ReconDock By Kdairatchi
Go To ReconDock
MyRepo
MyRepo
  • Pastebin Services
  • Awesome Ai Talk
  • Bug Bounty Testing, Techniques, and Tools
  • Cybersources
  • Targets
  • Bug checklist
  • Bug Bounty Platforms
  • Awesome Bug Bounty Tips Awesome
    • CVE Exploits and PoC Collection
  • ============ Awesome Bugs
    • Awesome One-liner Bug Bounty
  • Awesome CS Courses
  • Awesome Cyber Co
  • Awesome Dev
  • Awesome Free Certs
  • Awesome Git
  • Awesome Github
  • Awesome Go
  • Awesome Interviews
  • Awesome Keys
  • Awesome Mac OpenSource
  • Awesome Mac
  • Awesome Python
    • Awesome Tool
  • Awesome-Selfhosted
    • Awesome Hacker Search Engines
  • Awesome Shell
  • Awesome Shodan Search Queries
  • Awesome Static Website Services Awesome
  • Awesome Vulnerable Applications
  • Awesome WAF
  • Awesome First PR Opportunities
  • Awesome-Bugbounty-Writeups
  • Awesome-web3-Security awesome
  • Bug-Bounty
  • CTF Tools
  • Awesome Blockchain Bug Bounty
  • Awesome Bug Bounty
  • awesome-design-systems
  • Awesome Google VRP Writeups
  • Web Scraping
  • awesome
  • bug-bounty-reference
  • the-book-of-secret-knowledge
  • APACHE
  • AWS
  • AZURE
  • CISCO
  • CLOUDFLARE
  • Cross Origin Resource Sharing (CORS)
  • CRLF Injection || HTTP Response Splitting
  • CSV Injection
  • Content Injection
  • CRLF Injection || HTTP Response Splitting
  • JENKINS
  • JIRA
  • LFI
  • OR
  • PostgreSQL Environment Variable Manipulation Vulnerability
  • RCE
  • Recon
  • SSRF
  • Proof OF Concept (POC): SharePoint Vulnerability Detection
  • Template Injection
  • WORDPRESS
  • XSLT Injection
  • XSS
  • XXE
  • Books
  • Firebase Subdomain Enumeration & PoC Testing
  • SQLI
  • Special Tools
  • Account Takeover
  • Authentication
  • Broken Link Hijacking
  • Business Logic Errors
  • Default Credentials
  • Email Spoofing
  • ExposedAPIkeys
  • ForgotPasswordFunctionality
  • JWT Vulnerabilities
  • OWASPTestingChecklist1
  • Tabnabbing
  • Web Cache Poisoning
  • Wordpress Endpoints to look
  • lfi_vulnerble_targets
  • (LFI)passwrd
  • LostSec
  • POCS
    • CVES
      • CVE-2021-36873
      • BreadcrumbsSQL_Injection_cve_2024
      • CVE-2024-0195
      • CVE-2024-29269 Exploit
  • 403-ByPass
  • Chat-bot_xss_payloads
  • burp
    • Match & Replace
    • Zap
  • cloudflare-waf-bypass
  • infosec
    • Customize the bash shell environments
    • automation
    • Website Ideas
  • 2FA bypass
  • Account Takeover
  • OWASP Web Application Security Testing Checklist
  • Projects
  • OWASP Top Ten
  • links
  • Bug Bounty Builder ¯\(ツ)/¯
  • Awesome
    • AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
  • Cheatsheets
  • Checklists
    • Here’s a clear, step by step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy to follow commands, explanations, and examples where applicable.
  • Dorks
  • Scripts
  • Loads
  • OWASP
    • Checklist
  • ai
    • Ai Best for Information and Coding
  • Medium Recent Writeups
  • 🌟 Useful Extensions for Bug Bounty Hunting 🌟
  • Customize the bash shell environments
  • Fabric
    • Test Application Platform Configuration
  • Docker
  • Git auto
  • Bug Bounty Beginner's Roadmap
  • Methodology 2025
    • Advanced Recon Methodology
Powered by GitBook
On this page
  • Phase 1: Fundamentals (1-2 Months)
  • Phase 2: Learn Security Concepts (1 Month)
  • Phase 3: Reconnaissance & Enumeration (1 Month)
  • Phase 4: Vulnerability Discovery (1-2 Months)
  • Phase 5: Bug Bounty Hunting (1 Month+)
  • Weekly Timetable (Sample)
  • Summary
  • Useful Tools & Platforms
  • Bug Bounty Beginner's Roadmap
  • Introduction
  • What to learn?
  • Where to learn from?
  • Join Twitter Today!
  • PRACTICE! PRACTICE! and PRACTICE!
  • Bug Bounty Platforms
  • Bug Bounty Report Format

Bug Bounty Beginner's Roadmap

PreviousGit autoNextMethodology 2025

Phase 1: Fundamentals (1-2 Months)

Week 1-4: Networking and Web Basics

Objective: Understand networking, HTTP, and how the web works.

