Bug Bounty Related Channels
- BugBountyReportsExplained
- Nahamsec
- STÖK
- zseano
- Assetnote
- Codingo
- HakLuke
- Jason Haddix
- TomNomNom
- FarahFawa
- Z-winK University
- PinkDraconian
- The Cyber Mentor
- The XSS Rat
- John Hammond
- InsiderPHD
- Dawid Czagan
- Intigriti
- BugCrowd
- HackerOne
- d0nut
- Detectify
- Hack The Box
- IppSec
- 0x41414141
- 0xdf
- 247CTF
- HTTPVoid
- AEMSecurity
- David Schütz
- FarahFawa
- CrazyDanishHacker
- Hacksplained
- Hacktify Cyber Security
- InfoSec Writeups
- Michael Sommer
- Open Source Bug Bounty
- Orwa Atyat
- Phd Security
- PortSwigger
- Rhana Khalil
- ReconLess
- PwnFunction
- RogueSMG
- Spin The Hack
- thehackerish
Conferences
- BlackHatOfficialYT
- BlackAlps
- BSides
- BsidesWarsaw
- DEFCON
- EKOPArtySecurityConference
- HackersOnBoard
- Hacktivity - IT Security Festival
- NullCon
- OffensiveCon
- OWASP Global
- OWASP Poland
- OWASP Stockholm
- OWASP Nagpur
- Security Fest
- InsomniHack
- Red Team Village
- ShellCon
Bug Bounty POC Disclosures
- Bug Bounty POC Disclosure 1
- Bug Bounty POC Disclosure 2
- Bug Bounty POC Disclosure 3
- Bug Bounty POC Disclosure 4
- Bug Bounty POC Disclosure 4
- Professor The Hunter
- vulnerability0lab
Security and more
- GynvaelColdwind EN
- CalleSwenson
- CryptoCat
- CyberSecurityTV
- DarkSec
- David Bombal
- GoatSniff
- HackersEra
- HackerSploit
- Hacking Simplified
- Hacksplaining
- LeetCipher
- LiveOverflow
- MetaSplotation
- NullByte
- Secret Letters of Hacker
- Cobalt
- PwnFunction
- The Ethical Hacker Network
- The Osint Curious Project
- ArtOfTheProblem
- OSINT
- ComputerPhile
- Explaining Computers
- Kacper Szurek EN
- OWASP Dev Slop
Polish Language Materials
Labs
Various challenges
XSS challenges
Vulnerable Applications
Free
Paid
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws [2nd Edition]
- Real-World Bug Hunting: A Field Guide to Web Hacking
- Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications [1st Edition]
- Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs
- A bug bounty hunting journey: Overcome your limits and become a successful hunter
- A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
- Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
- Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Penetration Testing: A Hands-On Introduction to Hacking [1st Edition]
- Ethical Hacking: A Hands-on Introduction to Breaking In
- Hacking APIs: Breaking Web Application Programming Interfaces
- The Mobile Application Hacker's Handbook [1st Edition]