Biscuit's Bug Bounty Playbook
  • ๐Ÿ‘‹Introduction to Biscuit's Bug Bounty Playbook
  • Mains
    • ๐ŸงพResume For Cyber Security Freshie
    • ๐Ÿ“—Browser extension For Bug Bounty
    • ๐Ÿ“€POC Videos YT Channel
    • ๐Ÿ“บ55 YouTube Channels To Learn Hacking
    • ๐Ÿ‘€Hackers to Follow on Social Media
      • Twitter
      • Medium
      • YouTube
      • GitHub
      • Discord Server
      • Security GitBooks
    • ๐Ÿ…Learn The Basics
      • ๐ŸŽ–๏ธType Of Cyber Security
      • ๐ŸฅˆCommon Job Roles
      • ๐Ÿฅ‰Get Started With InfoSec
      • โš•๏ธBest Bug Bounty Platform
      • ๐Ÿ—ž๏ธBest InfoSec Writeups Website
      • ๐ŸชHacking Books
      • ๐Ÿฅ‚CLI Commands
      • ๐Ÿ’ฟLearn WSL
    • ๐Ÿ‘ฉโ€๐Ÿ’ปFun Programming Codes
    • ๐Ÿ”ฎBuild your own Bug Bounty Methodology
    • ๐ŸŽดBug Bounty Checklist
  • Learn Android Bug Bounty
    • ๐ŸŽฅVideo Tutorials
  • โค๏ธYouTube Channels
  • ๐Ÿ“ฐBug Bounty Reports
  • ๐Ÿ“šBlogs & Writeups
  • ๐ŸนGitHub Repository
  • ๐Ÿ‘จโ€๐Ÿ‘จโ€๐Ÿ‘งConference Talks
  • ๐Ÿ–จ๏ธAutomated Scanners
  • โš™๏ธIntentionally Vulnerable Apps
  • ๐ŸŽฑLearn Drozer For Android Pentesting
  • ๐Ÿช€Learn Frida For Android Pentesting
  • ๐ŸˆBypassing Security Protections in APKs via Objection and Frida
  • ๐ŸชSecurity Tools For Android Pentesting
  • ๐ŸŽนCLI Commands & Shortcuts
  • Bug Bounty Reports & Articles
    • 0๏ธโƒฃIndex
    • 1๏ธโƒฃTakeover's (Accounts, Sub-domains, etc)
      • ๐ŸšกSub Domain Takeover
      • ๐Ÿš Account Takeover
      • ๐ŸšŸdependency confusion vulnerability
    • 2๏ธโƒฃIDOR (Indirect Object Reference)
    • 3๏ธโƒฃLeaks & Disclosure (PII, API Key, etc)
    • 4๏ธโƒฃOpen Redirects
    • 5๏ธโƒฃRequest Forgery (CSRF & SSRF)
      • ๐ŸŸขCSRF
      • ๐Ÿ”ดSSRF
    • 6๏ธโƒฃInjections (HTML, XSS, etc)
      • ๐ŸŸกXSS
      • ๐ŸŸ HTML Injection
      • โšซSQL Injection
      • ๐ŸŸฃCR/LF Injection
      • ๐ŸŸขSSTI
      • ๐Ÿ”ดHost Header Injection
      • ๐Ÿ”ตCSV Injection
    • 7๏ธโƒฃBroken Access Control & Broken Authentication
      • โš™๏ธFile Upload Functionality
      • โš™๏ธPassword Reset Functionality
      • โš™๏ธ2FA Functionality
      • โš™๏ธOauth Functionality
      • โš™๏ธBypassing
      • โš™๏ธMisconfiguration
      • โš™๏ธCaptcha Bypass
    • 8๏ธโƒฃWeb Socket
    • 9๏ธโƒฃMiscellaneous Reports
    • ๐ŸงปRole Management Issue
    • 0๏ธCloud
      • ๐ŸŒฉ๏ธAWS S3
    • 1๏ธLow Hanging Fruits
    • 2๏ธCache Vulnerabilities
    • 3๏ธDOS/DDOS
  • 4๏ธForced Browsing
  • Bug Bounty Platforms
    • ๐Ÿ›BugCrowd
    • ๐ŸžHackerOne
    • ๐ŸIntigriti
    • ๐ŸœOpen Bug Bounty
  • Exploiting Technologies
    • 0๏ธโƒฃIntroduction
    • 1๏ธโƒฃWordpress
    • 2๏ธโƒฃGraphQL API
    • 3๏ธโƒฃIDOR Vulnerability
Powered by GitBook
On this page
  1. Mains
  2. Learn The Basics

