hacker.txt Generator
Basic Configuration
Testing Types
Injection
SQLi
NoSQLi
XSS
XXE
SSTI
Command Injection
LDAP Injection
Format String
Authentication & Authorization
Auth Bypass
2FA Bypass
JWT Testing
OAuth Testing
SAML Testing
Session Testing
IDOR
Request Manipulation
CSRF
SSRF
HTTP Request Smuggling
HTTP Response Splitting
HTTP Parameter Pollution
Infrastructure
RCE
Path Traversal
File Inclusion
Information Disclosure
Open Redirect
Race Condition
Explicitly Forbidden
DDoS
Bruteforce
Social Engineering
Physical Security
Phishing
Data Exfiltration
Contact Information
Disclosure Policy
Domain-Specific Rules
Generated hacker.txt
# hacker.txt - Security Testing Guidelines
# https://hackertxt.com
#
# This file defines the security testing boundaries for this website.
# It specifies what types of security testing are allowed, when they can be performed,
# and how to responsibly disclose any findings.
#
# Schema: https://hackertxt.com/schema.json
#
# Generated at 2025-03-16T12:00:14.877Z
Allow-Pentesting: yes
Testing-Window: anytime
Responsible-Disclosure: 7
Legal-Notice: Unauthorized hacking is illegal. Follow testing rules.