{"id":247,"date":"2022-10-10T01:17:08","date_gmt":"2022-10-09T23:17:08","guid":{"rendered":"https:\/\/bergee.it\/blog\/?page_id=247"},"modified":"2022-10-10T01:17:08","modified_gmt":"2022-10-09T23:17:08","slug":"bug-bounty-resources","status":"publish","type":"page","link":"https:\/\/bergee.it\/blog\/bug-bounty-resources\/","title":{"rendered":"Bug Bounty Resources"},"content":{"rendered":"\t\t\t\t\t\t\t<h3 style=\"margin-bottom:20px ;display:block;width:100%;margin-top:10px\"> <\/h3>\r\n\t\t\t\t\t\t\t\t<style>\r\n\t\t\t\t\r\n\t\t\t\t\t#tab_container_246 {\r\n\toverflow:hidden;\r\n\tdisplay:block;\r\n\twidth:100%;\r\n\tborder:0px solid #ddd;\r\n\tmargin-bottom:30px;\r\n\t}\r\n\r\n#tab_container_246 .tab-content{\r\n\tpadding:20px;\r\n\tborder: 1px solid #e6e6e6 !important;\r\n\tmargin-top: 0px;\r\n\tbackground-color:#ffffff !important;\r\n\tcolor: #000000 !important;\r\n\tfont-size:16px !important;\r\n\tfont-family: Open Sans !important;\r\n\t\r\n\t\tborder: 1px solid #e6e6e6 !important;\r\n\t}\r\n#tab_container_246 .wpsm_nav-tabs {\r\n    border-bottom: 0px solid #ddd;\r\n}\r\n#tab_container_246 .wpsm_nav-tabs > li.active > a, #tab_container_246 .wpsm_nav-tabs > li.active > a:hover, #tab_container_246 .wpsm_nav-tabs > li.active > a:focus {\r\n\tcolor: #000000 !important;\r\n\tcursor: default;\r\n\tbackground-color: #ffffff !important;\r\n\tborder: 1px solid #e6e6e6 !important;\r\n}\r\n\r\n#tab_container_246 .wpsm_nav-tabs > li > a {\r\n    margin-right: 0px !important; \r\n    line-height: 1.42857143 !important;\r\n    border: 1px solid #d5d5d5 !important;\r\n    border-radius: 0px 0px 0 0 !important; \r\n\tbackground-color: #e8e8e8 !important;\r\n\tcolor: #000000 !important;\r\n\tpadding: 15px 18px 15px 18px !important;\r\n\ttext-decoration: none !important;\r\n\tfont-size: 14px !important;\r\n\ttext-align:center !important;\r\n\tfont-family: Open Sans !important;\r\n}\r\n#tab_container_246 .wpsm_nav-tabs > li > a:focus {\r\noutline: 0px !important;\r\n}\r\n\r\n#tab_container_246 .wpsm_nav-tabs > li > a:before {\r\n\tdisplay:none !important;\r\n}\r\n#tab_container_246 .wpsm_nav-tabs > li > a:after {\r\n\tdisplay:none !important ;\r\n}\r\n#tab_container_246 .wpsm_nav-tabs > li{\r\npadding:0px !important ;\r\nmargin:0px;\r\n}\r\n\r\n#tab_container_246 .wpsm_nav-tabs > li > a:hover , #tab_container_246 .wpsm_nav-tabs > li > a:focus {\r\n    color: #000000 !important;\r\n    background-color: #e8e8e8 !important;\r\n\tborder: 1px solid #d5d5d5 !important;\r\n\t\r\n}\r\n#tab_container_246 .wpsm_nav-tabs > li > a .fa{\r\n\r\nmargin-right:5px !important;\r\n\r\nmargin-left:5px !important;\r\n\r\n\r\n}\r\n\r\n\t\t#tab_container_246 .wpsm_nav-tabs a{\r\n\t\t\tbackground-image: none;\r\n\t\t\tbackground-position: 0 0;\r\n\t\t\tbackground-repeat: repeat-x;\r\n\t\t}\r\n\t\t\t\r\n\r\n\r\n#tab_container_246 .wpsm_nav-tabs > li {\r\n    float: left;\r\n    margin-bottom: -1px !important;\r\n\tmargin-right:0px !important; \r\n}\r\n\r\n\r\n#tab_container_246 .tab-content{\r\noverflow:hidden !important;\r\n}\r\n\r\n\r\n@media (min-width: 769px) {\r\n\r\n\t#tab_container_246 .wpsm_nav-tabs > li{\r\n\t\tfloat:left !important ;\r\n\t\t\t\tmargin-right:-1px !important;\r\n\t\t\t\t\t}\r\n\t#tab_container_246 .wpsm_nav-tabs{\r\n\t\tfloat:none !important;\r\n\t\tmargin:0px !important;\r\n\t}\r\n\r\n\t#tab_container_246 .wpsm_nav-tabs > li {\r\n\t\t\t\t\r\n\t}\r\n\t#tab_container_246 .wpsm_nav{\r\n\t\t\t}\r\n\r\n}\r\n\r\n\r\n\r\n@media (max-width: 768px) {\r\n\t#tab_container_246 .wpsm_nav-tabs > li {\r\n\t\t\t\t\r\n\t}\r\n\t#tab_container_246 .wpsm_nav{\r\n\t\t\t}\r\n}\r\n\r\n\r\n\t.wpsm_nav-tabs li:before{\r\n\t\tdisplay:none !important;\r\n\t}\r\n\r\n\t@media (max-width: 768px) {\r\n\t\t\t\t\r\n\t\t\t\t.wpsm_nav-tabs{\r\n\t\t\tmargin-left:0px !important;\r\n\t\t\tmargin-right:0px !important; \r\n\t\t\t\r\n\t\t}\r\n\t\t\t\t#tab_container_246 .wpsm_nav-tabs > li{\r\n\t\t\tfloat:none !important;\r\n\t\t}\r\n\t\t\t\r\n\t}\t\t\t\t<\/style>\r\n\t\t\t\t<div id=\"tab_container_246\" >\r\n\t \r\n\t\t\t\t\t<ul class=\"wpsm_nav wpsm_nav-tabs\" role=\"tablist\" id=\"myTab_246\">\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<li role=\"presentation\"  class=\"active\"  onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t<a href=\"#tabs_desc_246_1\" aria-controls=\"tabs_desc_246_1\" role=\"tab\" data-toggle=\"tab\">\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-youtube\"><\/i> \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span>Videos<\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<li role=\"presentation\"  onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t<a href=\"#tabs_desc_246_2\" aria-controls=\"tabs_desc_246_2\" role=\"tab\" data-toggle=\"tab\">\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-flask\"><\/i> \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span>Labs<\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t<li role=\"presentation\"  onclick=\"do_resize()\">\r\n\t\t\t\t\t\t\t\t<a href=\"#tabs_desc_246_3\" aria-controls=\"tabs_desc_246_3\" role=\"tab\" data-toggle=\"tab\">\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<i class=\"fa fa-book\"><\/i> \t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t<span>Books<\/span>\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t <\/ul>\r\n\r\n\t\t\t\t\t  <!-- Tab panes -->\r\n\t\t\t\t\t  <div class=\"tab-content\" id=\"tab-content_246\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t <div role=\"tabpanel\" class=\"tab-pane  in active \" id=\"tabs_desc_246_1\">\r\n\t\t\t\t\t\t\t\t<h3>Bug Bounty Related Channels<\/h3><ul>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCZDyl7G-Lq-EMVO8PfDFp9g\" target=\"_blank\" rel=\"noopener\">BugBountyReportsExplained<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCCZDt7MuC3Hzs6IH4xODLBw\" target=\"_blank\" rel=\"noopener\">Nahamsec<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCQN2DsjnYH60SFBIA6IkNwg\" target=\"_blank\" rel=\"noopener\">ST\u00d6K<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCCUFgj-52_ryvpQUacylRpg\" target=\"_blank\" rel=\"noopener\">zseano<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCZitj8Ue3lkHwOzDceBVqXA\" target=\"_blank\" rel=\"noopener\">Assetnote<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCUfO02gdMDXgOJWdv_jiLMg\" target=\"_blank\" rel=\"noopener\">Codingo<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCCzvz8jsulXm27Cd6k3vzyg\" target=\"_blank\" rel=\"noopener\">HakLuke<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCk0f0svao7AKeK3RfiWxXEA\" target=\"_blank\" rel=\"noopener\">Jason Haddix<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/TomNomNomDotCom\" target=\"_blank\" rel=\"noopener\">TomNomNom<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCq9IyPMXiwD8yBFHkxmN8zg\" target=\"_blank\" rel=\"noopener\">FarahFawa<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCDl4jpAVAezUdzsDBDDTGsQ\" target=\"_blank\" rel=\"noopener\">Z-winK