Bug Hunter Handbook
Ctrlk
  • Introduction
  • Getting Started in InfoSec and Bug Bounties.
  • Presentations
  • Checklists / Guides
  • Useful Twitter Threads
  • List of Vulnerabilities
  • Approach
  • API Security
  • Mobile Security
  • Fuzzing / Wordlists
  • BugBounty Short Write-ups
  • Burp Suite Tips and Tricks
  • HackerOne Reports
  • Response Manipulation
  • Client Vs Server Side Vulnerabilities
  • DevSecOps
  • Containers
  • AWS
  • Azure
  • Others
  • Chaining of Bugs
  • Bug Bounty Automation
  • Mindmaps
  • Oneliner Collections
  • Red Teaming
  • Blue Teamining
  • Recon One Liners
  • Misc
  • Wordpress
  • Fuzzing / FuFF
  • OWASP ZAP
  • Bug List
  • Setting up burp collaborator
  • Admin Panel PwN
  • Credential Stuffing / Dump / HaveibeenPwned?
  • Tools Required
  • Nuclei Template
  • Other BugBounty Repos / Tips
  • Interview
  • Threat Modelling
  • AppSec
Powered by GitBook
On this page

Was this helpful?

Useful Twitter Threads

  • Common ways to RCE - https://twitter.com/Rhynorater/status/1115611217916321793

  • BugBountytip - https://twitter.com/s0md3v/status/1119678625706463232

  • Recon - https://twitter.com/stokfredrik/status/1109733020540567555

  • Chaining of Bugs - https://twitter.com/intigriti/status/1146376517284499456

  • https://twitter.com/stokfredrik/status/1147461237359415298

  • https://twitter.com/hakluke/status/1183314554874318849?

  • Tips - https://twitter.com/CalumBoal/status/1165191825839349760

  • https://twitter.com/pdp/status/1211949144304164864 - List of descriptions for bugs

  • Learn Python = https://twitter.com/humanhacker/status/1225061560302866432

  • List of conference - https://twitter.com/SandboxBear/status/1225682764617240587

  • Infosec Books - https://twitter.com/stokfredrik/status/1145030457442148357

PreviousChecklists / GuidesNextList of Vulnerabilities

Last updated 4 years ago

Was this helpful?