Skip to content
Avatar
🏠
Working from home
🏠
Working from home

Achievements

Achievements

Organizations

@BugBountyResources
Block or Report

Block or report payloadartist

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Pinned

  1. A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.

    Python 55 10

  2. NodeJS script to extract assets for the Apple bug bounty program from their security acknowledgments page for bug bounty recon.

    JavaScript 58 5

  3. A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.

    63 17

  4. 1
    # ------Instructions---------
    2
    # Install (and configure) subfinder, assetfinder, and httprobe
    3
    # go get -v github.com/projectdiscovery/subfinder/cmd/subfinder && go get -v github.com/tomnomnom/httprobe && go get -v github.com/tomnomnom/assetfinder
    4
    # cat firefox.sh >> ~/.bashrc 
    5
    # source ~/.bashrc 

63 contributions in the last year

May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Mon Wed Fri

Contribution activity

April - May 2021

payloadartist has no activity yet for this period.

March 2021

Created 2 repositories

Created an issue in r3curs1v3-pr0xy/vajra that received 2 comments

Vulnerability: Authentication Bypass?

Hi, I was trying out Vajra. In index.js, seems like you are using a static jwt secret to generate the auth cookie, which isn't rotated: vajra/in…

2 comments

Seeing something unexpected? Take a look at the GitHub profile guide.