University<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCmXwpkCXmIKjoRLMsq9I3RA\" target=\"_blank\" rel=\"noopener\">PinkDraconian<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC0ArlFuFYMpEewyRBzdLHiw\" target=\"_blank\" rel=\"noopener\">The Cyber Mentor<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCjBhClJ59W4hfUly51i11hg\" target=\"_blank\" rel=\"noopener\">The XSS Rat<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/RootOfTheNull\" target=\"_blank\" rel=\"noopener\">John Hammond<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/RapidBug\" target=\"_blank\" rel=\"noopener\">InsiderPHD<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCG-sIlaM1xXmetFtEfqtOqg\" target=\"_blank\" rel=\"noopener\">Dawid Czagan<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCcBgAEHAW0ESGwfoLJYg_Tg\" target=\"_blank\" rel=\"noopener\">Intigriti<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCo1NHk_bgbAbDBc4JinrXww\" target=\"_blank\" rel=\"noopener\">BugCrowd<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCsgzmECky2Q9lQMWzDwMhYw\" target=\"_blank\" rel=\"noopener\">HackerOne<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCaedmxqu7_1eYfCf2HdAv_g\" target=\"_blank\" rel=\"noopener\">d0nut<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCm6N84sAaQ-BiNdCaaLT4qg\" target=\"_blank\" rel=\"noopener\">Detectify<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCi67lRCd5qpaHwSXNJisuRQ\" target=\"_blank\" rel=\"noopener\">Hack The Box<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCa6eh7gCkpPo5XXUDfygQQA\" target=\"_blank\" rel=\"noopener\">IppSec<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCPqes566OZ3G_fjxL6BngRQ\" target=\"_blank\" rel=\"noopener\">0x41414141<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/0xdf0xdf\" target=\"_blank\" rel=\"noopener\">0xdf<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCtGLeKomT06x3xZ2SZp2l9Q\" target=\"_blank\" rel=\"noopener\">247CTF<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCXGmQuhIFXeBbOj-Spgh2QQ\" target=\"_blank\" rel=\"noopener\">HTTPVoid<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCb8wDMsY6QEngILw2y71ATQ\" target=\"_blank\" rel=\"noopener\">AEMSecurity<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCBvX9uEO0a3fZNCK12MAgug\" target=\"_blank\" rel=\"noopener\">David Sch\u00fctz<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCq9IyPMXiwD8yBFHkxmN8zg\" target=\"_blank\" rel=\"noopener\">FarahFawa<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/CrazyDanishHacker\" target=\"_blank\" rel=\"noopener\">CrazyDanishHacker<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCyv6ItVqQPnlFFi2zLxlzXA\" target=\"_blank\" rel=\"noopener\">Hacksplained<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCS82DNnKOhXHcGKxGzQvNSQ\" target=\"_blank\" rel=\"noopener\">Hacktify Cyber Security<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCKOyO-r8LFwd2ZEN39GmwlA\" target=\"_blank\" rel=\"noopener\">InfoSec Writeups<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/Michael10Sommer\" target=\"_blank\" rel=\"noopener\">Michael Sommer<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC33YyLk3vdtnPqLeOuEZc2w\" target=\"_blank\" rel=\"noopener\">Open Source Bug Bounty<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCUCmz3fKMZpYPDNfHZh3alg\" target=\"_blank\" rel=\"noopener\">Orwa Atyat<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCAndnmvdiphDqLLDrGnBuhA\" target=\"_blank\" rel=\"noopener\">Phd Security<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCkytgKNbJ0L1UuN1K27GAKA\" target=\"_blank\" rel=\"noopener\">PortSwigger<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCKaK-XPQAbznwIISC46b1oA\" target=\"_blank\" rel=\"noopener\">Rhana