

Shell
5
star
7

reclame_aqui_scrapper

.
Python
4
star
8

VirtualAndroidToBugHunt

Just steps that you have to follow in order to be able to do bughunt in app enviroment
4
star
9

google_free_proxy

A simple script to GET pages through 6 Google Servers without any authentication
Python
4
star
10

eternalnoobchallenges

This repository contains some challenges made to the understanding of how exploit some scenarios where there are security vulnerabilities and help to think about how to mitigate them =)
PHP
4
star
11

mssql_danger_functionalities_and_misconfigurations

3
star
12

navgix

navgix is a multi-threaded golang tool that will check for nginx alias traversal vulnerabilities
Go
3
star
13

im_blockchain_begginer

3
star
14

DNS-exfiltration-using-blind-xss-

These payloads will help u in your blind xss dumping cookies through dns exfiltration using subdomain dns queries
2
star
15

titaniumDigger

Python
2
star
16

jdam

1
star
17

TwitterToTelegram

A GoHorse Bash Tool to extract last tweet from monitored users and send the response into a telegram channel, but without any authentication twitter proccess (Oauth or build an app), just using Pub data.
Shell
1
star
18

CVE-2021-09-03

Just testing if some bot will do some action here LOL
1
star
19

Drupal4Dummies

Python
1
star
20

FlaskRedis

enhancing my skill assets with python
HTML
1
star
21

test_github_action

1
star