Topics:

  • Learn TCP/IP, DNS, and HTTP/HTTPS.

  • Understand how web applications work (client-server model, cookies, sessions).

Tools:

  • Wireshark

  • Postman

  • cURL

Resources:


Week 5-8: Programming Basics & Scripting

Objective: Learn basic programming and scripting needed for bug hunting.

Languages:

  • HTML, CSS (basic structure of web apps).

  • JavaScript (for XSS, DOM manipulation).

  • Python (useful for scripting and automating tasks).

Topics:

  • Learn basic syntax, loops, conditionals, and functions.

  • Understand web forms, inputs, cookies, and session management.

  • Create basic scripts for automating simple tasks.

Resources:


Phase 2: Learn Security Concepts (1 Month)

Week 9-12: Web Vulnerabilities (OWASP Top 10)

Objective: Familiarize yourself with the most common web vulnerabilities.

Topics:

  • Study the OWASP Top 10: SQL Injection, XSS, CSRF, SSRF, IDOR, etc.

  • Understand how these vulnerabilities are exploited in real-world scenarios.

Practical Work:

  • Set up a virtual lab using DVWA (Damn Vulnerable Web App), BWAPP, or OWASP Juice Shop to practice these vulnerabilities.

Resources:


Phase 3: Reconnaissance & Enumeration (1 Month)

Week 13-16: Reconnaissance and Information Gathering

Objective: Learn how to gather information about a target before testing.

Topics:

  • Subdomain enumeration, port scanning, directory brute-forcing.

  • Passive recon using tools like crt.sh, SecurityTrails, and Wayback Machine.

Tools:

  • Sublist3r

  • Amass

  • nmap

  • ffuf

  • Shodan

Practical Work:

  • Choose a bug bounty program (e.g., HackerOne) and practice recon on targets.

Resources:


Phase 4: Vulnerability Discovery (1-2 Months)

Week 17-22: Hunting Common Bugs

Objective: Start actively testing and looking for common vulnerabilities.

Topics:

  • Injection Attacks: Test for SQLi and command injections.

  • XSS: Focus on input fields, search boxes, and parameter tampering.

  • IDOR: Look for broken access control in web apps.

Practical Work:

  • Use Burp Suite or OWASP ZAP to intercept and modify requests.

  • Explore vulnerable applications like Juice Shop or participate in Capture the Flag (CTF) challenges.

Resources:


Phase 5: Bug Bounty Hunting (1 Month+)

Week 23-24: Start Small

Objective: Now that you have the basic skills, start hunting.

Activities:

  • Pick low-hanging fruits such as XSS, IDOR, or exposed admin panels.

  • Automate recon with tools like Subfinder, Aquatone, and ffuf.

Practice:

  • Spend 2-3 hours daily hunting on platforms like HackerOne or Bugcrowd.

Resources:


Week 25-26: Report Your First Bug

Objective: After finding a vulnerability, submit a report.

Steps:

  • Create a Proof of Concept (PoC) with proper screenshots.

  • Write a detailed step-by-step report.

  • If the bug gets rejected, learn from it and improve your approach.

Resources:


Weekly Timetable (Sample)

Monday to Friday:

  • 1-2 hours theory/study: Learning about web vulnerabilities or network basics.

  • 1-2 hours hands-on practice: Recon, fuzzing, and testing for bugs on targets.

Saturday-Sunday:

  • Full-day practice: Set up a lab or test programs on bug bounty platforms.

  • Study write-ups: Read reports and watch CTF challenges on YouTube.


Summary

By following this plan:

  • 1st-2nd month: Focus on learning networking, web basics, and programming.

  • 3rd month: Dive into web security concepts, focusing on OWASP Top 10.

  • 4th month: Master recon and information gathering tools.

  • 5th month: Actively start testing for bugs on real-world targets.

  • 6th month: Start reporting bugs, aiming to find and report your first vulnerability.


Useful Tools & Platforms


This roadmap provides a structured learning path to help you achieve your first bug bounty within 6 months. Dedication and consistency are key!

Bug Bounty Beginner's Roadmap

Hi! I'm Ansh Bhawnani. I am currently working as a Security Engineer and also a part time content creator. I am creating this repository for everyone to contribute as to guide the young and enthusiastic minds for starting their career in bug bounties. More content will be added regularly. Keep following. So let's get started!

NOTE: The bug bounty landscape has changed since the last few years. The issues we used to find easily an year ago would not be easy now. Automation is being used rigorously and most of the "low hanging fruits" are being duplicated if you are out of luck. If you want to start doing bug bounty, you will have to be determined to be consistent and focused, as the competition is very high.

Introduction

  • What is a bug?

    • Security bug or vulnerability is “a weakness in the computational logic (e.g., code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, OR availability.

  • What is Bug Bounty?

    • A bug bounty or bug bounty program is IT jargon for a reward or bounty program given for finding and reporting a bug in a particular software product. Many IT companies offer bug bounties to drive product improvement and get more interaction from end users or clients. Companies that operate bug bounty programs may get hundreds of bug reports, including security bugs and security vulnerabilities, and many who report those bugs stand to receive awards.

  • What is the Reward?

    • There are all types of rewards based on the severity of the issue and the cost to fix. They may range from real money (most prevalent) to premium subscriptions (Prime/Netflix), discount coupons (for e commerce of shopping sites), gift vouchers, swags (apparels, badges, customized stationery, etc.). Money may range from 50$ to 50,000$ and even more.

What to learn?

  • Technical

    • Computer Fundamentals

    • Computer Networking

    • Operating Systems

    • Command Line

      • Windows:

      • Linux:

    • Programming

      • C

      • Python

      • JavaScript

      • PHP

Where to learn from?

  • Books

  • Writeups

  • Blogs and Articles

  • Forums

  • Official Websites

  • YouTube Channels

    • English

    • Hindi

Join Twitter Today!

World class security researchers and bug bounty hunters are on Twitter. Where are you? Join Twitter now and get daily updates on new issues, vulnerabilities, zero days, exploits, and join people sharing their methodologies, resources, notes and experiences in the cyber security world!

PRACTICE! PRACTICE! and PRACTICE!

  • CTF

  • Online Labs

  • Offline Labs

More Tools and Services To use

  • Servers

Vulnerabilities

Exploits

Bug Bounty Platforms

  • Crowdsourcing

  • Individual Programs

Bug Bounty Report Format

  • Title

    • The first impression is the last impression, the security engineer looks at the title first and he should be able to identify the issue.

    • Write about what kind of functionality you can able to abuse or what kind of protection you can bypass. Write in just one line.

    • Include the Impact of the issue in the title if possible.

  • Description

    • This component provides details of the vulnerability, you can explain the vulnerability here, write about the paths, endpoints, error messages you got while testing. You can also attach HTTP requests, vulnerable source code.

  • Steps to Reproduce

    • Write the stepwise process to recreate the bug. It is important for an app owner to be able to verify what you've found and understand the scenario.

    • You must write each step clearly in-order to demonstrate the issue. that helps security engineers to triage fast.

  • Proof of Concept

    • This component is the visual of the whole work. You can record a demonstration video or attach screenshots.

  • Impact

    • Write about the real-life impact, How an attacker can take advantage if he/she successfully exploits the vulnerability.

    • What type of possible damages could be done? (avoid writing about the theoretical impact)

    • Should align with the business objective of the organization

Sample Report

Some additional Tips

  1. Don't do bug bounty as a full time in the beginning (although I suggest don't do it full time at any point). There is no guarantee to get bugs every other day, there is no stability. Always keep multiple sources of income (bug bounty not being the primary).

  2. Stay updated, learning should never stop. Join twitter, follow good people, maintain the curiosity to learn something new every day. Read writeups, blogs and keep expanding your knowledge.

  3. Always see bug bounty as a medium to enhance your skills. Money will come only after you have the skills. Take money as a motivation only.

  4. Don't be dependent on automation. You can't expect a tool to generate money for you. Automation is everywhere. The key to success in Bug Bounty is to be unique. Build your own methodology, learn from others and apply on your own.

  5. Always try to escalate the severity of the bug, Keep a broader mindset. An RCE always has higher impact than arbitrary file upload.

