Biscuit's Bug Bounty Playbook
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • ๐Ÿ…Learn The Basics
      • ๐ŸŽ–๏ธType Of Cyber Security
      • ๐ŸฅˆCommon Job Roles
      • ๐Ÿฅ‰Get Started With InfoSec
      • โš•๏ธBest Bug Bounty Platform
      • ๐Ÿ—ž๏ธBest InfoSec Writeups Website
      • ๐ŸชHacking Books
      • ๐Ÿฅ‚CLI Commands
      • ๐Ÿ’ฟLearn WSL
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐ŸŽนCLI Commands & Shortcuts
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
      • ๐ŸšกSub Domain Takeover
      • ๐Ÿš Account Takeover
      • ๐ŸšŸdependency confusion vulnerability
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
      • ๐ŸŸขCSRF
      • ๐Ÿ”ดSSRF
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
      • ๐ŸŸกXSS
      • ๐ŸŸ HTML Injection
      • โšซSQL Injection
      • ๐ŸŸฃCR/LF Injection
      • ๐ŸŸขSSTI
      • ๐Ÿ”ดHost Header Injection
      • ๐Ÿ”ตCSV Injection
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
      • โš™๏ธFile Upload Functionality
      • โš™๏ธPassword Reset Functionality
      • โš™๏ธ2FA Functionality
      • โš™๏ธOauth Functionality
      • โš™๏ธBypassing
      • โš™๏ธMisconfiguration
      • โš™๏ธCaptcha Bypass
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐ŸงปRole Management Issue
    • 0๏ธCloud
      • ๐ŸŒฉ๏ธAWS S3
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Mains
  2. Hackers to Follow on Social Media

YouTube

YouTube offers a visual and auditory learning experience. Watching video tutorials and demonstrations makes complex concepts easier to understand and apply.

Username
Profile URL

0x61

BePracticalTech

BittenTech

BringusStudios

BruceTetsuya

BugBountyReportsExplained

BugHuntingPoc

CodeWithHarry

CosmodiumCS

CyberFlow10

CyberYodha

EngineerMan

Hac1337

HackerSploit

InsiderPhD

JoeGrand

LeetCipher

Linuxndroid

LiveOverflow

LoiLiangYang

LokmatHindi

MrBeast

NahamSec

NetworkChuck

NeuralNine

NickDiGiovanni

NileRed

PwnFunction

RealEngineering

STOKfredrik

SankalpaBaral1337

ShashwatMaheshwari

TCMSecurityAcademy

TechAltar

TechRaj156

TheCyberExpert

Virdoex

WebWonders1

XSSLover

_CryptoCat

_JohnHammond

abhishekmorla1

an0n_ali

bugbountypoc395

cangetrootacccess

codeprefer9108

collinsinfosec

criticalthinkingpodcast

cybertix

davidbombal

defronix

dream

esharmaji

ezsnippat

firstindiatv

freecodecamp

hackbin0007

hackerhaltLiveTarget

intigriti

ippsec

jasminetea11

jaylikesmakingthings222

mah3sec

noobsanetworkchuckpodcast3009

rs0n_live

ryan_phdsec

stuffhai

tadii

techiehunter08

vivekverma5467

PreviousMediumNextGitHub

Last updated 11 months ago

๐Ÿ‘€
youtube.com/@0x61
youtube.com/@BePracticalTech
youtube.com/@BittenTech
youtube.com/@BringusStudios
youtube.com/@BruceTetsuya
youtube.com/@BugBountyReportsExplained
youtube.com/@BugHuntingPoc
youtube.com/@CodeWithHarry
youtube.com/@CosmodiumCS
youtube.com/@CyberFlow10
youtube.com/@CyberYodha
youtube.com/@EngineerMan
youtube.com/@Hac1337
youtube.com/@HackerSploit
youtube.com/@InsiderPhD
youtube.com/@JoeGrand
youtube.com/@LeetCipher
youtube.com/@Linuxndroid
youtube.com/@LiveOverflow
youtube.com/@LoiLiangYang
youtube.com/@LokmatHindi
youtube.com/@MrBeast
youtube.com/@NahamSec
youtube.com/@NetworkChuck
youtube.com/@NeuralNine
youtube.com/@NickDiGiovanni
youtube.com/@NileRed
youtube.com/@PwnFunction
youtube.com/@RealEngineering
youtube.com/@STOKfredrik
youtube.com/@SankalpaBaral1337
youtube.com/@ShashwatMaheshwari
youtube.com/@TCMSecurityAcademy
youtube.com/@TechAltar
youtube.com/@TechRaj156
youtube.com/@TheCyberExpert
youtube.com/@Virdoex
youtube.com/@WebWonders1
youtube.com/@XSSLover
youtube.com/@_CryptoCat
youtube.com/@_JohnHammond
youtube.com/@abhishekmorla1
youtube.com/@an0n_ali
youtube.com/@bugbountypoc395
youtube.com/@cangetrootacccess
youtube.com/@codeprefer9108
youtube.com/@collinsinfosec
youtube.com/@criticalthinkingpodcast
youtube.com/@cybertix
youtube.com/@davidbombal
youtube.com/@defronix
youtube.com/@dream
youtube.com/@esharmaji
youtube.com/@ezsnippat
youtube.com/@firstindiatv
youtube.com/@freecodecamp
youtube.com/@hackbin0007
youtube.com/@hackerhaltLiveTarget
youtube.com/@intigriti
youtube.com/@ippsec
youtube.com/@jasminetea11
youtube.com/@jaylikesmakingthings222
youtube.com/@mah3sec
youtube.com/@noobsanetworkchuckpodcast3009
youtube.com/@rs0n_live
youtube.com/@ryan_phdsec
youtube.com/@stuffhai
youtube.com/@tadii
youtube.com/@techiehunter08
youtube.com/@vivekverma5467