A curated list of resources, tools, and wordlists for bug bounty hunters.
- Notes
- Roadmap
- Platforms
- Tools
- Wordlists
- Payloads
- Learning Resources
- Blogs and Write-ups
- Books
- VPS
- Conferences and Talks
- Communities
- Contributing
- Contributors
- Buggy Note - Bug Bounty Notes For Beginners.
- Methodology- A bug Bounty Methodology on How to Hunt on Targets.
- Cyberhub Roadmap - Bug bounty Roadmap by The cyber Hub.
- HackerOne - Bug bounty platform connecting businesses with security researchers.
- Bugcrowd - Platform for bug bounty and vulnerability disclosure programs.
- Synack - Managed security testing platform.
- Open Bug Bounty - Non-profit bug bounty platform.
- Intigriti - European bug bounty platform.
- YesWeHack - Bug bounty platform offering a wide range of programs.
- Nmap - Network exploration and security auditing tool.
- Nessus - Vulnerablity Scanner.
- OpenVAS - OpenVAS is a full-featured vulnerability scanner.
- Wireshark - The world's most popular network protocol analyzer.
- Google Dorks - Google Dork.
- Pentest Tool - This tool combines passive and active discovery methods to help you research the subdomains.
- SubDomain Finder - A subdomain finder is a tool used to find the subdomains of a given domain.
- VirusTotal - Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches.
- Shodan - Search Engine for the Internet of everything.
- Crt.sh - Get Info of Domain Name,Sub Domains, Ip address, Organization Name, etc.
- Kitterman - These tools are meant to help you to find SPF records for your target.
- Burp Suite - Leading tool for web application security testing.
- OWASP ZAP - Free security tool for finding vulnerabilities in web applications.
- Sublist3r - Fast subdomains enumeration tool for penetration testers.
- Amass - In-depth DNS enumeration and network mapping.
- SQLMap - Automatic SQL injection and database takeover tool.
- Recon-ng - Full-featured web reconnaissance framework.
- Nikto - Web server scanner that detects vulnerabilities and misconfigurations.
- Metasploit - Comprehensive penetration testing framework.
- XSSer - An automatic framework to detect and report XSS vulnerabilities.
- SecLists - Collection of multiple types of lists used during security assessments.
- Probable-Wordlists - Wordlists derived from probable password patterns.
- Assetnote Wordlists - Wordlists for automated and manual security testing.
- PayloadsAllTheThings - A list of useful payloads and bypasses for web application security.
- PdfExploits - Collection of XSS PDF Exploits.
- Image XSS Payload - Collection of XSS Payload Binded in Images.
- All Type of Payload - Collection of All type of payload XSS,SQL,Directory Traversal,Fuzzing etc. -Advanced XSS - List of Advanced XSS Payloads.
- XSS Payload List - Collection of XSS payloads for testing.
- Superbug's Payloads - Repository of various payloads for different attacks.
- Offensive Payloads - Collection of offensive payloads for penetration testing.
- Can I Take Over XYZ? - A list of services and how to claim (sub)domains with dangling DNS records.
- PortSwigger XSS Cheat Sheet - Comprehensive cheat sheet for XSS.
- XSS Bypass Filters - Collection of techniques to bypass XSS filters.
- Vulnerability Checklist - Checklist for common vulnerabilities and how to test for them.
- PortSwigger Web Security Academy - Free training on web security vulnerabilities.
- Hacker101 - Free video lessons and resources for learning how to hack.
- Bugcrowd University - Free educational content on security testing.
- OWASP Top Ten - Standard awareness document for developers and web application security.
- HackerOne Hacktivity - Publicly disclosed reports and write-ups from HackerOne.
- Bugcrowd Blog - Articles and updates from Bugcrowd.
- Intigriti Blog - Insights and write-ups from Intigriti.
- Pentester Land - Curated list of bug bounty write-ups and resources.
- The Web Application Hacker's Handbook - Comprehensive guide to web application security testing.
- Bug Bounty Hunting Essentials - Guide to discovering and reporting vulnerabilities to earn bug bounties.
- Real-World Bug Hunting - Field guide to finding software vulnerabilities.
- Ok-VPS - Bug Bounty Vps Setup Tools.
- Coffin Bughunting Tool - Bug Bounty hunting tool for Vps.
- Black Hat - Information security conference with a focus on technical research.
- DEF CON - One of the world's largest and most notable hacker conventions.
- OWASP Global AppSec - Conference focused on application security.
- Recon Village - Village at DEF CON focusing on reconnaissance.
- Bug Bounty Forum - Community forum for bug bounty hunters.
- HackerOne Community - Community of security researchers and ethical hackers.
- Bugcrowd Discord - Official Bugcrowd Discord server.
I want contributing to this awesome list to be as simple as possible. Just:
- Fork the repository.
- Add your changes to the list.
- Add yourself to
CONTRIBUTORS.md
. - Submit a PR.
Thank you for contributing!
To add your name to this list, please follow the contributing guidelines.
This repository is licensed under the CC0 1.0 Universal (CC0 1.0) Public Domain Dedication. For more information, see the LICENSE file or visit the Creative Commons website.