ReconDock By Kdairatchi
Go To ReconDock
MyRepo
MyRepo
  • Pastebin Services
  • Awesome Ai Talk
  • Bug Bounty Testing, Techniques, and Tools
  • Cybersources
  • Targets
  • Bug checklist
  • Bug Bounty Platforms
  • Awesome Bug Bounty Tips Awesome
    • CVE Exploits and PoC Collection
  • ============ Awesome Bugs
    • Awesome One-liner Bug Bounty
  • Awesome CS Courses
  • Awesome Cyber Co
  • Awesome Dev
  • Awesome Free Certs
  • Awesome Git
  • Awesome Github
  • Awesome Go
  • Awesome Interviews
  • Awesome Keys
  • Awesome Mac OpenSource
  • Awesome Mac
  • Awesome Python
    • Awesome Tool
  • Awesome-Selfhosted
    • Awesome Hacker Search Engines
  • Awesome Shell
  • Awesome Shodan Search Queries
  • Awesome Static Website Services Awesome
  • Awesome Vulnerable Applications
  • Awesome WAF
  • Awesome First PR Opportunities
  • Awesome-Bugbounty-Writeups
  • Awesome-web3-Security awesome
  • Bug-Bounty
  • CTF Tools
  • Awesome Blockchain Bug Bounty
  • Awesome Bug Bounty
  • awesome-design-systems
  • Awesome Google VRP Writeups
  • Web Scraping
  • awesome
  • bug-bounty-reference
  • the-book-of-secret-knowledge
  • APACHE
  • AWS
  • AZURE
  • CISCO
  • CLOUDFLARE
  • Cross Origin Resource Sharing (CORS)
  • CRLF Injection || HTTP Response Splitting
  • CSV Injection
  • Content Injection
  • CRLF Injection || HTTP Response Splitting
  • JENKINS
  • JIRA
  • LFI
  • OR
  • PostgreSQL Environment Variable Manipulation Vulnerability
  • RCE
  • Recon
  • SSRF
  • Proof OF Concept (POC): SharePoint Vulnerability Detection
  • Template Injection
  • WORDPRESS
  • XSLT Injection
  • XSS
  • XXE
  • Books
  • Firebase Subdomain Enumeration & PoC Testing
  • SQLI
  • Special Tools
  • Account Takeover
  • Authentication
  • Broken Link Hijacking
  • Business Logic Errors
  • Default Credentials
  • Email Spoofing
  • ExposedAPIkeys
  • ForgotPasswordFunctionality
  • JWT Vulnerabilities
  • OWASPTestingChecklist1
  • Tabnabbing
  • Web Cache Poisoning
  • Wordpress Endpoints to look
  • lfi_vulnerble_targets
  • (LFI)passwrd
  • LostSec
  • POCS
    • CVES
      • CVE-2021-36873
      • BreadcrumbsSQL_Injection_cve_2024
      • CVE-2024-0195
      • CVE-2024-29269 Exploit
  • 403-ByPass
  • Chat-bot_xss_payloads
  • burp
    • Match & Replace
    • Zap
  • cloudflare-waf-bypass
  • infosec
    • Customize the bash shell environments
    • automation
    • Website Ideas
  • 2FA bypass
  • Account Takeover
  • OWASP Web Application Security Testing Checklist
  • Projects
  • OWASP Top Ten
  • links
  • Bug Bounty Builder ¯\(ツ)/¯
  • Awesome
    • AllAboutBugBounty: All about bug bounty (bypasses, payloads, and etc)
  • Cheatsheets
  • Checklists
    • Here’s a clear, step by step breakdown of commands, tools, and objectives for each section in your Web Security Testing Guide (WSTG). Each test includes easy to follow commands, explanations, and examples where applicable.
  • Dorks
  • Scripts
  • Loads
  • OWASP
    • Checklist
  • ai
    • Ai Best for Information and Coding
  • Medium Recent Writeups
  • 🌟 Useful Extensions for Bug Bounty Hunting 🌟
  • Customize the bash shell environments
  • Fabric
    • Test Application Platform Configuration
  • Docker
  • Git auto
  • Bug Bounty Beginner's Roadmap
  • Methodology 2025
    • Advanced Recon Methodology
Powered by GitBook
On this page
  • What is Bug Bounty?
  • Table of Contents
  • Cross-Site Scripting (XSS)
  • Brute Force
  • SQL Injection
  • Stealing Access Token
  • CSRF
  • Remote Code Execution
  • Insecure Direct Object Reference (IDOR)
  • XXE
  • Unrestricted File Upload
  • Server Side Request Forgery (SSRF)
  • Race Condition
  • Business Logic Flaw
  • Authentication Bypass
  • HTTP Header Injection
  • Subdomain Takeover
  • License

Bug Bounty Testing, Techniques, and Tools

PreviousAwesome Ai TalkNextCybersources

Last updated 4 months ago

An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Bug Bounty in Cybersecurity.

Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.

What is Bug Bounty?

A is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.

