# Build your own Bug Bounty Methodology

{% hint style="success" %}
While reading All these methodologies I made notion page for each Article/Video so I can document what tool they used ? what they did first ? how they select there program ? etc
{% endhint %}

<figure><img src="https://2149034102-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2Fx5ELyXksPQAu9xsTpTXg%2Fuploads%2Fb3GxPXDtCzogrxnPq8In%2Fimage.png?alt=media&#x26;token=790b10df-ee70-4046-b52e-a7bc57d393ca" alt=""><figcaption></figcaption></figure>

## Content of table

| Platform                                        | Number of Methodologies |
| ----------------------------------------------- | ----------------------- |
| <ol><li>Medium/Infosec (Article/Blog)</li></ol> | 20                      |
| <ol start="2"><li>YouTube (Videos)</li></ol>    | 39                      |
| <ol start="3"><li>Github Repository</li></ol>   | 4                       |

## Articles/Writeups

{% embed url="<https://infosecwriteups.com/what-to-do-after-choosing-a-target-part-01-bug-bounty-0e7eda23d324>" %}

{% embed url="<https://infosecwriteups.com/part-02-what-to-do-after-choosing-a-target-bug-bounty-eb8d73ee73ee>" %}

{% embed url="<https://infosecwriteups.com/part-03-what-to-do-after-choosing-a-target-post-recon-bug-bounty-1a7f431b4d79>" %}

{% embed url="<https://infosecwriteups.com/main-methodology-1-part-04-what-to-do-after-choosing-a-target-f9cea586d6af>" %}

***

{% embed url="<https://shubhamrooter.medium.com/deep-subdomains-enumeration-methodology-da606be0c4c3>" %}

{% embed url="<https://www.freedium.cfd/https://medium.com/@loyalonlytoday/finding-more-subdomains-1f5221e79310>" %}

{% embed url="<https://shubhamrooter.medium.com/best-recon-methodology-shubham-rooter-dcdca8d4caa4>" %}

***

{% embed url="<https://infosecsanyam.medium.com/web-application-security-bug-bounty-methodology-reconnaissance-vulnerabilities-reporting-635073cddcf2>" %}

***

{% embed url="<https://apexvicky.medium.com/bug-bounty-methodology-bug-hunting-checklist-part-1-3274ad868209>" %}

{% embed url="<https://apexvicky.medium.com/bug-bounty-methodology-bug-hunting-checklist-part-2-4e546533245>" %}

{% embed url="<https://apexvicky.medium.com/bug-bounty-how-to-approach-vulnerabilities-part-1-47e211331386>" %}

***

{% embed url="<https://medium.com/@trapp3rhat/bug-hunting-methodology-part-1-91295b2d2066>" %}

{% embed url="<https://medium.com/@trapp3rhat/bug-hunting-methodology-part-2-5579dac06150>" %}

{% embed url="<https://medium.com/@trapp3rhat/bug-hunting-methodology-part-3-457eaf9768a5>" %}

***

{% embed url="<https://medium.com/@batuhanaydinn/bug-bounty-hunter-recon-is-everything-part-1-6ba24a100c13>" %}

***

{% embed url="<https://pentestbook.six2dez.com/>" %}

***

{% embed url="<https://infosecwriteups.com/cool-recon-techniques-every-hacker-misses-1c5e0e294e89>" %}

{% embed url="<https://infosecwriteups.com/cool-recon-techniques-every-hacker-misses-episode-2-8024e8338756>" %}

{% embed url="<https://infosecwriteups.com/cool-recon-techniques-every-hacker-misses-episode-3-3812e7da3425>" %}

***

{% embed url="<https://infosecwriteups.com/how-i-hack-web-applications-part-1-0833c002cc9a>" %}

{% embed url="<https://orwaatyat.medium.com/my-methodology-in-recon-and-find-bugs-my-methodology-in-hunting-using-phone-ccc9fe06dd2d>" %}

