Biscuit's Bug Bounty Playbook
Ctrlk
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
    • ๐Ÿ…Learn The Basics
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
    • ๐Ÿ˜ผJS Analysis for Bug Bounty
  • ๐ŸŸงLearn to Use Burp Suite
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐Ÿ˜ผPIDCAT for Android Bug Bounty Logging
  • ๐ŸŽนCLI Commands & Shortcuts
  • My Android Bug Bounty Lab Setup
  • Learn Thick Client Pentesting
    • ๐ŸŸฅIntroduction Videos
  • ๐Ÿ“‘Introduction Articles
  • โœ…Pentesting Checklist
  • ๐Ÿ“šBug Bounty Writeups
  • ๐ŸžThick Client Vulnerabilities
  • ๐ŸฅผIntentionally vulnerable labs
  • ๐Ÿ› ๏ธTools for Thick Client Pentesting
  • ๐Ÿ Bug Bounty Programs with Thick Client Scope
  • ๐Ÿ’ตPaid Udemy Course
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐Ÿ”ŸIDN Homograph Attack
    • ๐ŸงปUser-Role Management Issue
    • 0๏ธCloud
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • 5๏ธRCE
  • 6๏ธOSINT
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Bug Bounty Reports & Articles

3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)

LogoHunting JavaScript File for Bug HuntersMedium
https://medium.com/@realm3ter/analyzing-javascript-files-to-find-bugs-820167476ffemedium.com
LogoHow to look for JS files Vulnerability for fun and profit?Medium
LogoGit Directory Exposed Leads to Credentials DisclosureMedium
LogoJS for Bug Bounties 2.0 Extreme Edition 2024Medium
LogoJS is love โค๏ธ.Medium
Logo25+ users sensitive information disclosed by waybackurlsMedium
LogoInformation DisclosureMedium
LogoPlaintext Storage of a Password Lead to sensitive data leakageMedium
LogoThis is the easiest bug you can find right now.Medium
LogoIDOR lead to PII DisclosureMedium
LogoUnauthenticated Massive PII LeakMedium
LogoLogitech disclosed on HackerOne: Sensitive information disclosure...HackerOne
LogoDeriv.com disclosed on HackerOne: login to any user's cashier...HackerOne
LogoX / xAI disclosed on HackerOne: Information Disclosure through...HackerOne
LogoInformation Disclosure: Story of 500โ‚ฌ + 400$ BountyMedium
LogoP1 Vulnerability in 60 secondsMedium
LogoHow I Found a Bug under 3 minsย , that could risk the reputation of an entire organisationย !Medium
LogoHow to find the Origin IPMedium
https://0xk4tedu.medium.com/how-i-can-easily-get-four-p1-at-nasa-using-simple-google-dorking-d4457bec19710xk4tedu.medium.com
LogoHow I Discovered a PII Leak in a Developer PlatformMedium
PreviousIDOR (Indirect Object Reference)NextOpen Redirects

Last updated 1 month ago