Hacking Books

Index
Book Name
Book Link
Interesting

1

Cyberjutsu

no

2

Black-Hat-Go

Yes

3

Violent Python

Yes

4

Black-Hat-Bash

Yes

5

BlackHat GraphQL

Yes

6

Bash Cheat Sheet

Yes

7

Rust-Programming

Yes

8

Make Python Talk

Yes

9

Zseanos Methodology

Yes

10

Bug Bounty Bootcamp

Yes

11

A Bug Hunter's Diary

no

12

JavaScript Security

No

13

Build an HTML5 Game

Yes

14

Red Team Field Manual

Yes

15

Blue Team Field Manual

Yes

16

The-Linux-Command-Line

Yes

17

Linux Basics for Hackers

Yes

18

Attacking Network Protocols

No

19

Hacking APIs - Early Access

Yes

20

Web Security For Developers

No

21

Pentesting Azure Applications

Yes

22

Black Hat Python, 2nd Edition

Yes

23

How Cybersecurity Really Works

no

24

Beyond-the-Basic-Stuff-with-Python

Yes

25

Learn Windows PowerShell in a Month of Lunches

Yes

26

Real-World Bug Hunting - A Field Guide to Web Hacking

Yes

27

Penetration Testing - A hands-on introduction to Hacking

Yes

28

The Hacker Playbook 3 - Practical Guide To Penetration Testing

no

29

Enumerating Esoteric Attack Surfaces by Jann Moon

no

30

Practical Packet Analysis

Yes

31

Wicked Cool Shell Scripts.pdf

Yes

32

Wicked Cool Perl Scripts

Yes

33

wicked-cool-ruby-scripts

Yes

34

perl-one-liners

Yes

35

the-book-of-ruby

Yes

36

Ruby by Example

no

37

PowerShell_for_Sysadmins

Yes

38

Webbots, Spiders, and Screen Scrapers

-

39

mining-social-media

Yes

40

How-Linux-Works

Yes

41

Mastering Modern Web Penetration Testing

no

42

The tangled Web a guide to securing modern Web applications

no

PreviousBest InfoSec Writeups WebsiteNextCLI Commands

Last updated 10 months ago

๐Ÿ…
๐Ÿช
Cyberjutsu
Black-Hat-Go
Violent Python
Black-Hat-Bash
BlackHat GraphQL
Bash Cheat Sheet
Rust-Programming
Make Python Talk
Zseanos Methodology
Bug Bounty Bootcamp
A Bug Hunter's Diary
JavaScript Security
Build an HTML5 Game
Red Team Field Manual
Blue Team Field Manual
The-Linux-Command-Line
Linux Basics for Hackers
Attacking Network Protocols
Hacking APIs - Early Access
Web Security For Developers
Pentesting Azure Applications
Black Hat Python, 2nd Edition
How Cybersecurity Really Works
Beyond-the-Basic-Stuff-with-Python
Learn Windows PowerShell in a Month of Lunches
Real-World Bug Hunting - A Field Guide to Web Hacking
Penetration Testing - A hands-on introduction to Hacking
The Hacker Playbook 3 - Practical Guide To Penetration Testing
Enumerating Esoteric Attack Surfaces by Jann Moon
Practical Packet Analysis
Wicked Cool Shell Scripts.pdf
Wicked Cool Perl Scripts
wicked-cool-ruby-scripts
perl-one-liners
the-book-of-ruby
Ruby by Example
PowerShell_for_Sysadmins
Webbots, Spiders, and Screen Scrapers
mining-social-media
How-Linux-Works
Mastering Modern Web Penetration Testing
The tangled Web a guide to securing modern Web applications