Web developer & security researcher.

EdOverflow has 3 patrons.


$ whoami
Ed is a web designer, developer, security researcher, and has experience triaging for numerous security programs. In his spare time he likes swimming, playing the guitar, photography, and cinematography.

🐦 Twitter: https://twitter.com/EdOverflow

🌐 Website: https://edoverflow.com

💻 GitHub: https://github.com/EdOverflow

😃 More about me: https://www.hackerone.com/blog/Hacker-QA-EdOverflow

          _,-.      --------------------
  ,-. ,--'  o  ) -(   Frogs find bugs!   )
  \(,' '   ,,-'     --------------------
 \(`--'    `\ 

Accounts Elsewhere

EdOverflow owns the following accounts on other platforms:


bugbountyguide 159 Updated 1 month ago

Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.

bugbounty-cheatsheet 1155 Updated 2 months ago

A list of interesting payloads, tips and tricks for bug bounty hunters.

megplus 179 Updated 2 months ago

Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]

contact.sh 134 Updated 5 months ago

An OSINT tool to find contacts in order to report security vulnerabilities.

security-template 15 Updated 5 months ago

A static website template for security pages.

bug-bounty-responses 32 Updated 10 months ago

A collection of response templates for invalid bug bounty reports.

security-policy-specification-standard 16 Updated 1 year ago

This document proposes a way of standardising the structure, language, and grammar used in security policies.

bounty-pls 3 Updated 1 year ago

A Chrome extension that spices up those #togetherwehitharder tweets.

proof-of-concepts 95 Updated 1 year ago

A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.

bounty-formula 5 Updated 1 year ago

A formula to calculate bounty amounts.

hackerone-security-policy 0 Updated 1 year ago

This is the security policy for https://hackerone.com/ed.

cryptojourney-content 9 Updated 1 year ago

Learn the basics of cryptography throughout history.

hunter 1 Updated 2 years ago

Guidelines for writing secure code for Python developers.