Table of Contents

  • [HTTP Header Injection]

Cross-Site Scripting (XSS)

    • he is able to make stored XSS from a irrelevant domain to main facebook domain

Brute Force

SQL Injection

Stealing Access Token

Google oauth bypass

CSRF

Remote Code Execution

    • Alert, God-like Write-up, make sure you know what is ROP before clicking, which I don't =(

Deserialization

Image Tragick

Insecure Direct Object Reference (IDOR)

    • It's Google Vulnerability, so it's worth reading, as generally it is more difficult to find Google vulnerability

XXE

Unrestricted File Upload

Server Side Request Forgery (SSRF)

Race Condition

Business Logic Flaw

Authentication Bypass

HTTP Header Injection

Subdomain Takeover

License

by Patrik Fehrenbach

by filedescriptor

in Uber by Jack Whitton

by Nirgoldshlager

by Frans Rosen

by Jack Whitton

by Jack Whitton

by Ramzes

by secgeek

by Venkat S

by PAULOS YIBELO

by Harry M Gertos

by James Kettle (albinowax)

by Klikki Oy

by Masato Kinugawa

by fransrosen

- by Krzysztof Kotowicz

- by detectify

- by frans

by Arne Swinnen

by Arne Swinnen

by Arne Swinnen

by r0t

by Efkan Gökbaş (mefkan)

by Anand Prakash

by Arun Sureshkumar

by glc

by Orange Tsai

by Brett Buerhaus

by Abood Nour (syndr0me)

by Jack Whitton -

by Jack Whitton

by filedescriptor

by Egor Homakov

by filedescriptor

by Mahmoud G. (zombiehelp54)

by mongo (mongo)

by filedescriptor.

by labsdetectify

By Jack Whitton

by Jack Whitton

by Florian Courtial

by Yasser Ali

by vijay kumar

by phwd

by Milan A Solanki

by Reginaldo Silva

by Orange Tsai

by Orage Tsai

by Orange Tsai (Sorry its in Chinese Only)

by Ruslan Habalov

by secgeek

by Cure53 (cure53)

by 93c08539 (93c08539)

by Raz0r (ru_raz0r)

by Bitquark

by 5haked

by Michael Stepankin

by Michael Stepankin

by Wesley Wineberg

by Michiel Prins (michiel)

by NaHamSec

by c666a323be94d57

by Florian Courtial

by Florian Courtial

by Florian Courtial

by mongo

by secgeek

by secgeek

by secgeek

by Yaaser Ali

by Yaaser Ali

by Duo Labs

by Anand Prakash

by Enguerran Gillier (opnsec)

by Jobert Abma (jobert)

by Gazza (gazza)

by Severus (severus)

by Roy Castillo

by Raja Sekar Durairaj

by phwd

by ?, be honest, thanks to this article, I have found quite a few bugs because of using his method, respect to the author!

by Edgar Boda-Majer (eboda)

by Matthew Temmy (temmyscript)

by detectify

by Raghav Bisht

by vijay kumar

by secgeek

by vijay kumar (vijay_kumar1110)

by Brett Buerhaus

by Josip Franjković

by Fábio Pires (shmoo)

by Ashish Padelkar

by Arne Swinnen

by POUYA DARABI

by Jouko Pynnönen (jouko)

by henryhoggard

by filedescriptor

by filedescriptor

by geekboy

- by David Vieira-Kurz

MIT License & license

This work is licensed under a .

To the extent possible under law, has waived all copyright and related or neighboring rights to this work.