***

## YT Videos

{% embed url="<https://www.youtube.com/watch?v=KqpqF-v6rnE>" %}

***

{% embed url="<https://www.youtube.com/watch?v=SsvN3JQJB14>" %}

{% embed url="<https://www.youtube.com/watch?v=45pUF7KSdSo>" %}

{% embed url="<https://www.youtube.com/watch?v=Q4prja3FIic>" %}

{% embed url="<https://www.youtube.com/watch?v=gk-JnkFC720>" %}

{% embed url="<https://www.youtube.com/watch?v=BAENGoIEDdA&t=1s>" %}

{% embed url="<https://www.youtube.com/watch?v=mCCkaomJ-XI>" %}

***

{% embed url="<https://www.youtube.com/watch?v=gG-WzTD_Mg8>" %}

{% embed url="<https://www.youtube.com/watch?v=QjCTIQtbWZA>" %}

{% embed url="<https://www.youtube.com/watch?v=02q2edRe2Kk>" %}

{% embed url="<https://www.youtube.com/watch?v=mhxajMabyX0>" %}

{% embed url="<https://www.youtube.com/watch?v=hrbW7XsBeQM>" %}

***

{% embed url="<https://www.youtube.com/watch?v=MIujSpuDtFY&list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA&index=10>" %}

{% embed url="<https://www.youtube.com/watch?v=Iapvq-oOaK8&list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA&index=12>" %}

{% embed url="<https://www.youtube.com/watch?v=4BtJic9TUCI&list=PLKAaMVNxvLmAkqBkzFaOxqs3L66z2n8LA&index=11>" %}

***

{% embed url="<https://www.youtube.com/watch?v=J3WjdXytvpc&t=636s>" %}

***

{% embed url="<https://www.youtube.com/@BePracticalTech>" %}

{% embed url="<https://www.youtube.com/watch?v=OPVceQH8MNU>" %}

{% embed url="<https://www.youtube.com/watch?v=K6wr-qyC-lo>" %}

***

{% embed url="<https://www.youtube.com/@lostsecc/videos>" %}

{% embed url="<https://www.youtube.com/watch?v=i9kR2bFvHI0>" %}

{% embed url="<https://www.youtube.com/watch?v=fMgjmhxN9uI>" %}

{% embed url="<https://www.youtube.com/watch?v=XIbB01f-ULQ>" %}

{% embed url="<https://www.youtube.com/watch?v=KRpV_fnRjio&t=3s>" %}

***

{% embed url="<https://www.youtube.com/watch?v=wP3n1JnqtMU>" %}

{% embed url="<https://www.youtube.com/watch?v=zDB-SdT6_FI>" %}

{% embed url="<https://www.youtube.com/watch?v=nPZ4VFiIwDM>" %}

{% embed url="<https://www.youtube.com/watch?v=lUUL2dNQI5M>" %}

{% embed url="<https://www.youtube.com/watch?v=ukb79vAgRiY>" %}

{% embed url="<https://www.youtube.com/watch?v=4-v8kbbR7Dw>" %}

{% embed url="<https://www.youtube.com/watch?v=BmhtZcNrZOc&t=1s>" %}

{% embed url="<https://www.youtube.com/watch?v=UuzjH-sDgsU&t=576s>" %}

{% embed url="<https://www.youtube.com/watch?v=0v1CTSyRpMU>" %}

{% embed url="<https://www.youtube.com/watch?v=mHXy07g_o5k>" %}

{% embed url="<https://www.youtube.com/watch?v=oMTO4hAZPl0&t=461s>" %}

{% embed url="<https://www.youtube.com/watch?v=Se_eYMSPMEU&t=26s>" %}

{% embed url="<https://www.youtube.com/watch?v=-HIwTEp_oMQ&t=237s>" %}

{% embed url="<https://www.youtube.com/watch?v=Azn0twesqdA&t=489s>" %}

***

## GitHub

{% embed url="<https://github.com/daffainfo/AllAboutBugBounty>" %}

{% embed url="<https://github.com/sehno/Bug-bounty>" %}

{% embed url="<https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters>" %}

{% embed url="<https://github.com/bittentech/Bug-Bounty-Beginner-Roadmap>" %}
