# Presentations

| **Topic**                                                              | **Link**                                                                                                               |
| ---------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------- |
| BUG BOUNTY FUNSHOP                                                     | ​<https://docs.google.com/presentation/d/1cpcxEBEb0dyXwRqSWQ6bknJS-PQO_e242Dioy9SU2Io/edit#slide=id.g4715c86259_0_583> |
| Bug Hunting Methodology                                                | <https://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066>                                              |
| It is little things - Nahamsec                                         | <https://docs.google.com/presentation/d/1xgvEScGZ_ukNY0rmfKz1JN0sn-CgZY_rTp2B_SZvijk/edit#slide=id.g4052c4692d_0_1786> |
| Recon-1                                                                | <https://bugbountytuts.files.wordpress.com/2019/01/dirty-recon-1.pdf>                                                  |
| All in one Recon                                                       | <https://drive.google.com/file/d/1uBTra6_jwhLnZALJVp9hmHaty2pBBUH2/view>                                               |
| Automation for Bughunters                                              | <https://speakerdeck.com/mhmdiaa/automation-for-bug-hunters?slide=9>                                                   |
| Passivish Recon                                                        | <https://tomnomnom.com/talks/passiveish.pdf>                                                                           |
| Automating Application Security Bug Hunting                            | <https://static.sched.com/hosted_files/bsidessf2019/65/Automating%20Application%20Security%20Bug%20Hunting.pdf>        |
| BugBounty automation                                                   | <https://2018.zeronights.ru/wp-content/uploads/materials/4%20ZN2018%20WV%20-%20BugBounty%20automation.pdf>             |
| Automating Web Application Bug Hunting (Jerry Gamblin • Jonathan Cran) | <https://www.youtube.com/watch?v=12gtkYbMGd4>                                                                          |
| Work Smarter, Not Harder                                               | <https://vavkamil.cz/wp-content/uploads/2019/05/ctjb_2019_bugbounty.pdf>                                               |
| Automating-the-recon-process                                           | <https://null.community/event_sessions/2618-automating-the-recon-process>                                              |
| Scrutiny on the bug bounty                                             | <https://docs.google.com/presentation/d/1PCnjzCeklOeGMoWiE2IUzlRGOBxNp8K5hLQuvBNzrFY/edit#slide=id.p>                  |
| Bug Bounties With Bash                                                 | <https://tomnomnom.com/talks/bash-bug-bounty.pdf>                                                                      |
| ekoparty-2017-the-bug-hunters-methodology                              | <https://www.slideshare.net/bugcrowd/ekoparty-2017-the-bug-hunters-methodology>                                        |

* BugBounty Methodology by Jason Haddix

  | Version 1       | <https://github.com/jhaddix/tbhm/blob/master/How%20Do%20I%20shot%20Web-.pdf>                                         |
  | --------------- | -------------------------------------------------------------------------------------------------------------------- |
  | Version 2.0     | <https://docs.google.com/presentation/d/1p8QiqbGndcEx1gm4_d3ne2fqeTqCTurTC77Lxe82zLY/edit#slide=id.p>                |
  | Version 2.1     | <https://nullcon.net/website/archives/pdf/goa-2018/jason-tbhm2.pdf>                                                  |
  | Version 3       | <https://docs.google.com/presentation/d/1R-3eqlt31sL7_rj2f1_vGEqqb7hcx4vxX_L7E23lJVo/edit#slide=id.p>                |
  | Version 4       | <https://drive.google.com/file/d/1aG_qqRvNW-s5_8vvPk5rJiMSMeNL2uY9/view>                                             |
  | Version 4 Recon | <https://docs.google.com/presentation/d/1MWWXXRvvesWL8V-GiwGssvg4iDM58_RMeI_SZ65VXwQ/edit#slide=id.g89b65a088d_5_88> |
  | TBHM Video      | <https://www.youtube.com/watch?v=gIz_yn0Uvb8>                                                                        |

**VirSecCon Slides:**

```
https://docs.google.com/presentation/d/1Xfxr_zzwzczu0aKpxgYG8MzcT8zFlAmf7U_2C73NR1M/edit#slide=id.p16

https://tomnomnom.com/talks/bug-bounties-with-bash-virsec.pdf

https://docs.google.com/presentation/d/1DAQ47VjIaQZ88Ly00eGPQupq79hAF9AAZstV7OVCY_8/edit

https://docs.google.com/presentation/d/1f7yHnskJIl3O9GoZ4u_PHAnISRVaKoDb4V0CMRtNVRI/edit#slide=id.phttps://github.com/erbbysam/virseccon2020_presentation/blob/master/Trials,%20Tribulations%20&%20VHost%20Misconfigurations.pdf

https://www.ethicalhacker.net/wp-content/uploads/columns/editor/virseccon2020/Donzal-VirSecCon-2020-IoT-Hacking-Basics.pdf

https://docs.google.com/presentation/d/1-Qt4X5MNpDZSnbb1EWtKt7D26Plo--PL_nfMZKphY7w/edit#slide=id.p1

https://docs.google.com/presentation/d/e/2PACX-1vQXFAlzQctBpdeclp-rMCkflh-sNeVezktNqlwOoRMQxdAWNNlRsBUtlVHIIPDqu3hazL_UxDhShhEW/pub?slide=id.g742e3e7cd_1_16
```

**Nahamcon:**

{% embed url="<https://www.youtube.com/watch?v=MYsUhAgSgwc>" %}
