Bug Hunter Handbook
search
Ctrlk
  • Introduction
  • Getting Started in InfoSec and Bug Bounties.
  • Presentations
  • Checklists / Guides
  • Useful Twitter Threads
  • List of Vulnerabilitieschevron-right
  • Approach
  • API Security
  • Mobile Security
  • Fuzzing / Wordlists
  • BugBounty Short Write-ups
  • Burp Suite Tips and Tricks
  • HackerOne Reports
  • Response Manipulation
  • Client Vs Server Side Vulnerabilities
  • DevSecOps
  • Containerschevron-right
  • AWS
  • Azure
  • Otherschevron-right
  • Chaining of Bugs
  • Bug Bounty Automation
  • Mindmaps
  • Oneliner Collections
  • Red Teaming
  • Blue Teamining
  • Recon One Liners
  • Misc
  • Wordpress
  • Fuzzing / FuFF
  • OWASP ZAP
  • Bug List
  • Setting up burp collaborator
  • Admin Panel PwN
  • Credential Stuffing / Dump / HaveibeenPwned?
  • Tools Required
  • Nuclei Template
  • Other BugBounty Repos / Tips
  • Interview
  • Threat Modelling
  • AppSec
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Threat Modelling

  • https://owasp.org/www-community/Application_Threat_Modelingarrow-up-right

  • https://github.com/hysnsec/awesome-threat-modellingarrow-up-right

  • https://twitter.com/shehackspurple/status/1281651816237690881arrow-up-right

  • https://twitter.com/ZephrFish/status/1272634494235926530arrow-up-right

  • https://martinfowler.com/articles/agile-threat-modelling.html#GrowYourPractisearrow-up-right

  • https://medium.com/sagefuturemakers/real-world-threat-modelling-fb14ef767c49arrow-up-right

  • https://dev.to/azure/pushing-left-like-a-boss-part-6-threat-modelling-1j5garrow-up-right

  • https://www.youtube.com/watch?v=0t0kD68U7rcarrow-up-right

  • https://twitter.com/sharathkramadas/status/1053069538885922817arrow-up-right

  • https://twitter.com/orchestronIOarrow-up-right

  • https://www.youtube.com/c/kpcercarrow-up-right

  • https://dev.to/shehackspurple/ama-where-can-we-learn-threat-modelling-30cgarrow-up-right

Good Link - https://docs.google.com/document/d/10KxP5yuDmem53KhV7UBBCRXviZfH1iQS7nr3NSL3OFg/edit#arrow-up-right

  • https://github.com/izar/pytmarrow-up-right

  • https://github.com/secmerc/materialize-threatsarrow-up-right

  • https://github.blog/2020-09-02-how-we-threat-model/arrow-up-right

PreviousInterviewchevron-leftNextAppSecchevron-right

Last updated 1 year ago