SkillAgentSearch skills...

AllVideoPocsFromHackerOne

This script grab public report from hacker one and make some folders with poc videos

Install / Use

/learn @zeroc00I/AllVideoPocsFromHackerOne
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

AllPocsFromHackerOne

Note

Please, consider buying me a coffee!

Want to keep up with the latest in bug bounty, cybersecurity, and my ongoing studies? Feel free to join my Telegram channel (It's in Portuguese, but packed with English content!).

https://t.me/zeroc00i_news => Telegram

Twitter Telegram

Description

This script grabs public report from hacker one and download all JSON files to be grepable

The main goal is make easy categorize vulns by technique

Would you have a suggestion?

Please open it on issues tab =)

I would love hear from you.

TOP 20 Weakness from HackerOne disclosed Reports

From 9k disclosed reports

   1019 Information Disclosure
    915 Cross-site Scripting (XSS) - Generic
    723 Violation of Secure Design Principles
    610 Improper Authentication - Generic
    416 Cross-Site Request Forgery (CSRF)
    415 Cross-site Scripting (XSS) - Stored
    357 Denial of Service
    324 Cross-site Scripting (XSS) - Reflected
    320 Privilege Escalation
    314 Memory Corruption - Generic
    293 Improper Access Control - Generic
    261 Open Redirect
    226 Code Injection
    198 Business Logic Errors
    197 SQL Injection
    186 Command Injection - Generic
    169 Insecure Direct Object Reference (IDOR)
    165 Server-Side Request Forgery (SSRF)
    165 Cryptographic Issues - Generic
    130 Path Traversal

All Categorized Vulns

Allocation of Resources Without Limits or Throttling

Array Index Underflow

Authentication Bypass Using an Alternate Path or Channel

Brute Force

Buffer Over-read

Buffer Underflow

Buffer Under-read

Business Logic Errors

Classic Buffer Overflow

Cleartext Storage of Sensitive Information

Cleartext Transmission of Sensitive Information

Client-Side Enforcement of Server-Side Security

Code Injection

Command Injection - Generic

CRLF Injection

Cross-Site Request Forgery (CSRF)

Cross-site Scripting (XSS) - DOM

Cross-site Scripting (XSS) - Generic

Cross-site Scripting (XSS) - Reflected

Cross-site Scripting (XSS) - Stored

Cryptographic Issues - Generic

Denial of Service

Deserialization of Untrusted Data

Double Free

Embedded Malicious Code

Execution with Unnecessary Privileges

Exposed Dangerous Method or Function

Externally Controlled Reference to a Resource in Another Sphere

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)

File and Directory Information Exposure

Forced Browsing

Heap Overflow

HTTP Request Smuggling

HTTP Response Splitting

Improper Access Control - Generic

Improper Authentication - Generic

Improper Authorization

Improper Certificate Validation

Improper Check or Handling of Exceptional Conditions

Improper Export of Android Application Components

Improper Handling of Insufficient Permissions or Privileges

Improper Handling of URL Encoding (Hex Encoding)

Improper Input Validation

Improper Neutralization of Escape, Meta, or Control Sequences

Improper Neutralization of HTTP Headers for Scripting Syntax

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

Improper Null Termination

Improper Privilege Management

Inadequate Encryption Strength

Incorrect Authorization

[Incorrect Calculation of Buffer Size](https://github.com/bminossi/AllVideoPocsFromHackerOne/blob/main/we

Related Skills

View on GitHub
GitHub Stars909
CategoryContent
Updated10d ago
Forks225

Languages

Shell

Security Score

80/100

Audited on Mar 16, 2026

No findings