Skip to content

Commit dc349c1

Browse files
committed
Update _template_vuln page
1 parent d6ce9cd commit dc349c1

File tree

5 files changed

+46
-78
lines changed

5 files changed

+46
-78
lines changed

CONTRIBUTING.md

Lines changed: 16 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,30 @@
11
# CONTRIBUTING
22

3-
PayloadsAllTheThings' Team :heart: pull requests :)
3+
PayloadsAllTheThings' Team :heart: pull requests.
4+
45
Feel free to improve with your payloads and techniques !
56

6-
You can also contribute with a :beers: IRL, or using the sponsor button.
7+
You can also contribute with a :beers: IRL, or using the [sponsor](https://github.com/sponsors/swisskyrepo) button.
78

89
## Pull Requests Guidelines
910

1011
In order to provide the safest payloads for the community, the following rules must be followed for **every** Pull Request.
1112

1213
- Payloads must be sanitized
13-
- Use `id`, and `whoami`, for RCE Proof of Concepts
14-
- Use `[REDACTED]` when the user has to replace a domain for a callback. E.g: XSSHunter, BurpCollaborator etc.
15-
- Use `10.10.10.10` and `10.10.10.11` when the payload require IP addresses
16-
- Use `Administrator` for privileged users and `User` for normal account
17-
- Use `P@ssw0rd`, `Password123`, `password` as default passwords for your examples
18-
- Prefer commonly used name for machines such as `DC01`, `EXCHANGE01`, `WORKSTATION01`, etc
14+
- Use `id`, and `whoami`, for RCE Proof of Concepts
15+
- Use `[REDACTED]` when the user has to replace a domain for a callback. E.g: XSSHunter, BurpCollaborator etc.
16+
- Use `10.10.10.10` and `10.10.10.11` when the payload require IP addresses
17+
- Use `Administrator` for privileged users and `User` for normal account
18+
- Use `P@ssw0rd`, `Password123`, `password` as default passwords for your examples
19+
- Prefer commonly used name for machines such as `DC01`, `EXCHANGE01`, `WORKSTATION01`, etc
1920
- References must have an `author`, a `title` and a `link`. The `date` is not mandatory but appreciated :)
2021

22+
Every pull request will be checked with `markdownlint` to ensure consistent writing and Markdown best practices. You can validate your files locally using the following Docker command:
23+
24+
```ps1
25+
docker run -v $PWD:/workdir davidanson/markdownlint-cli2:v0.15.0 "**/*.md" --config .github/.markdownlint.json --fix
26+
```
27+
2128
## Techniques Folder
2229

2330
Every section should contains the following files, you can use the `_template_vuln` folder to create a new technique folder:
@@ -29,35 +36,4 @@ Every section should contains the following files, you can use the `_template_vu
2936

3037
## README.md format
3138

32-
Use the following example to create a new technique `README.md` file.
33-
34-
```markdown
35-
# Vulnerability Title
36-
37-
> Vulnerability description
38-
39-
## Summary
40-
41-
* [Tools](#tools)
42-
* [Something](#something)
43-
* [Subentry 1](#sub1)
44-
* [Subentry 2](#sub2)
45-
* [References](#references)
46-
47-
## Tools
48-
49-
- [Tool 1](https://example.com)
50-
- [Tool 2](https://example.com)
51-
52-
## Something
53-
54-
Quick explanation
55-
56-
### Subentry 1
57-
58-
Something about the subentry 1
59-
60-
## References
61-
62-
- [Blog title - Author, Date](https://example.com)
63-
```
39+
Use the example folder [_template_vuln/](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/_template_vuln/). The main page is [README.md](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/_template_vuln/README.md).

_LEARNING_AND_SOCIALS/BOOKS.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,4 @@
5050
- [The Web Application Hackers Handbook by D. Stuttard, M. Pinto (2011)](http://www.wiley.com/WileyCDA/WileyTitle/productCd-1118026470.html)
5151
- [Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers by T.J. O'Connor (2012)](https://www.goodreads.com/book/show/16192263-violent-python)
5252
- [Web Hacking 101](https://leanpub.com/web-hacking-101)
53-
- [Windows Security Internals with PowerShell by James Forshaw (2024)](https://nostarch.com/windows-security-internals-powershell)
53+
- [Windows Security Internals with PowerShell by James Forshaw (2024)](https://nostarch.com/windows-security-internals-powershell)

