Biscuit's Bug Bounty Playbook
search
⌘Ctrlk
Biscuit's Bug Bounty Playbook
  • 👋Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • 🧾Resume For Cyber Security Freshie
    • 📗Browser extension For Bug Bounty
    • 📀POC Videos YT Channel
    • 📺55 YouTube Channels To Learn Hacking
    • 👀Hackers to Follow on Social Media
    • 🏅Learn The Basics
    • 👩‍💻Fun Programming Codes
    • 🔮Build your own Bug Bounty Methodology
    • 🎴Bug Bounty Checklist
    • 😼JS Analysis for Bug Bounty
  • 🟧Learn to Use Burp Suite
  • androidLearn Android Bug Bounty
    • 🎥Video Tutorials
  • ❤️YouTube Channels
  • 📰Bug Bounty Reports
  • 📚Blogs & Writeups
  • 🏹GitHub Repository
  • 👨‍👨‍👧Conference Talks
  • 🖨️Automated Scanners
  • ⚙️Intentionally Vulnerable Apps
  • 🎱Learn Drozer For Android Pentesting
  • 🪀Learn Frida For Android Pentesting
  • 🏈Bypassing Security Protections in APKs via Objection and Frida
  • 🪁Security Tools For Android Pentesting
  • 😼PIDCAT for Android Bug Bounty Logging
  • 🎹CLI Commands & Shortcuts
  • user-robotMy Android Bug Bounty Lab Setup
  • computerLearn Thick Client Pentesting
    • 🟥Introduction Videos
  • 📑Introduction Articles
  • ✅Pentesting Checklist
  • 📚Bug Bounty Writeups
  • 🐞Thick Client Vulnerabilities
  • 🥼Intentionally vulnerable labs
  • 🛠️Tools for Thick Client Pentesting
  • 🏠Bug Bounty Programs with Thick Client Scope
  • 💵Paid Udemy Course
  • Bug Bounty Reports & Articles
    • 0️⃣Index
    • 1️⃣Takeover's (Accounts, Sub-domains, etc)
    • 2️⃣IDOR (Indirect Object Reference)
    • 3️⃣Leaks & Disclosure (PII, API Key, etc)
    • 4️⃣Open Redirects
    • 5️⃣Request Forgery (CSRF & SSRF)
    • 6️⃣Injections (HTML, XSS, etc)
    • 7️⃣Broken Access Control & Broken Authentication
    • 8️⃣Web Socket
    • 9️⃣Miscellaneous Reports
    • 🔟IDN Homograph Attack
    • gearsWebSocket Writeups
    • 🧻User-Role Management Issue
    • 0️Cloud
    • 1️Low Hanging Fruits
    • 2️Cache Vulnerabilities
    • 3️DOS/DDOS
  • 4️Forced Browsing
  • 5️RCE
  • 6️OSINT
  • Bug Bounty Platforms
    • 🐛BugCrowd
    • 🐞HackerOne
    • 🐝Intigriti
    • 🐜Open Bug Bounty
  • Exploiting Technologies
    • 0️⃣Introduction
    • 1️⃣Wordpress
    • 2️⃣GraphQL API
    • 3️⃣IDOR Vulnerability
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Mains

😼JS Analysis for Bug Bounty

LogoHow to JS for Bug Bounty/Pentest : Edition 2023 - KongsecByteBloggerBasechevron-right
LogoHow to JS for Bug Bounties : Edition 2023Mediumchevron-right
LogoJS for Bug Bounties 2.0 Extreme Edition 2024Mediumchevron-right
LogoAll About JavaScript Analysis For Bug Bounty HuntingMediumchevron-right
LogoHow to URLing for Bug Bounties -Mastering URLs : Edition 2025Mediumchevron-right
LogoJS Recon To HTML Injection 😎Mediumchevron-right
LogoExposed Client Secret in JavaScript Resulted in Quick Bug Bounty $$$Mediumchevron-right
LogoJavaScript Analysis for Pentesterskpwn.dechevron-right
LogoJavascript for bug bounty hunters — part 1Mediumchevron-right
LogoJavascript for bug bounty hunters — part 2Mediumchevron-right
LogoJavascript for bug bounty hunters — part 3Mediumchevron-right

PreviousBug Bounty Checklistchevron-leftNextLearn to Use Burp Suitechevron-right

Last updated 1 month ago