Biscuit's Bug Bounty Playbook
Ctrlk
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • ๐Ÿ…Learn The Basics
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
    • ๐Ÿ˜ผJS Analysis for Bug Bounty
  • ๐ŸŸงLearn to Use Burp Suite
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐Ÿ˜ผPIDCAT for Android Bug Bounty Logging
  • ๐ŸŽนCLI Commands & Shortcuts
  • My Android Bug Bounty Lab Setup
  • Learn Thick Client Pentesting
    • ๐ŸŸฅIntroduction Videos
  • ๐Ÿ“‘Introduction Articles
  • โœ…Pentesting Checklist
  • ๐Ÿ“šBug Bounty Writeups
  • ๐ŸžThick Client Vulnerabilities
  • ๐ŸฅผIntentionally vulnerable labs
  • ๐Ÿ› ๏ธTools for Thick Client Pentesting
  • ๐Ÿ Bug Bounty Programs with Thick Client Scope
  • ๐Ÿ’ตPaid Udemy Course
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐Ÿ”ŸIDN Homograph Attack
    • ๐ŸงปUser-Role Management Issue
    • 0๏ธCloud
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • 5๏ธRCE
  • 6๏ธOSINT
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Mains
  2. ๐Ÿ‘€Hackers to Follow on Social Media

Security GitBooks

LogoIntroduction | Book of BugBounty Tipsgowsundar.gitbook.io
LogoIntroduction | Bug Hunter Handbookgowthams.gitbook.io
Logo/home/six2dez/.pentest-book | Pentest Bookpentestbook.six2dez.com
https://notes.learnsec101.com/101notes.learnsec101.com
LogoAPI-Sec | Sec-88sallam.gitbook.io
LogoInternal All The Thingsswisskyrepo.github.io
LogoPentesting Pocket Book for hackers and developers. | HackBook.iowww.hackbook.io
LogoAll of the Best Links and Resources on Cyber Security. | s0cm0nkey's Security Reference Guides0cm0nkey.gitbook.io
LogoHowToHunt.md | HowToHuntkathan19.gitbook.io
LogoThe Hacker Recipeswww.thehacker.recipes
LogoPentesting - SecurityBoat Workbookworkbook.securityboat.net
LogoTalkbackTalkback
PreviousDiscord ServerNextLearn The Basics

Last updated 1 year ago