_LEARNING_AND_SOCIALS/TWITTER.md

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,32 @@
1-
# Twitter
1+
# Twitter
22

3-
Twitter is very common in the InfoSec area. Many advices and tips on bug hunting or CTF games are posted every day. It is worth following the feeds of some successful security researchers and hackers.
3+
Twitter is very common in the InfoSec area. Many advices and tips on bug hunting or CTF games are posted every day. It is worth following the feeds of some successful security researchers and hackers.
44

5+
## Accounts
56

6-
### Accounts
7-
8-
- [@Stök - Bug bounty hunter, cybersecurity educational content creator](https://twitter.com/stokfredrik)
9-
- [@NahamSec - Hacker & content creator & co-founder bugbountyforum and http://recon.dev](https://twitter.com/NahamSec)
7+
- [@0xReconless - Security research, blogs, and videos by filedescriptor, ngalongc & EdOverflow](https://twitter.com/0xReconless)
8+
- [@bugcrowd - Another american bug bounty platform](https://twitter.com/Bugcrowd)
9+
- [@codingo_ - Global Head of Security Ops and Researcher Enablement bugcrowd, Maintainer of some great pentesting tools like NoSQLMap or VHostScan](https://twitter.com/codingo_)
10+
- [@d0nutptr - part-time bug hunter, Lead Security Engineer at graplsec](https://twitter.com/d0nutptr)
1011
- [@dawgyg - Bug bounty hunter, reformed blackhat, Synack red team member](https://twitter.com/thedawgyg)
11-
- [@putsi - Bug bounty hunter and white hat hacker in Team ROT](https://twitter.com/putsi)
12-
- [@thecybermentor - Offers cybersecurity and hacking courses](https://twitter.com/thecybermentor)
13-
- [@InsiderPhD - PhD student, occasional bug bounty hunter & educational cyber security youtuber](https://twitter.com/InsiderPhD)
14-
- [@LiveOverflow - Content creator and hacker producing videos on various IT security topics and participating in hacking contests](https://twitter.com/LiveOverflow)
1512
- [@EdOverflow - Web developer, security researcher and triager for numerous vulnerability disclosure programs](https://twitter.com/edoverflow)
16-
- [@r0bre - Bug Hunter for web- and systemsecurity, iOS Security researcher](https://twitter.com/r0bre)
17-
- [@intigriti - European ethical hacking & bug bounty platform](https://twitter.com/intigriti)
13+
- [@filedescriptor - security researcher, bug hunter and content creator at 0xReconless](https://twitter.com/filedescriptor)
14+
- [@GentilKiwi - Author of Mimikatz & Kekeo](https://twitter.com/gentilkiwi)
1815
- [@Hacker0x01 - American bug bounty platform](https://twitter.com/Hacker0x01)
19-
- [@bugcrowd - Another american bug bounty platform](https://twitter.com/Bugcrowd)
2016
- [@hakluke - Bug bounty hunter, content creator, creator of some great pentesting tools like hakrawler](https://twitter.com/hakluke)
21-
- [@spaceraccoon - Security researcher and white hat hacker. Has worked on several bug bounty programs](https://twitter.com/spaceraccoonsec)
22-
- [@samwcyo - Full time bug bounty hunter](https://twitter.com/samwcyo)
23-
- [@Th3G3nt3lman - Security Research & Bug bounty hunter](https://twitter.com/Th3G3nt3lman)
24-
- [@securinti - Dutch bug bounty hunter & head of hackers and bord member @ intigriti](https://twitter.com/securinti)
17+
- [@InsiderPhD - PhD student, occasional bug bounty hunter & educational cyber security youtuber](https://twitter.com/InsiderPhD)
18+
- [@intigriti - European ethical hacking & bug bounty platform](https://twitter.com/intigriti)
2519
- [@jobertabma - Co-founder of HackerOne, security researcher](https://twitter.com/jobertabma)
26-
- [@codingo_ - Global Head of Security Ops and Researcher Enablement bugcrowd, Maintainer of some great pentesting tools like NoSQLMap or VHostScan](https://twitter.com/codingo_)
27-
- [@TomNomNom - security researcher, maintainer of many very useful pentesting tools](https://twitter.com/TomNomNom)
20+
- [@LiveOverflow - Content creator and hacker producing videos on various IT security topics and participating in hacking contests](https://twitter.com/LiveOverflow)
21+
- [@NahamSec - Hacker & content creator & co-founder bugbountyforum and http://recon.dev](https://twitter.com/NahamSec)
2822
- [@orange_8361 - bug bounty hunter and security researcher, specialized on RCE bugs](https://twitter.com/orange_8361)
29-
- [@d0nutptr - part-time bug hunter, Lead Security Engineer at graplsec](https://twitter.com/d0nutptr)
30-
- [@filedescriptor - security researcher, bug hunter and content creator at 0xReconless](https://twitter.com/filedescriptor)
31-
- [@0xReconless - Security research, blogs, and videos by filedescriptor, ngalongc & EdOverflow](https://twitter.com/0xReconless)
3223
- [@pentest_swissky - Author of PayloadsAllTheThings & SSRFmap](https://twitter.com/pentest_swissky)
33-
- [@GentilKiwi - Author of Mimikatz & Kekeo](https://twitter.com/gentilkiwi)
24+
- [@putsi - Bug bounty hunter and white hat hacker in Team ROT](https://twitter.com/putsi)
25+
- [@r0bre - Bug Hunter for web- and systemsecurity, iOS Security researcher](https://twitter.com/r0bre)
26+
- [@samwcyo - Full time bug bounty hunter](https://twitter.com/samwcyo)
27+
- [@securinti - Dutch bug bounty hunter & head of hackers and bord member @ intigriti](https://twitter.com/securinti)
28+
- [@spaceraccoon - Security researcher and white hat hacker. Has worked on several bug bounty programs](https://twitter.com/spaceraccoonsec)
29+
- [@Stök - Bug bounty hunter, cybersecurity educational content creator](https://twitter.com/stokfredrik)
30+
- [@Th3G3nt3lman - Security Research & Bug bounty hunter](https://twitter.com/Th3G3nt3lman)
31+
- [@thecybermentor - Offers cybersecurity and hacking courses](https://twitter.com/thecybermentor)
32+
- [@TomNomNom - security researcher, maintainer of many very useful pentesting tools](https://twitter.com/TomNomNom)

_LEARNING_AND_SOCIALS/YOUTUBE.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,6 @@
2727
- [EP004: Bug Hunters | HACKING GOOGLE](https://youtu.be/IoXiXlCNoXg)
2828
- [EP005: Project Zero | HACKING GOOGLE](https://youtu.be/My_13FXODdU)
2929

30-
3130
## Conferences
3231

3332
- [Hunting for Top Bounties - Nicolas Grégoire](https://www.youtube.com/watch?v=mQjTgDuLsp4)
@@ -37,4 +36,4 @@
3736
- [Defcon Conference](https://www.youtube.com/user/DEFCONConference/videos)
3837
- [x33fcon Conference](https://www.youtube.com/c/x33fcon)
3938
- [Hack In Paris](https://www.youtube.com/user/hackinparis)
40-
- [LeHack / HZV](https://www.youtube.com/user/hzvprod)
39+
- [LeHack / HZV](https://www.youtube.com/user/hzvprod)

_template_vuln/README.md

Lines changed: 6 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,10 @@
1111
* [Labs](#labs)
1212
* [References](#references)
1313

14-
1514
## Tools
1615

17-
- [username/tool1](https://github.com/username/tool1) - Description of the tool
18-
- [username/tool2](https://github.com/username/tool2) - Description of the tool
19-
16+
* [username/tool1](https://github.com/username/tool1) - Description of the tool
17+
* [username/tool2](https://github.com/username/tool2) - Description of the tool
2018

2119
## Methodology
2220

@@ -28,18 +26,14 @@ Exploit
2826

2927
### Subentry 1
3028

31-
3229
### Subentry 2
3330

34-
3531
## Labs
3632

37-
- [Company - Lab 1](#link-to-the-lab)
38-
- [Company - Lab 2](#link-to-the-lab)
39-
- [Company - Challenge 1](#link-to-the-challenge)
40-
- [Company - Challenge 2](#link-to-the-challenge)
41-
33+
* [Root Me - Lab 1](https://root-me.org)
34+
* [PortSwigger - Lab 2](https://portswigger.net)
35+
* [HackTheBox - Lab 3](https://www.hackthebox.com)
4236

4337
## References
4438

45-
- [Blog title - Author (@handle) - Month XX, 202X](https://example.com)
39+
* [Blog title - Author (@handle) - Month XX, 202X](https://example.com)

0 commit comments

Comments
 (0)