Skip to content

The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform

License

Notifications You must be signed in to change notification settings

elamaran619/hackerone_wordlist

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation


hackerone_logo
HackerOne Wordlist

The wordlists that have been compiled using disclosed reports at the HackerOne bug bounty platform.

Match Cases

Here is the match cases how it extracts all these data.

URLs

I've used urlextract library for extracting URLs based on TLDs. Eventhough it works awesome, there might be false matches rarely.

Raw HTTP Requests

It extracts the raw http requests which is in three backticks (```). Her are the example:

Hey team! I've found an SQL Injection issue with your website.

## Request
```
POST /xyele/hackerone_wordlist HTTP/1.1
Host: github.com

star_repo=true'
```

So it extracts the request and parsing it.

POST /xyele/hackerone_wordlist HTTP/1.1
Host: github.com

star_repo=true'

Parameter names

Besides the getting parameters from requests and URLs, it gets parameter names with regex again. Here are the examples:

LFI throught the filename parameter                 --> filename
SQL Injection on blabla domain via userid parameter --> userid
<?php echo $_GET['makesense']; ?>                   --> makesense

To Do

  • Develop own URL extracting library
  • Extract json and parse parameters from markdown code block.
  • Extract json and parse parameters from raw http response.

Known Issues

  • It downloads reports each by each but nothing to do for getting it faster because HackerOne has rate-limit.

Support Me

Reach out to me at one of the following places!

About

The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages