Bug Bounty Testing, Techniques, and Tools
Last updated
Last updated
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Bug Bounty in Cybersecurity.
Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.
What is Bug Bounty?
A is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
Table of Contents
[HTTP Header Injection]
Cross-Site Scripting (XSS)
he is able to make stored XSS from a irrelevant domain to main facebook domain
Brute Force
SQL Injection
Stealing Access Token
Google oauth bypass
CSRF
Alert, God-like Write-up, make sure you know what is ROP before clicking, which I don't =(
Deserialization
Image Tragick
It's Google Vulnerability, so it's worth reading, as generally it is more difficult to find Google vulnerability
Authentication Bypass
HTTP Header Injection
Subdomain Takeover
License
by Patrik Fehrenbach
by filedescriptor
in Uber by Jack Whitton
by Nirgoldshlager
by Frans Rosen
by Jack Whitton
by Jack Whitton
by Ramzes
by secgeek
by Venkat S
by PAULOS YIBELO
by Harry M Gertos
by James Kettle (albinowax)
by Klikki Oy
by Masato Kinugawa
by fransrosen
- by Krzysztof Kotowicz
- by detectify
- by frans
by Arne Swinnen
by Arne Swinnen
by Arne Swinnen
by r0t
by Efkan Gökbaş (mefkan)
by Anand Prakash
by Arun Sureshkumar
by glc
by Orange Tsai
by Brett Buerhaus
by Abood Nour (syndr0me)
by Jack Whitton -
by Jack Whitton
by filedescriptor
by Egor Homakov
by filedescriptor
by Mahmoud G. (zombiehelp54)
by mongo (mongo)
by filedescriptor.
by labsdetectify
By Jack Whitton
by Jack Whitton
by Florian Courtial
by Yasser Ali
by vijay kumar
by phwd
by Milan A Solanki
by Reginaldo Silva
by Orange Tsai
by Orage Tsai
by Orange Tsai (Sorry its in Chinese Only)
by Ruslan Habalov
by secgeek
by Cure53 (cure53)
by 93c08539 (93c08539)
by Raz0r (ru_raz0r)
by Bitquark
by 5haked
by Michael Stepankin
by Michael Stepankin
by Wesley Wineberg
by Michiel Prins (michiel)
by NaHamSec
by c666a323be94d57
by Florian Courtial
by Florian Courtial
by Florian Courtial
by mongo
by secgeek
by secgeek
by secgeek
by Yaaser Ali
by Yaaser Ali
by Duo Labs
by Anand Prakash
by Enguerran Gillier (opnsec)
by Jobert Abma (jobert)
by Gazza (gazza)
by Severus (severus)
by Roy Castillo
by Raja Sekar Durairaj
by phwd
by ?, be honest, thanks to this article, I have found quite a few bugs because of using his method, respect to the author!
by Edgar Boda-Majer (eboda)
by Matthew Temmy (temmyscript)
by detectify
by Raghav Bisht
by vijay kumar
by secgeek
by vijay kumar (vijay_kumar1110)
by Brett Buerhaus
by Josip Franjković
by Fábio Pires (shmoo)
by Ashish Padelkar
by Arne Swinnen
by POUYA DARABI
by Jouko Pynnönen (jouko)
by henryhoggard
by filedescriptor
by filedescriptor
by geekboy
- by David Vieira-Kurz
MIT License & license
This work is licensed under a .
To the extent possible under law, has waived all copyright and related or neighboring rights to this work.