Khalil<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCCp25j1Zh9vc_WFm-nB9fhQ\" target=\"_blank\" rel=\"noopener\">ReconLess<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/PwnFunction\" target=\"_blank\" rel=\"noopener\">PwnFunction<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/RogueSMG\" target=\"_blank\" rel=\"noopener\">RogueSMG<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCQaXCW5fFBaCrXKgaOPxUTw\" target=\"_blank\" rel=\"noopener\">Spin The Hack<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/thehackerish\" target=\"_blank\" rel=\"noopener\">thehackerish<\/a><\/li>\r\n<\/ul><h3>Conferences<\/h3><ul>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/BlackHatOfficialYT\" target=\"_blank\" rel=\"noopener\">BlackHatOfficialYT<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCkCV_HJUkI8PsFrX4wpPX4A\" target=\"_blank\" rel=\"noopener\">BlackAlps<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCdnz7EZERHqmluR8RC2Y8pA\" target=\"_blank\" rel=\"noopener\">BSides<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCexBIw_UJOz-H1PD9I9zkGw\" target=\"_blank\" rel=\"noopener\">BsidesWarsaw<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/DEFCONConference\" target=\"_blank\" rel=\"noopener\">DEFCON<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCiVNwNkoMapaeyr9o6XEonA\" target=\"_blank\" rel=\"noopener\">EKOPArtySecurityConference<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/HackersOnBoard\" target=\"_blank\" rel=\"noopener\">HackersOnBoard<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/hacktivityconf\/\" target=\"_blank\" rel=\"noopener\">Hacktivity - IT Security Festival<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/nullcon\" target=\"_blank\" rel=\"noopener\">NullCon<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCMNvAtT4ak2azKNk6UlB1QQ\" target=\"_blank\" rel=\"noopener\">OffensiveCon<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/OWASPGLOBAL\" target=\"_blank\" rel=\"noopener\">OWASP Global<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCna7lZrm1ZZ1NmSkZML-JWw\" target=\"_blank\" rel=\"noopener\">OWASP Poland<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC3pn_ccQdc22_L63d6MN1QA\" target=\"_blank\" rel=\"noopener\">OWASP Stockholm<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCe0myuIC8mDjnakaY_P9tRw\" target=\"_blank\" rel=\"noopener\">OWASP Nagpur<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCByLDp7r7gHGoO7yYMYFeWQ\" target=\"_blank\" rel=\"noopener\">Security Fest<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/scrtinsomnihack\/\" target=\"_blank\" rel=\"noopener\">InsomniHack<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC8nq3PX9coMiqgKH6fw-VCQ\" target=\"_blank\" rel=\"noopener\">Red Team Village<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/ShellCon\" target=\"_blank\" rel=\"noopener\">ShellCon<\/a><\/li>\r\n<\/ul><h3>Bug Bounty POC Disclosures<\/h3><ul>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCGp00rR_SE2xAumfYCCFk2w\" target=\"_blank\" rel=\"noopener\">Bug Bounty POC Disclosure 1<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCNRM4GH-SD85WCSqeSb4xUA\" target=\"_blank\" rel=\"noopener\">Bug Bounty POC Disclosure 2<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCR9vS_jBm85ks81HECzP-WA\" target=\"_blank\" rel=\"noopener\">Bug Bounty POC Disclosure 