  6. It's not necessary that a vulnerability will be rewarded based on the industry defined standard impact. The asset owners rate the issue with a risk rating, often calculated as impact * likelyhood (exploitability). For example, an SQL Injection by default has a Critical impact, but if the application is accessible only inside the organization VPN and doesn't contain any user data/PII in the database, the likelyhood of the exploitation is reduced, so does the risk.

  7. Stay connected to the community. Learn and contribute. There is always someone better than you in something. don't miss an opportunity to network. Join forums, go to conferences and hacking events, meet people, learn from their experiences.

  8. Always be helpful.

-

_

_

-

Web Application Hacker's Handbook:

Real World Bug Hunting:

Bug Bounty Hunting Essentials:

Bug Bounty Bootcamp:

Hands on Bug Hunting:

Hacker's Playbook 3:

OWASP Testing Guide:

Web Hacking 101:

OWASP Mobile Testing Guide :

Medium:

Infosec Writeups:

Hackerone Hacktivity:

Google VRP Writeups:

Hacking Articles:

Vickie Li Blogs:

Bugcrowd Blogs:

Intigriti Blogs:

Portswigger Blogs:

Reddit:

Reddit:

Bugcrowd Discord:

OWASP:

PortSwigger:

Cloudflare:

Insider PHD:

Stok:

Bug Bounty Reports Explained:

Vickie Li:

Hacking Simplified:

Pwn function :

Farah Hawa:

XSSRat:

Zwink:

Live Overflow :

Spin The Hack:

Pratik Dabhi:

Hacker 101:

PicoCTF:

TryHackMe: (premium/free)

HackTheBox: (premium)

VulnHub:

HackThisSite:

CTFChallenge:

PentesterLab: (premium)

PortSwigger Web Security Academy:

OWASP Juice Shop:

XSSGame:

BugBountyHunter: (premium)

W3Challs :

DVWA:

bWAPP:

Metasploitable2:

BugBountyHunter: (premium)

W3Challs :

- Search Engine for the Internet of Everything

- Search Engine for every server on the Internet to reduce exposure and improve security

- Cyber Defense Search Engine for open-source and cyber threat intelligence data

- Global cyberspace mapping

- The source for understanding internet noise

- Scaling Network Scanning

- Discover, Research and Monitor any Assets Available Online

- Cyberspace mapping

- Cyberspace surveying and mapping system

- Internet Search Engines For Security Researchers

- US National Vulnerability Database

- Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities

- Security vulnerability database inclusive of CVEs and GitHub originated security advisories

- The Open Cloud Vulnerability & Security Issue Database

- Open Source Vulnerabilities

- Your Search Engine for Security Intelligence

- Easiest way to track CVE updates and be alerted about new vulnerabilities

- Open Source Vulnerability Database

- The largest open source vulnerability DB

- Vulnerability & Exploit Database

- The ultimate security vulnerability datasource

- Vulnerability intelligence and management solution

- The unified OSINT research tool

- Vulnerabilities and weaknesses in open source applications and cloud native infrastructure

- Vulnerability and exploit search engine

- Number one vulnerability database

- Realtime Security Monitoring

- Publicly disclosed vulnerabilities discovered by Zero Day Initiative researchers

- Vulnerabilities including Zero Days

- Gather and update all available and newest CVEs with their PoC

- Chinese National Vulnerability Database

- Check CVEs in our free, open source feed of exploited vulnerabilities

- Vulnerability research, bug bounties and vulnerability assessments

- Information about security flaws that affect Red Hat products and services in the form of security advisories

- Security advisories and vulnerability information for Cisco products, including network equipment and software

- Reports of security vulnerabilities affecting Microsoft products and services

- VARIoT IoT Vulnerabilities Database

- Exploit Database

- Convenient central place for identifying the newest exploits

- Vulnerability & Exploit Database

- Vulnerability and exploit search engine

- Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers

- Ultimate database of exploits and vulnerabilities

- Living Off The Land Binaries, Scripts and Libraries

- Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

- A list of useful payloads and bypasses for Web Application Security

- The wonderland of JavaScript unexpected usages, and more

- Database of Exploits

- Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode

- See the latest hacker activity on HackerOne

- Showcase of accepted and disclosed submissions on Bugcrowd programs

- Curated list of Unix binaries that can be manipulated for argument injection

- Shellcodes database for study cases

- Encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on their next cloud exploitation adventure

- Open-source project that brings together vulnerable, malicious, and known malicious Windows drivers

- Collection of TTPs (tools, tactics, and procedures) for what to do after access has been gained

