Biscuit's Bug Bounty Playbook
Ctrlk
  • 👋Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • 🧾Resume For Cyber Security Freshie
    • 📗Browser extension For Bug Bounty
    • 📀POC Videos YT Channel
    • 📺55 YouTube Channels To Learn Hacking
    • 👀Hackers to Follow on Social Media
    • 🏅Learn The Basics
    • 👩‍💻Fun Programming Codes
    • 🔮Build your own Bug Bounty Methodology
    • 🎴Bug Bounty Checklist
    • 😼JS Analysis for Bug Bounty
  • 🟧Learn to Use Burp Suite
  • Learn Android Bug Bounty
    • 🎥Video Tutorials
  • ❤️YouTube Channels
  • 📰Bug Bounty Reports
  • 📚Blogs & Writeups
  • 🏹GitHub Repository
  • 👨‍👨‍👧Conference Talks
  • 🖨️Automated Scanners
  • ⚙️Intentionally Vulnerable Apps
  • 🎱Learn Drozer For Android Pentesting
  • 🪀Learn Frida For Android Pentesting
  • 🏈Bypassing Security Protections in APKs via Objection and Frida
  • 🪁Security Tools For Android Pentesting
  • 😼PIDCAT for Android Bug Bounty Logging
  • 🎹CLI Commands & Shortcuts
  • My Android Bug Bounty Lab Setup
  • Learn Thick Client Pentesting
    • 🟥Introduction Videos
  • 📑Introduction Articles
  • ✅Pentesting Checklist
  • 📚Bug Bounty Writeups
  • 🐞Thick Client Vulnerabilities
  • 🥼Intentionally vulnerable labs
  • 🛠️Tools for Thick Client Pentesting
  • 🏠Bug Bounty Programs with Thick Client Scope
  • 💵Paid Udemy Course
  • Bug Bounty Reports & Articles
    • 0️⃣Index
    • 1️⃣Takeover's (Accounts, Sub-domains, etc)
    • 2️⃣IDOR (Indirect Object Reference)
    • 3️⃣Leaks & Disclosure (PII, API Key, etc)
    • 4️⃣Open Redirects
    • 5️⃣Request Forgery (CSRF & SSRF)
    • 6️⃣Injections (HTML, XSS, etc)
    • 7️⃣Broken Access Control & Broken Authentication
    • 8️⃣Web Socket
    • 9️⃣Miscellaneous Reports
    • 🔟IDN Homograph Attack
    • 🧻User-Role Management Issue
    • 0️Cloud
    • 1️Low Hanging Fruits
    • 2️Cache Vulnerabilities
    • 3️DOS/DDOS
  • 4️Forced Browsing
  • 5️RCE
  • 6️OSINT
  • Bug Bounty Platforms
    • 🐛BugCrowd
    • 🐞HackerOne
    • 🐝Intigriti
    • 🐜Open Bug Bounty
  • Exploiting Technologies
    • 0️⃣Introduction
    • 1️⃣Wordpress
    • 2️⃣GraphQL API
    • 3️⃣IDOR Vulnerability
Powered by GitBook
On this page
  1. Mains

😼JS Analysis for Bug Bounty

LogoHow to JS for Bug Bounty/Pentest : Edition 2023 - KongsecByteBloggerBase
LogoHow to JS for Bug Bounties : Edition 2023Medium
LogoJS for Bug Bounties 2.0 Extreme Edition 2024Medium
LogoAll About JavaScript Analysis For Bug Bounty HuntingMedium
LogoHow to URLing for Bug Bounties -Mastering URLs : Edition 2025Medium
LogoJS Recon To HTML Injection 😎Medium
LogoExposed Client Secret in JavaScript Resulted in Quick Bug Bounty $$$Medium
LogoJavaScript Analysis for Pentesterskpwn.de
LogoJavascript for bug bounty hunters — part 1Medium
LogoJavascript for bug bounty hunters — part 2Medium
LogoJavascript for bug bounty hunters — part 3Medium

PreviousBug Bounty ChecklistNextLearn to Use Burp Suite

Last updated 2 days ago