Web developer & security researcher.
$ whoami Ed is a web designer, developer, security researcher, and has experience triaging for numerous security programs. In his spare time he likes swimming, playing the guitar, photography, and cinematography.
🐦 Twitter: https://twitter.com/EdOverflow
🌐 Website: https://edoverflow.com
💻 GitHub: https://github.com/EdOverflow
😃 More about me: https://www.hackerone.com/blog/Hacker-QA-EdOverflow
_,-. -------------------- ,-. ,--' o ) -( Frogs find bugs! ) \(,' ' ,,-' -------------------- ,-.\-.__,\\_ \(`--' `\
EdOverflow owns the following accounts on other platforms:
bugbountyguide 89 Updated 2 weeks ago
Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.
megplus 55 Updated 2 weeks ago
Automated reconnaissance wrapper — TomNomNom's meg on steroids.
bugbounty-cheatsheet 559 Updated 3 weeks ago
A list of interesting payloads, tips and tricks for bug bounty hunters.
security-policy-specification-standard 9 Updated 4 weeks ago
This document proposes a way of standardising the structure, language, and grammar used in security policies.
security-template 12 Updated 1 month ago
A static website template for security pages.
bounty-pls 3 Updated 1 month ago
A Chrome extension that spices up those #togetherwehitharder tweets.
contact.sh 64 Updated 1 month ago
An OSINT tool to find contacts in order to report security vulnerabilities.
proof-of-concepts 47 Updated 1 month ago
A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
bountify.sh 6 Updated 2 months ago
A little spell-checker and language enhancement tool I use for my security reports.
bug-bounty-responses 20 Updated 2 months ago
A collection of response templates for invalid bug bounty reports.
bounty-formula 4 Updated 3 months ago
A formula to calculate bounty amounts.
hackerone-security-policy 0 Updated 3 months ago
This is the security policy for https://hackerone.com/ed.
cryptojourney-content 8 Updated 3 months ago
Learn the basics of cryptography throughout history.
hunter 1 Updated 10 months ago
Guidelines for writing secure code for Python developers.