- Your comprehensive database for CVE exploits from across the internet

- VARIoT IoT exploits database

- Detailed information on various built-in macOS binaries and how they can be used by threat actors for malicious purposes

- Model that dynamically scores new and existing vulnerabilities to reflect their exploit likelihood

- Interactive cheat sheet containing a curated list of offensive security tools and their respective commands to be used against Windows/AD environments

- Compendium of applications that can be used to carry out day-to-day exploitation

- Resource collection that provides guidance on identifying and utilizing malicious hardware and malicious devices

- How development tools commonly used in CI/CD pipelines can be used to achieve arbitrary code execution

Bugcrowd:

Hackerone:

Intigriti:

YesWeHack:

OpenBugBounty:

Meta:

Google:

Computer Networking - Coursera
The Web Developer Bootcamp - Udemy
Mozilla HTTP Documentation
Codecademy Web Development
FreeCodeCamp JavaScript
Automate the Boring Stuff with Python
OWASP Official Website
PortSwigger Web Security Academy
HackTheBox
Bugcrowd University - Reconnaissance
SecurityTrails - Passive Recon
YouTube Recon Tutorials
Burp Suite by PortSwigger
OWASP ZAP
TryHackMe: CTF Challenges
Subfinder
Aquatone
HackerOne
Bugcrowd
How to Write a Good Bug Report - HackerOne
Bugcrowd Reporting Guidelines
Wireshark
Postman
nmap
ffuf
Shodan
HackerOne
Bugcrowd
https://www.comptia.org/training/by-certification/a
https://www.youtube.com/watch?v=tIfRDPekybU
https://www.tutorialspoint.com/computer_fundamentals/index.htm
https://onlinecourses.swayam2.ac.in/cec19_cs06/preview
https://www.udemy.com/course/complete-computer-basics-course/
https://www.coursera.org/courses?query=computer%20fundamentals
https://www.youtube.com/watch?v=0AcpUwnc12E&list=PLkW9FMxqUvyZaSQNQslneeODER3bJCb2K
https://www.youtube.com/watch?v=qiQR5rTSshw
https://www.youtube.com/watch?v=L3ZzkOTDins
https://www.udacity.com/course/computer-networking--ud436
https://www.coursera.org/professional-certificates/google-it-support
https://www.udemy.com/course/introduction-to-computer-networks/
https://www.youtube.com/watch?v=z2r-p7xc7c4
https://www.youtube.com/watch?v=_tCY-c-sPZc
https://www.coursera.org/learn/os-power-user
https://www.udacity.com/course/introduction-to-operating-systems--ud923
https://www.udemy.com/course/linux-command-line-volume1/
https://www.youtube.com/watch?v=v_1zB2WNN14
https://www.youtube.com/watch?v=TBBbQKp9cKw&list=PLRu7mEBdW7fDTarQ0F2k2tpwCJg_hKhJQ
https://www.youtube.com/watch?v=fid6nfvCz1I&list=PLRu7mEBdW7fDlf80vMmEJ4Vw9uf2Gbyc
https://www.youtube.com/watch?v=UVUd9_k9C6A
https://www.youtube.com/watch?v=fid6nfvCz1I&list=PLRu7mEBdW7fDlf80vMmEJ4Vw9uf2Gbyc
https://www.youtube.com/watch?v=UVUd9_k9C6A
https://www.youtube.com/watch?v=GtovwKDemnI
https://www.youtube.com/watch?v=2PGnYjbYuUo
https://www.youtube.com/watch?v=e7BufAVwDiM&t=418s
https://www.youtube.com/watch?v=bYRfRGbqDIw&list=PLkPmSWtWNIyTQ1NX6MarpjHPkLUs3u1wG&index=4
https://www.youtube.com/watch?v=irqbmMNs2Bo
https://www.youtube.com/watch?v=ZSPZob_1TOk
https://www.programiz.com/c-programming
https://www.youtube.com/watch?v=ZLga4doUdjY&t=30352s
https://www.youtube.com/watch?v=gfDE2a7MKjA
https://www.youtube.com/watch?v=eTyI-M50Hu4
https://www.youtube.com/watch?v=-lCF2t6iuUc
https://www.youtube.com/watch?v=hKB-YGF14SY&t=1486s
https://www.youtube.com/watch?v=jS4aFq5-91M
https://www.youtube.com/watch?v=1SnPKhCdlsU
