- XSS Methodology
- CSRF Methodology
- Open Redirect Methodology
- Cache Poisoning Methodology
- Cache Deception Methodology
- JWT Methodology
- HPP Methodology
- https://pentester.land/writeups/
- https://portswigger.net/
- https://hackerone.com/hacktivity
- https://medium.com/tag/bug-bounty
- https://twitter.com/hashtag/Bugbounty?src=hashtag_click
- https://twitter.com/hashtag/bugbountytips?src=hashtag_click
- https://www.youtube.com/results?search_query=bug+bounty&sp=EgIIAw%253D%253D
- https://github.com/KathanP19/HowToHunt
- https://github.com/daffainfo/AllAboutBugBounty
- https://github.com/0xmaximus/Galaxy-Bugbounty-Checklist