/awesome-bug-bounty

A curated list of resources, tools, and wordlists for bug bounty hunters.

Creative Commons Zero v1.0 UniversalCC0-1.0

Awesome Bug Bounty Awesome

A curated list of resources, tools, and wordlists for bug bounty hunters.

Table of Contents

Bug Bounty Notes

  • Buggy Note - Bug Bounty Notes For Beginners.
  • Methodology- A bug Bounty Methodology on How to Hunt on Targets.

Bug Bounty Roadmap

Platforms

  • HackerOne - Bug bounty platform connecting businesses with security researchers.
  • Bugcrowd - Platform for bug bounty and vulnerability disclosure programs.
  • Synack - Managed security testing platform.
  • Open Bug Bounty - Non-profit bug bounty platform.
  • Intigriti - European bug bounty platform.
  • YesWeHack - Bug bounty platform offering a wide range of programs.

Tools

Active Recon

  • Nmap - Network exploration and security auditing tool.
  • Nessus - Vulnerablity Scanner.
  • OpenVAS - OpenVAS is a full-featured vulnerability scanner.

Passive Recon

  • Wireshark - The world's most popular network protocol analyzer.
  • Google Dorks - Google Dork.
  • Pentest Tool - This tool combines passive and active discovery methods to help you research the subdomains.
  • SubDomain Finder - A subdomain finder is a tool used to find the subdomains of a given domain.
  • VirusTotal - Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches.
  • Shodan - Search Engine for the Internet of everything.
  • Crt.sh - Get Info of Domain Name,Sub Domains, Ip address, Organization Name, etc.
  • Kitterman - These tools are meant to help you to find SPF records for your target.

Other Tools

  • Burp Suite - Leading tool for web application security testing.
  • OWASP ZAP - Free security tool for finding vulnerabilities in web applications.
  • Sublist3r - Fast subdomains enumeration tool for penetration testers.
  • Amass - In-depth DNS enumeration and network mapping.
  • SQLMap - Automatic SQL injection and database takeover tool.
  • Recon-ng - Full-featured web reconnaissance framework.
  • Nikto - Web server scanner that detects vulnerabilities and misconfigurations.
  • Metasploit - Comprehensive penetration testing framework.
  • XSSer - An automatic framework to detect and report XSS vulnerabilities.

Wordlists

Payloads

Learning Resources

Blogs and Write-ups

Books

VPS

Conferences and Talks

  • Black Hat - Information security conference with a focus on technical research.
  • DEF CON - One of the world's largest and most notable hacker conventions.
  • OWASP Global AppSec - Conference focused on application security.
  • Recon Village - Village at DEF CON focusing on reconnaissance.

Communities

Contributing

I want contributing to this awesome list to be as simple as possible. Just:

  1. Fork the repository.
  2. Add your changes to the list.
  3. Add yourself to CONTRIBUTORS.md.
  4. Submit a PR.

Thank you for contributing!

Contributors

To add your name to this list, please follow the contributing guidelines.

Core Team

License

This repository is licensed under the CC0 1.0 Universal (CC0 1.0) Public Domain Dedication. For more information, see the LICENSE file or visit the Creative Commons website.