3<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCCAPOMoh270RekKMDWLm6QQ\" target=\"_blank\" rel=\"noopener\">Bug Bounty POC Disclosure 4<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCp6dlMgt87xsKJyIMRvu6rw\/videos\" target=\"_blank\" rel=\"noopener\"> Bug Bounty POC Disclosure 4<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/bughuntar\/videos\" target=\"_blank\" rel=\"noopener\">Professor The Hunter<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/vulnerability0lab\" target=\"_blank\" rel=\"noopener\">vulnerability0lab<\/a><\/li>\r\n<\/ul><h3>Security and more<\/h3><ul>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/GynvaelEN\" target=\"_blank\" rel=\"noopener\">GynvaelColdwind EN<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/ZetaTwo\" target=\"_blank\" rel=\"noopener\">CalleSwenson<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCEeuul0q7C8Zs5C8rc4REFQ\" target=\"_blank\" rel=\"noopener\">CryptoCat<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/CyberSecurityTV\" target=\"_blank\" rel=\"noopener\">CyberSecurityTV<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC0R_-7yQPoGpkPR9ITzDFFQ\" target=\"_blank\" rel=\"noopener\">DarkSec<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/ConfigTerm\" target=\"_blank\" rel=\"noopener\">David Bombal<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/GoatSniff\" target=\"_blank\" rel=\"noopener\">GoatSniff<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/HackersEra\/\" target=\"_blank\" rel=\"noopener\">HackersEra<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC0ZTPkdxlAKf-V33tqXwi3Q\" target=\"_blank\" rel=\"noopener\">HackerSploit<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCARsgS1stRbRgh99E63Q3ng\" target=\"_blank\" rel=\"noopener\">Hacking Simplified<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCOibgcOTyaRNjq__8ds2SxA\" target=\"_blank\" rel=\"noopener\">Hacksplaining<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC9c12UnfHIru-tZTbW-G3gQ\/\" target=\"_blank\" rel=\"noopener\">LeetCipher<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UClcE-kVhqyiHCcjYwcpfj9w\" target=\"_blank\" rel=\"noopener\">LiveOverflow<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC9Qa_gXarSmObPX3ooIQZrg\" target=\"_blank\" rel=\"noopener\">MetaSplotation<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCgTNupxATBfWmfehv21ym-g\" target=\"_blank\" rel=\"noopener\">NullByte<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UC6ovQdCeSjTZbHM5Y7JAWdA\" target=\"_blank\" rel=\"noopener\">Secret Letters of Hacker<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCsWLzFUqOmAmjfP_CKMnO3g\" target=\"_blank\" rel=\"noopener\">Cobalt<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/PwnFunction\/\" target=\"_blank\" rel=\"noopener\">PwnFunction<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/ethicalhackernetwork\/\" target=\"_blank\" rel=\"noopener\">The Ethical Hacker Network<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCjzceWf-OT3ImIKztzGkipA\" target=\"_blank\" rel=\"noopener\">The Osint Curious Project<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/ArtOfTheProblem\" target=\"_blank\" rel=\"noopener\">ArtOfTheProblem<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCW2WOgSiMr216a27KWG_aqg\" target=\"_blank\" rel=\"noopener\">OSINT<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/Computerphile\" target=\"_blank\" rel=\"noopener\">ComputerPhile<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/explainingcomputers\" target=\"_blank\" rel=\"noopener\">Explaining