Zen
search
⌘Ctrlk
Zen
  • hand-waveHome
  • Content
    • linkResources
      • diagram-sankeyPaths
      • graduation-capLearning Platforms
        • bookCourses and documentation
        • rulerIndustry norms and references
        • pen-to-squareWriteups, walkthrough, reports
        • pencilNote-taking
        • toolboxTools
        • newspaperNews
        • podcastPodcasts
        • user-hoodieHacking (practical)
        • flag-pennantCTFs and other challenges
        • treasure-chestBug Bounty
      • lightbulb-onMethodologies
      • user-plusAccounts to follow
      • earth-africaCommunities
      • calendar-daysEvents
      • file-certificateCertifications
      • briefcase-blankJob Search
    • subtitlesWrite-ups
    • pen-rulerProjects
  • square-rssBlog
  • square-userAbout me
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Contentchevron-right
  2. linkResourceschevron-right
  3. graduation-capLearning Platforms

treasure-chestBug Bounty

Bug bounty is another way for people who work in offensive security to make money and also practice their skills. Companies will set up "assignments" on these platforms with the pay, the scope...

Bug Bounty Hunterarrow-up-right: A platform offering resources, guides, and tools to help individuals get started and succeed in bug bounty programs.

Platforms :

  • Bugcrowd Hackersarrow-up-right

  • ​ ​HackerOnearrow-up-right

  • Intigritiarrow-up-right

  • YesWeHackarrow-up-right

  • Synackarrow-up-right

  • HackenProofarrow-up-right

  • Open Bug Bountyarrow-up-right

  • Immunefiarrow-up-right

  • Cobaltarrow-up-right

  • Zerocopterarrow-up-right

  • Yogoshaarrow-up-right

  • SafeHatsarrow-up-right

  • Hacktrophyarrow-up-right

  • Nordic Defenderarrow-up-right

  • Capture the Bugarrow-up-right

  • Bugbounterarrow-up-right

  • Detectifyarrow-up-right

  • BugBasearrow-up-right

  • Code4renaarrow-up-right

  • huntrarrow-up-right

  • FireBountyarrow-up-right

Platforms in Asia : Cyber Army ID, arrow-up-rightRedStorm Information Security, arrow-up-rightbugbounty.jp.arrow-up-right

​arrow-up-right​​​

Writeups, disclosure/reports:

  • PentesterLandarrow-up-right

  • HackerOne reportsarrow-up-right

PreviousCTFs and other challengeschevron-leftNextMethodologieschevron-right

Last updated 1 year ago