bug bounty program
Cross-Site Scripting (XSS)
Brute Force
SQL Injection (SQLi)
External XML Entity Attack (XXE)
Remote Code Execution (RCE)
Deserialization
Image Tragick
Cross-Site Request Forgery (CSRF)
Insecure Direct Object Reference (IDOR)
Stealing Access Token
Google Oauth Login Bypass
Server Side Request Forgery (SSRF)
Unrestricted File Upload
Race Condition
Business Logic Flaw
Authentication Bypass
Sleeping stored Google XSS Awakens a $5000 Bounty
RPO that lead to information leakage in Google
God-like XSS, Log-in, Log-out, Log-in
Three Stored XSS in Facebook
Using a Braun Shaver to Bypass XSS Audit and WAF
An XSS on Facebook via PNGs & Wonky Content Types
Stored XSS in *.ebay.com
Complicated, Best Report of Google XSS
Tricky Html Injection and Possible XSS in sms-be-vip.twitter.com
Command Injection in Google Console
Facebook's Moves - OAuth XSS
Stored XSS in Google Docs (Bug Bounty)
Stored XSS on developer.uber.com via admin account compromise in Uber
Yahoo Mail stored XSS
Abusing XSS Filter: One ^ leads to XSS(CVE-2016-3212)
Youtube XSS
Best Google XSS again
IE & Edge URL parsin Problem
Google XSS subdomain Clickjacking
Microsoft XSS and Twitter XSS
Google Japan Book XSS
Flash XSS mega nz
xss in google IE, Host Header Reflection
Web Authentication Endpoint Credentials Brute-Force Vulnerability
InstaBrute: Two Ways to Brute-force Instagram Account Credentials
How I Could Compromise 4% (Locked) Instagram Accounts
Possibility to brute force invite codes in riders.uber.com
Brute-Forcing invite codes in partners.uber.com
How I could have hacked all Facebook accounts
Facebook Account Take Over by using SMS verification code
SQL injection in Wordpress Plugin Huge IT Video Gallery in Uber
SQL Injection on sctrack.email.uber.com.cn
Yahoo – Root Access SQL Injection – tw.yahoo.com
Multiple vulnerabilities in a WordPress plugin at drive.uber.com
Facebook Access Token Stolen
Obtaining Login Tokens for an Outlook, Office or Azure Account
Bypassing Digits web authentication's host validation with HPP
Bypass of redirect_uri validation with /../ in GitHub
Bypassing callback_url validation on Digits
Stealing livechat token and using it to chat as the user - user information disclosure
Change any Uber user's password through /rt/users/passwordless-signup - Account Takeover (critical)
Internet Explorer has a URL problem, on GitHub
How I made LastPass give me all your passwords
Bypassing Google Authentication on Periscope's Administration Panel
Messenger.com CSRF that show you the steps when you check for CSRF
Paypal bug bounty: Updating the Paypal.me profile picture without consent (CSRF attack)
Hacking PayPal Accounts with one click (Patched)
Add tweet to collection CSRF
Facebookmarketingdevelopers.com: Proxies, CSRF Quandry and API Fun
JDWP Remote Code Execution in PayPal
XXE in OpenID: one bug to rule them all, or how I found a Remote Code Execution flaw affecting Facebook's servers
How I Hacked Facebook, and Found Someone's Backdoor Script
uber.com may RCE by Flask Jinja2 Template Injection
Yahoo Bug Bounty - *.login.yahoo.com Remote Code Execution
How we broke PHP, hacked Pornhub and earned $20,000
RCE deal to tricky file upload
WordPress SOME bug in plupload.flash.swf leading to RCE in Automatic
Read-Only user can execute arbitraty shell commands on AirOS
Remote Code Execution by impage upload!
Popping a shell on the Oculus developer portal
Crazy! PornHub RCE AGAIN!!! How I hacked Pornhub for fun and profit - 10,000$
PayPal Node.js code injection (RCE)
Java Deserialization in manager.paypal.com
Instagram's Million Dollar Bug
(Ruby Cookie Deserialization RCE on facebooksearch.algolia.com
Exploiting ImageMagick to get RCE on Polyvore (Yahoo Acquisition)
Exploting ImageMagick to get RCE on HackerOne
Trello bug bounty: Access server's files using ImageTragick
Trello bug bounty: The websocket receives data when a public company creates a team visible board
Trello bug bounty: Payments informations are sent to the webhook when a team changes its visibility
Change any user's password in Uber
Vulnerability in Youtube allowed moving comments from any video to another
Twitter Vulnerability Could Delete Credit Cards from Any Twitter Account
One Vulnerability allowed deleting comments of any user in all Yahoo sites
Microsoft-careers.com Remote Password Reset
How I could change your eBay password
Duo Security Researchers Uncover Bypass of PayPal’s Two-Factor Authentication
Hacking Facebook.com/thanks Posting on behalf of your friends!
How I got access to millions of [redacted] accounts
All Vimeo Private videos disclosure via Authorization Bypass with Excellent Technical Description
Urgent: attacker can access every data source on Bime
Downloading password protected / restricted videos on Vimeo
Get organization info base on uuid in Uber
How I Exposed your Primary Facebook Email Address (Bug worth $4500)
DOB disclosed using “Facebook Graph API Reverse Engineering”
Change the description of a video without publish_actions permission in Facebook
Response To Request Injection (RTRI)
Leak of all project names and all user names , even across applications on Harvest
Changing paymentProfileUuid when booking a trip allows free rides at Uber
How we got read access on Google’s production servers
Blind OOB XXE At UBER 26+ Domains Hacked
File Upload XSS in image uploading of App in mopub
RCE deal to tricky file upload
File Upload XSS in image uploading of App in mopub in Twitter
ESEA Server-Side Request Forgery and Querying AWS Meta Data
Race conditions on Facebook, DigitalOcean and others (fixed)
Race Conditions in Popular reports feature in HackerOne
Facebook simple technical hack to see the timeline
How I Could Steal Money from Instagram, Google and Microsoft
How I could have removed all your Facebook notes
Facebook - bypass ads account's roles vulnerability 2015
OneLogin authentication bypass on WordPress sites via XMLRPC in Uber
2FA PayPal Bypass
Twitter Overflow Trilogy in Twitter
Twitter CRLF
Adblock Plus and (a little) more in Google
Hijacking tons of Instapage expired users Domains & Subdomains
Reading Emails in Uber Subdomains
Slack Bug Journey
cc
Paul Veillard
Creative Commons Attribution 4.0 International License