Computers<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCDbNNYUME_pgocqarSjfNGw\" target=\"_blank\" rel=\"noopener\"> Kacper Szurek EN<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/OWASPDevSlop\" target=\"_blank\" rel=\"noopener\"> OWASP Dev Slop<\/a><\/li>\r\n<\/ul><h3>Polish Language Materials<\/h3><ul>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/CERTPolska\" target=\"_blank\" rel=\"noopener\">CERT Polska<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/GynvaelColdwind\" target=\"_blank\" rel=\"noopener\">GynvaelColdwind<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/c\/ZaufanaTrzeciaStronaYT\" target=\"_blank\" rel=\"noopener\">Zaufana Trzecia Strona<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCP16m86ciUUlU8UZvlpw0TQ\" target=\"_blank\" rel=\"noopener\">Kacper Szurek<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCe6nK69Yc1zna7QSJEfA9pw\" target=\"_blank\" rel=\"noopener\">Niebezpiecznik<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/channel\/UCfxk5idSdKXTEqAOa8YXIgw\" target=\"_blank\" rel=\"noopener\">Sekurak TV<\/a><\/li>\r\n<li><a href=\"https:\/\/www.youtube.com\/user\/uwteamorg\" target=\"_blank\" rel=\"noopener\">Jakub Mrugalski<\/a><\/li>\t\t\t\t\t\t <\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t <div role=\"tabpanel\" class=\"tab-pane \" id=\"tabs_desc_246_2\">\r\n\t\t\t\t\t\t\t\t<h3>Labs<\/h3>\r\n<ul>\r\n<li><a href=\"https:\/\/portswigger.net\/web-security\" target=\"_blank\" rel=\"noopener\">Portswigger Web Security Academy<\/a><\/li>\r\n<li><a href=\"https:\/\/www.hackthebox.com\/\" target=\"_blank\" rel=\"noopener\">Hack The Box<\/a><\/li>\r\n<li><a href=\"https:\/\/tryhackme.com\/signup?referrer=5e93a23bda63cf40415470cf\" target=\"_blank\" rel=\"noopener\">Try Hack Me<\/a><\/li>\r\n<li><a href=\"https:\/\/pentesterlab.com\/referral\/xeU2FNhIocaoyg\" target=\"_blank\" rel=\"noopener\">Penterster Lab<\/a><\/li>\r\n<\/ul>\r\n<h3>Various challenges<\/h3>\r\n<ul>\r\n<li><a href=\"https:\/\/www.wechall.net\/\" target=\"_blank\" rel=\"noopener\">Challenges aggregator<\/a><\/li>\r\n<li><a href=\"https:\/\/overthewire.org\/wargames\/\" target=\"_blank\" rel=\"noopener\">Over The Wire Wargames<\/a><\/li>\r\n<li><a href=\"https:\/\/www.root-me.org\" target=\"_blank\" rel=\"noopener\">Exploiting challanges<\/a><\/li>\r\n<li><a href=\"https:\/\/cryptopals.com\/\" target=\"_blank\" rel=\"noopener\">Crypto challenges<\/a><\/li>\r\n<\/ul>\r\n<h3>XSS challenges<\/h3>\r\n<ul>\r\n<li><a href=\"https:\/\/blog.intigriti.com\/hackademy\/xss-challenges\/\" target=\"_blank\" rel=\"noopener\">Intigriti XSS challenges<\/a><\/li>\r\n<li><a href=\"https:\/\/xss-game.appspot.com\/\" target=\"_blank\" rel=\"noopener\">Google XSS Game<\/a><\/li>\r\n<li><a href=\"https:\/\/xss.pwnfunction.com\/\" target=\"_blank\" rel=\"noopener\">XSS Game<\/a><\/li>\r\n<li><a href=\"https:\/\/unescape-room.jobertabma.nl\/\" target=\"_blank\" rel=\"noopener\">Unescape Room<\/a><\/li>\r\n<li><a href=\"https:\/\/prompt.ml\" target=\"_blank\" rel=\"noopener\">Prompt to win<\/a><\/li>\r\n<\/ul>\r\n<h3>Vulnerable Applications<\/h3>\r\n<ul>\r\n<li><a href=\"https:\/\/owasp.org\/www-project-vulnerable-web-applications-directory\/\" target=\"_blank\" rel=\"noopener\">OWASP Vulnerable Web Applications<\/a><\/li>\r\n<li><a href=\"https:\/\/www.vulnhub.com\/\" target=\"_blank\" rel=\"noopener\">VulnHub<\/a><\/li>\r\n<li><a href=\"https:\/\/github.com\/jbarone\/xxelab\" target=\"_blank\" rel=\"noopener\">XEE Lab<\/a><\/li>\r\n<li><a