Bug Bounty Wiki

Bug Bounty Handbook

πŸ’™ Enjoying these tools? Consider supporting the project to keep them free!

πŸ” Reconnaissance & Discovery

πŸ”

Complete Dorks

500+ advanced search queries for automated reconnaissance, OSINT, and leaked data discovery.

⚑

Command Builder

Interactive generator for Nmap, FFuf, SQLmap, Gobuster, Nuclei, and Amass with syntax help.

πŸ“

Wordlists

Custom wordlists for fuzzing and directory enumeration with pattern mutations.

πŸ›‘οΈ Methodology

πŸ›‘οΈ

Hunting Methodology

12-phase workflow covering everything from passive recon to reporting.

βœ…

Bounty Checklists

20+ expert workflows with detailed tactics for API, SSRF, IDOR, and more.

πŸ—ΊοΈ

MindMaps

9 interactive canvas-based mindmaps covering vulnerability workflows.

πŸ—‘οΈ

Bounty Techniques

300+ advanced exploitation methodologies covering OWASP Top 10 + 29 categories.

πŸ’£ Exploitation & Payloads

πŸ’£

Payload Arsenal

1,000+ elite payloads for XSS, SQLi, and SSRF. Hand-tested with WAF bypass context.

πŸ”Ž

Regex Library

60+ Burp Suite patterns for extracting API keys, tokens, and sensitive secrets.

πŸ“Š

Vulnerability Tracker

Track 500+ systematic checks with persistence and automated reporting.

πŸ”§

Utilities & Tools

JWT Decoders, Hash Gens, Multi-format encoders, IP tools, and text comparison.

🧠 Intelligence & Resources

🧠

Knowledge Base

Real-time CVE feeds, security glossary, attack chains, and threat intelligence.

πŸ“Ή

Resource Hub

Video tutorials, HackerOne reports, PortSwigger labs, and PoC examples.