https://www.youtube.com/watch?v=OK_JCtrrv-c
https://www.youtube.com/watch?v=T8SEGXzdbYg&t=1329s
https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470
https://www.amazon.in/Real-World-Bug-Hunting-Field-Hacking-ebook/dp/B072SQZ2LG
https://www.amazon.in/Bug-Bounty-Hunting-Essentials-Quick-paced-ebook/dp/B079RM344H
https://www.amazon.in/Bug-Bounty-Bootcamp-Reporting-Vulnerabilities-ebook/dp/B08YK368Y3
https://www.amazon.in/Hands-Bug-Hunting-Penetration-Testers-ebook/dp/B07DTF2VL6
https://www.amazon.in/Hacker-Playbook-Practical-Penetration-Testing/dp/1980901759
https://www.owasp.org/index.php/OWASP_Testing_Project
https://www.pdfdrive.com/web-hacking-101-e26570613.html
https://www.owasp.org/index.php/OWASP_Mobile_Security_Testing_Guide
https://medium.com/analytics-vidhya/a-beginners-guide-to-cyber-security-3d0f7891c93a
https://infosecwriteups.com/?gi=3149891cc73d
https://hackerone.com/hacktivity
https://github.com/xdavidhu/awesome-google-vrp-writeups
https://www.hackingarticles.in/
https://vickieli.dev/
https://www.bugcrowd.com/blog/
https://blog.intigriti.com/
https://portswigger.net/blog
https://www.reddit.com/r/websecurity/
https://www.reddit.com/r/netsec/
https://discord.com/invite/TWr3Brs
https://owasp.org/
https://portswigger.net/
https://www.cloudflare.com/
https://www.youtube.com/c/InsiderPhD
https://www.youtube.com/c/STOKfredrik
https://www.youtube.com/c/BugBountyReportsExplained
https://www.youtube.com/c/VickieLiDev
https://www.youtube.com/c/HackingSimplifiedAS
https://www.youtube.com/c/PwnFunction
https://www.youtube.com/c/FarahHawa
https://www.youtube.com/c/TheXSSrat
https://www.youtube.com/channel/UCDl4jpAVAezUdzsDBDDTGsQ
https://www.youtube.com/c/LiveOverflow
https://www.youtube.com/c/SpinTheHack
https://www.youtube.com/c/impratikdabhi
https://www.hackerone.com/hackers/hacker101
https://picoctf.org/
https://tryhackme.com/
https://www.hackthebox.com/
https://www.vulnhub.com/
https://hackthissite.org/
https://ctfchallenge.co.uk/
https://pentesterlab.com/referral/olaL4k8btE8wqA
https://portswigger.net/web-security
https://owasp.org/www-project-juice-shop/
https://xss-game.appspot.com/
https://www.bugbountyhunter.com/
https://w3challs.com/
https://dvwa.co.uk/
http://www.itsecgames.com/
https://sourceforge.net/projects/metasploitable/files/Metasploitable2/
https://www.bugbountyhunter.com/
https://w3challs.com/
Shodan
Censys Search
Onyphe.io
ZoomEye
GreyNoise
Natlas
Netlas.io
FOFA
Quake
Hunter
NIST NVD
MITRE CVE
GitHub Advisory Database
cloudvulndb.org
osv.dev
Vulners.com
opencve.io
security.snyk.io
Mend Vulnerability Database
Rapid7 - DB
CVEDetails
VulnIQ
SynapsInt
Aqua Vulnerability Database
Vulmon
VulDB
ScanFactory
Trend Micro Zero Day Initiative
Google Project Zero
Trickest CVE Repository
cnvd.org.cn
InTheWild.io
Vulnerability Lab
Red Hat Security Advisories
Cisco Security Advisories
Microsoft Security Response Center
VARIoT
Exploit-DB
Sploitus
Rapid7 - DB
Vulmon
packetstormsecurity.com
0day.today
LOLBAS
GTFOBins
Payloads All The Things
XSS Payloads
exploitalert.com
Reverse Shell generator
HackerOne hacktivity
Bugcrowd Crowdstream
GTFOArgs
shell-storm.org/shellcode
Hacking the Cloud
LOLDrivers
PwnWiki
CVExploits Search
VARIoT
LOOBins
Coalition Exploit Scoring System
WADComs
LOLAPPS
Living off the Hardware
Living Off the Pipeline
https://www.bugcrowd.com/
https://www.hackerone.com/
https://www.intigriti.com/
https://www.yeswehack.com/
https://www.openbugbounty.org/
https://www.facebook.com/whitehat
https://about.google/appsecurity/