Web developer & security researcher.

EdOverflow has 1 patron.


$ whoami
Ed is a web designer, developer, security researcher, and has experience triaging for numerous security programs. In his spare time he likes swimming, playing the guitar, photography, and cinematography.

🐦 Twitter: https://twitter.com/EdOverflow

🌐 Website: https://edoverflow.com

💻 GitHub: https://github.com/EdOverflow

😃 More about me: https://www.hackerone.com/blog/Hacker-QA-EdOverflow

          _,-.      --------------------
  ,-. ,--'  o  ) -(   Frogs find bugs!   )
  \(,' '   ,,-'     --------------------
 \(`--'    `\ 

Accounts Elsewhere

EdOverflow owns the following accounts on other platforms:


bugbounty-cheatsheet 988 Updated 1 week ago

A list of interesting payloads, tips and tricks for bug bounty hunters.

contact.sh 125 Updated 1 month ago

An OSINT tool to find contacts in order to report security vulnerabilities.

megplus 172 Updated 2 months ago

Automated reconnaissance wrapper — TomNomNom's meg on steroids.

security-template 13 Updated 2 months ago

A static website template for security pages.

bugbountyguide 140 Updated 4 months ago

Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.

bug-bounty-responses 30 Updated 6 months ago

A collection of response templates for invalid bug bounty reports.

security-policy-specification-standard 15 Updated 7 months ago

This document proposes a way of standardising the structure, language, and grammar used in security policies.

bounty-pls 3 Updated 7 months ago

A Chrome extension that spices up those #togetherwehitharder tweets.

proof-of-concepts 77 Updated 7 months ago

A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.

bounty-formula 5 Updated 9 months ago

A formula to calculate bounty amounts.

hackerone-security-policy 0 Updated 9 months ago

This is the security policy for https://hackerone.com/ed.

cryptojourney-content 9 Updated 9 months ago

Learn the basics of cryptography throughout history.

hunter 0 Updated 1 year ago

Guidelines for writing secure code for Python developers.