discovered 30 Mar 2026
Bug-Bounty-Methodology
→ View on GitHubAI Summary: Bug-Bounty-Methodology is a collection of checklists designed for systematic bug bounty hunting. It covers various security testing scenarios, including 2FA testing, CAPTCHA bypass, CSRF protection, and OAuth misconfiguration, providing comprehensive guidelines for identifying vulnerabilities in web applications. Notable features include a structured compilation of methodologies tailored for different attack vectors and documentation that serves as a practical resource for penetration testers.
README
Bug-Bounty-Methodology
These are my checklists which I use during my bug bounty hunting.
List
- Testing 2 Factor Authentication
- Captcha Bypass
- Bypassing CSRF Protection
- Testing Password Reset Functionality
- Bypassing Rate Limit Protection
- JWT Misconfiguration
- Abusing Support Portal
- Application Level Dos
- OAuth Misconfiguration