Bug Bounty Reference is a curated collection of bug bounty write-ups organized by vulnerability type and exploitation technique. The resource categorizes documented security findings across multiple vulnerability classes including Cross-Site Scripting (XSS), SQL Injection (SQLi), XML External Entity (XXE), Remote Code Execution (RCE), deserialization flaws, Image Tragick vulnerabilities, Cross-Site Script Inclusion (XSSI), and Cross-Site Request Forgery (CSRF). The collection serves as a knowledge repository for security researchers and bug bounty hunters by providing real-world examples of vulnerability discovery and exploitation methodologies. Each write-up documents the technical details of how specific security flaws were identified, analyzed, and reported in actual bug bounty programs. The resource organizes content by vulnerability categories, making it easier for researchers to study specific types of security issues and understand common attack patterns. The write-ups include technical explanations of exploitation techniques, proof-of-concept demonstrations, and insights into the discovery process used by security researchers.
FEATURES
SIMILAR TOOLS
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
A comprehensive reference guide covering Nessus vulnerability scanner configuration, management, API usage, and best practices.
A comprehensive SQL injection cheat sheet covering various database management systems and techniques.
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A comprehensive guide to digital forensics and incident response, covering incident response frameworks, digital forensic techniques, and threat intelligence.
A curated collection of companies that have publicly disclosed adversary tactics, techniques, and procedures following security breaches.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.