Skip to content

imran-parray/Mind-Maps

Folders and files

NameName
Last commit message
Last commit date

Latest commit

2e48761 Β· Jun 29, 2023

History

76 Commits
Jun 5, 2021
Jun 29, 2023
Sep 15, 2021
Aug 30, 2020
May 29, 2021
Aug 20, 2020
Sep 15, 2021
May 14, 2021
Sep 15, 2021
Sep 15, 2021
May 29, 2021
Sep 15, 2021
Nov 14, 2021
Nov 20, 2021
Aug 20, 2020
Jun 29, 2023
Aug 20, 2020
Dec 22, 2021
Jun 4, 2021
Jul 4, 2021
Jun 29, 2023
May 30, 2021
Aug 18, 2021
Dec 22, 2021
Jun 29, 2023
Aug 20, 2020
Nov 7, 2020
May 14, 2021
May 29, 2021
Aug 30, 2020
May 29, 2021
Aug 30, 2020
Aug 30, 2020
Aug 30, 2020
Dec 22, 2021
Jun 29, 2023
Jul 4, 2021
Dec 22, 2021

Repository files navigation

MindMaps πŸ—ΊοΈ

This repository stores and houses various Mindmaps for bug bounty HuntersπŸ§‘β€πŸ¦°, pentestersπŸ§‘β€πŸ¦° and offensive(πŸ”΄)/defensive(πŸ”΅) security ProfessionalsπŸ«‚ provided by me as well as contributed by the communityπŸ§‘πŸ»β€πŸ€β€πŸ§‘πŸ½. Your contributions and suggestions are welcomed.

Name Link Type Description Author
Bug Hunters Methodology πŸ”— πŸ”΄ This Mindmap explains how to test for bugs on Bug bounty programs Jhaddix
Fiding Server side issues πŸ”— πŸ”΄ This mind-map explains how to look for server side issues on your bug-bounty/pentest targets Imran parray
Javascript Recon πŸ”— πŸ”΄ How to perform recon on JavaScript files Imran parray
My Recon πŸ”— πŸ”΄ This mind-map explains how to look for various server side and client side bugs on Bug bounty programs Imran parray
Testing 2FA πŸ”— πŸ”΄ How to test 2FA for Bugs hackerscrolls
Testing 2FA [2] πŸ”— πŸ”΄ How to test 2FA for Bugs hackerscrolls
2FA Bypass Techniques πŸ”— πŸ”΄ 2FA Bypass Techniques Harsh Bothra
Android Attacker Vectors πŸ”— πŸ”΄ Detailed Mindmap on How to find and exploit Android bugs. hackerscrolls
Testing oAuth for Vulnerabilities πŸ”— πŸ”΄ How to test Oauth for Bugs hackerscrolls
Security Assesment Mindmap πŸ”— πŸ”΄ General security Assessment Mind-map Sopas
Red Teaming Mind Map from The Hacker Playbook 3 πŸ”— πŸ”΄ Mind-map containing several techniques and approaches used by Red team members Marcon Lencini
SSRF MindMap πŸ”— πŸ”΄ How to test SSRF for Bugs hackerscrolls
Code Review Mindmap πŸ”— πŸ”΄πŸ”΅ Mindmap containing several techniques and approaches that can be used during code reviews. www.amanhardikar.com
Android Application Penetration Testing Mindmap πŸ”— πŸ”΄ A simple mind-map which explains various test cases around Android Application Penetration Testing Harsh Bothra
Cookie Based Authentication Vulnerabilities πŸ”— πŸ”΄ a comprehensive Mind-map which includes various techniques to test Cookie based authentication mechanism. Harsh Bothra
Tesing JIRA for CVE's πŸ”— πŸ”΄ Detailed Mind-map on How to find and exploit JIRA CVE's. Harsh Bothra
Scope Based Testing πŸ”— πŸ”΄ This Mind-map explains how to test for bugs based on the scope of your target. Harsh Bothra
OAuth 2.0 Threat Model Pentesting Checklist πŸ”— πŸ”΄ The following checklist represents a simplified visual alternative to IETF OAuth 2.0 Security Best Current Practice publication combined with various other public resources we found usefull. Binary Brotherhood
Bug Bounty Platforms πŸ”— πŸ”΄ list of bug bounty platform available fujie gu
Web App Pentest πŸ”— πŸ”΄ Web application Pentest Mindmap Ding Jayway
Web App Pentest πŸ”— πŸ”΄ This mind-map has the list of bugs and the corresponding tools and techniques used to find those bugs Ninad Mathpati
Mobile Security Mindmap πŸ”— πŸ”΄ a comprehensive Mind-map which includes various techniques to test Mobile Application for security issues Aman Hardikar
Web Security Field Mindmap πŸ”— πŸ”΄πŸ”΅ This mindmap is an combination of Web Attacks, AppSec and Bug Bounty stuff jois
Security Consulting & Implementation πŸ”— πŸ”΅ Security Consulting & Implementation mindmap Lawrence Pingree
Information Security Technologies & Markets πŸ”— πŸ”΄πŸ”΅ This Mindmap is an combination of Information Security Technologies & Markets ovens ffdf
Information Security Technologies & Markets πŸ”— πŸ”΄πŸ”΅ This mindmap contains different Information Security Technologies & Markets John Fortner
Nmap Scans Mindmap πŸ”— πŸ”΄πŸ”΅ This mindmap show how different type of scans can be performed via Nmap Scanner Only Hacker
Cross Site Request Frogery Mindmap πŸ”— πŸ”΄πŸ”΅ This mindmap show how different type of security tests can be performed while testing CSRF alexlauerman
Access Control Vulnerabilities πŸ”— πŸ”΄ List of Techniques that can be use to test access control models of an Application Pratik Gaikwad
CISO MindMap 2021 πŸ”— πŸ”΅ is the latest and updated CISO MindMap for 2021 with a number of updates and new recommendations for 2021-22 Rafeeq Rehman
Common Vulnerabilites on Forgot Password Functionality πŸ”— πŸ”΄ List of Test cases that can be perform on an Forgot password functionalities within the web apps Harsh Bothra
Common XML Attacks πŸ”— πŸ”΄ In this Mindmap Harsh Bothra Tired to list all the attacks that can be performed on an XML endpoints/services Harsh Bothra
Copy of Vulnerability Checklist for SAML πŸ”— πŸ”΄ List of all the Vulnerability that can be tested on SAML Endpoints/Services Harsh Bothra
Exploting Grafana πŸ”— πŸ”΄ Possible test cases to Exploit Publicly Avilable Grafa Instance Muhammad Daffa
FILE READ vulnerabilities πŸ”— πŸ”΄ Practical strategies for exploiting FILE READ vulnerabilities Lukasz MikuΕ‚a
The Cyber Guy - Recon πŸ”— πŸ”΄ in this mindmap the CyberGuy shares his Recon Methodology theCyberGuy0
Penetration Testing Certifications πŸ”— πŸ”΄πŸ”΅ in this mindmap Tahar Tries to uncover the list of Certification in the field of Penetration testing MrTaharAmine
Linux Privilege Escalation πŸ”— πŸ”΄ this mindmap shows several linux privilege escalation Techniques Source

Special Thanks to all the authors for publishing these mindmaps πŸ₯³πŸ₯³πŸ₯³