Presentations

This Page contains various presentations delivered at various conferences.

Topic

Link

BUG BOUNTY FUNSHOP

https://docs.google.com/presentation/d/1cpcxEBEb0dyXwRqSWQ6bknJS-PQO_e242Dioy9SU2Io/edit#slide=id.g4715c86259_0_583

Bug Hunting Methodology

https://blog.usejournal.com/bug-hunting-methodology-part-1-91295b2d2066

It is little things - Nahamsec

https://docs.google.com/presentation/d/1xgvEScGZ_ukNY0rmfKz1JN0sn-CgZY_rTp2B_SZvijk/edit#slide=id.g4052c4692d_0_1786

Recon-1

https://bugbountytuts.files.wordpress.com/2019/01/dirty-recon-1.pdf

All in one Recon

https://drive.google.com/file/d/1uBTra6_jwhLnZALJVp9hmHaty2pBBUH2/view

Automation for Bughunters

https://speakerdeck.com/mhmdiaa/automation-for-bug-hunters?slide=9

Passivish Recon

https://tomnomnom.com/talks/passiveish.pdf

Automating Application Security Bug Hunting

https://static.sched.com/hosted_files/bsidessf2019/65/Automating%20Application%20Security%20Bug%20Hunting.pdf

BugBounty automation

https://2018.zeronights.ru/wp-content/uploads/materials/4%20ZN2018%20WV%20-%20BugBounty%20automation.pdf

Automating Web Application Bug Hunting (Jerry Gamblin • Jonathan Cran)

https://www.youtube.com/watch?v=12gtkYbMGd4

Work Smarter, Not Harder

https://vavkamil.cz/wp-content/uploads/2019/05/ctjb_2019_bugbounty.pdf

Automating-the-recon-process

https://null.community/event_sessions/2618-automating-the-recon-process

Scrutiny on the bug bounty

https://docs.google.com/presentation/d/1PCnjzCeklOeGMoWiE2IUzlRGOBxNp8K5hLQuvBNzrFY/edit#slide=id.p

Bug Bounties With Bash

https://tomnomnom.com/talks/bash-bug-bounty.pdf

ekoparty-2017-the-bug-hunters-methodology

https://www.slideshare.net/bugcrowd/ekoparty-2017-the-bug-hunters-methodology

VirSecCon Slides:

https://docs.google.com/presentation/d/1Xfxr_zzwzczu0aKpxgYG8MzcT8zFlAmf7U_2C73NR1M/edit#slide=id.p16
https://tomnomnom.com/talks/bug-bounties-with-bash-virsec.pdf
https://docs.google.com/presentation/d/1DAQ47VjIaQZ88Ly00eGPQupq79hAF9AAZstV7OVCY_8/edit
https://docs.google.com/presentation/d/1f7yHnskJIl3O9GoZ4u_PHAnISRVaKoDb4V0CMRtNVRI/edit#slide=id.phttps://github.com/erbbysam/virseccon2020_presentation/blob/master/Trials,%20Tribulations%20&%20VHost%20Misconfigurations.pdf
https://www.ethicalhacker.net/wp-content/uploads/columns/editor/virseccon2020/Donzal-VirSecCon-2020-IoT-Hacking-Basics.pdf
https://docs.google.com/presentation/d/1-Qt4X5MNpDZSnbb1EWtKt7D26Plo--PL_nfMZKphY7w/edit#slide=id.p1
https://docs.google.com/presentation/d/e/2PACX-1vQXFAlzQctBpdeclp-rMCkflh-sNeVezktNqlwOoRMQxdAWNNlRsBUtlVHIIPDqu3hazL_UxDhShhEW/pub?slide=id.g742e3e7cd_1_16