EdOverflow

Web developer & security researcher.

EdOverflow has 24 patrons.

Statement

$ whoami
Ed is a web designer, developer, security researcher, and has experience triaging for numerous security programs. In his spare time he likes swimming, playing the guitar, photography, and cinematography.

🐦 Twitter: https://twitter.com/EdOverflow

🌐 Website: https://edoverflow.com

💻 GitHub: https://github.com/EdOverflow

😃 More about me: https://www.hackerone.com/blog/Hacker-QA-EdOverflow


          _,-.      --------------------
  ,-. ,--'  o  ) -(   Frogs find bugs!   )
  \(,' '   ,,-'     --------------------
 ,-.\-.__,\\_
 \(`--'    `\ 

Accounts Elsewhere

EdOverflow owns the following accounts on other platforms:

Repositories

bugbountyguide    89   Updated 2 weeks ago

Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.

megplus    55   Updated 2 weeks ago

Automated reconnaissance wrapper — TomNomNom's meg on steroids.

bugbounty-cheatsheet    559   Updated 3 weeks ago

A list of interesting payloads, tips and tricks for bug bounty hunters.

security-policy-specification-standard    9   Updated 1 month ago

This document proposes a way of standardising the structure, language, and grammar used in security policies.

security-template    12   Updated 1 month ago

A static website template for security pages.

bounty-pls    3   Updated 1 month ago

A Chrome extension that spices up those #togetherwehitharder tweets.

contact.sh    64   Updated 1 month ago

An OSINT tool to find contacts in order to report security vulnerabilities.

proof-of-concepts    47   Updated 1 month ago

A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.

bountify.sh    6   Updated 2 months ago

A little spell-checker and language enhancement tool I use for my security reports.

bug-bounty-responses    20   Updated 2 months ago

A collection of response templates for invalid bug bounty reports.

bounty-formula    4   Updated 3 months ago

A formula to calculate bounty amounts.

hackerone-security-policy    0   Updated 3 months ago

This is the security policy for https://hackerone.com/ed.

cryptojourney-content    8   Updated 3 months ago

Learn the basics of cryptography throughout history.

hunter    1   Updated 10 months ago

Guidelines for writing secure code for Python developers.

Teams