href=\"https:\/\/github.com\/LunaM00n\/File-Upload-Lab\" target=\"_blank\" rel=\"noopener\">File Upload Lab<\/a><\/li>\r\n<\/ul>\t\t\t\t\t\t <\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t <div role=\"tabpanel\" class=\"tab-pane \" id=\"tabs_desc_246_3\">\r\n\t\t\t\t\t\t\t\t<h3>Free<\/h3>\r\n<ul>\r\n<li><a href=\"https:\/\/www.hackerone.com\/ethical-hacker\/hack-learn-earn-free-e-book\" target=\"_blank\" rel=\"noopener\">Web Hacking 101<\/a><\/li>\r\n<li><a href=\"https:\/\/github.com\/m0chan\/BugBounty\/blob\/master\/Bug%20Bounty%20Playbook.pdf\" target=\"_blank\" rel=\"noopener\">Bug Bounty Playbook<\/a><\/li>\r\n<li><a href=\"https:\/\/owasp.org\/www-project-web-security-testing-guide\/assets\/archive\/OWASP_Testing_Guide_v4.pdf\" target=\"_blank\" rel=\"noopener\">OWASP Testing Guide 4.0<\/a><\/li>\r\n<\/ul><h3>Paid<\/h3>\r\n<ul>\r\n<li><a href=\"https:\/\/amzn.to\/3CnJu5d\" target=\"_blank\" rel=\"noopener\">The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws [2nd Edition]<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3rJgEHw\" target=\"_blank\" rel=\"noopener\">Real-World Bug Hunting: A Field Guide to Web Hacking<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3CdXRc0\" target=\"_blank\" rel=\"noopener\">Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications [1st Edition]<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3RJrckl\" target=\"_blank\" rel=\"noopener\">Bug Bounty Hunting Essentials: Quick-paced guide to help white-hat hackers get through bug bounty programs<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3RP1jQr\" target=\"_blank\" rel=\"noopener\">A bug bounty hunting journey: Overcome your limits and become a successful hunter<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3SSk86s\" target=\"_blank\" rel=\"noopener\">A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3CKWrYf\" target=\"_blank\" rel=\"noopener\">Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3SHm6GJ\" target=\"_blank\" rel=\"noopener\">Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3T5rnaQ\" target=\"_blank\" rel=\"noopener\">The Hacker Playbook 3: Practical Guide To Penetration Testing<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3Euf9Vl\" target=\"_blank\" rel=\"noopener\">Penetration Testing: A Hands-On Introduction to Hacking [1st Edition]<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3RJqBiB\" target=\"_blank\" rel=\"noopener\">Ethical Hacking: A Hands-on Introduction to Breaking In<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3T3SYsW\" target=\"_blank\" rel=\"noopener\">Hacking APIs: Breaking Web Application Programming Interfaces<\/a><\/li>\r\n<li><a href=\"https:\/\/amzn.to\/3Taq7TO\" target=\"_blank\" rel=\"noopener\">The Mobile Application Hacker's Handbook [1st Edition]<\/a><\/li>\r\n<\/ul>\t\t\t\t\t\t <\/div>\r\n\t\t\t\t\t\t\t\r\n\t\t\t\t\t <\/div>\r\n\t\t\t\t\t \r\n\t\t\t\t <\/div>\r\n <script>\r\n\t\tjQuery(function () {\r\n\t\t\tjQuery('#myTab_246 a:first').tab('show')\r\n\t\t});\r\n\t\t\r\n\t\t\t\tjQuery(function(){\r\n\t\t\tvar b=\"fadeIn\";\r\n\t\t\tvar c;\r\n\t\t\tvar a;\r\n\t\t\td(jQuery(\"#myTab_246 a\"),jQuery(\"#tab-content_246\"));function d(e,f,g){\r\n\t\t\t\te.click(function(i){\r\n\t\t\t\t\ti.preventDefault();\r\n\t\t\t\t\tjQuery(this).tab(\"show\");\r\n\t\t\t\t\tvar h=jQuery(this).data(\"easein\");\r\n\t\t\t\t\tif(c){c.removeClass(a);}\r\n\t\t\t\t\tif(h){f.find(\"div.active\").addClass(\"animated \"+h);a=h;}\r\n\t\t\t\t\telse{if(g){f.find(\"div.active\").addClass(\"animated \"+g);a=g;}else{f.find(\"div.active\").addClass(\"animated \"+b);a=b;}}c=f.find(\"div.active\");\r\n\t\t\t\t});\r\n\t\t\t}\r\n\t\t});\r\n\t\t\r\n\r\n\t\tfunction do_resize(){\r\n\r\n\t\t\tvar width=jQuery( '.tab-content .tab-pane iframe' ).width();\r\n\t\t\tvar height=jQuery( '.tab-content .tab-pane iframe' ).height();\r\n\r\n\t\t\tvar toggleSize = true;\r\n\t\t\tjQuery('iframe').animate({\r\n\t\t\t    width: toggleSize ? width : 640,\r\n\t\t\t    height: toggleSize ? height : 360\r\n\t\t\t  }, 250);\r\n\r\n\t\t\t  toggleSize = !toggleSize;\r\n\t\t}\r\n\r\n\r\n\t<\/script>\r\n\t\t\t\t\r\n\t\t\t\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-247","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bug Bounty Resources - Bergee&#039;s Stories on Bug Hunting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bergee.it\/blog\/bug-bounty-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bug Bounty Resources - Bergee&#039;s Stories on Bug Hunting\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bergee.it\/blog\/bug-bounty-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Bergee&#039;s Stories on Bug Hunting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@bergee\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bergee.it\/blog\/bug-bounty-resources\/\",\"url\":\"https:\/\/bergee.it\/blog\/bug-bounty-resources\/\",\"name\":\"Bug Bounty Resources - Bergee&#039;s Stories on Bug Hunting\",\"isPartOf\":{\"@id\":\"https:\/\/bergee.it\/blog\/#website\"},\"datePublished\":\"2022-10-09T23:17:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/bergee.it\/blog\/bug-bounty-resources\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bergee.it\/blog\/bug-bounty-resources\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bergee.it\/blog\/bug-bounty-resources\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bergee.it\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bug Bounty Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bergee.it\/blog\/#website\",\"url\":\"https:\/\/bergee.it\/blog\/\",\"name\":\"Bergee&#039;s Stories on Bug Hunting\",\"description\":\"hacking, cyber security and programming\",\"publisher\":{\"@id\":\"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bergee.it\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73\",\"name\":\"bergee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\",\"url\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\",\"contentUrl\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\",\"width\":129,\"height\":150,\"caption\":\"bergee\"},\"logo\":{\"@id\":\"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\",\"https:\/\/www.linkedin.com\/in\/bartlomiej-bergier\",\"https:\/\/x.com\/https:\/\/twitter.com\/bergee\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bug Bounty Resources - Bergee&#039;s Stories on Bug Hunting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bergee.it\/blog\/bug-bounty-resources\/","og_locale":"en_US","og_type":"article","og_title":"Bug Bounty Resources - Bergee&#039;s Stories on Bug Hunting","og_url":"https:\/\/bergee.it\/blog\/bug-bounty-resources\/","og_site_name":"Bergee&#039;s Stories on Bug Hunting","twitter_card":"summary_large_image","twitter_site":"@bergee","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bergee.it\/blog\/bug-bounty-resources\/","url":"https:\/\/bergee.it\/blog\/bug-bounty-resources\/","name":"Bug Bounty Resources - Bergee&#039;s Stories on Bug Hunting","isPartOf":{"@id":"https:\/\/bergee.it\/blog\/#website"},"datePublished":"2022-10-09T23:17:08+00:00","breadcrumb":{"@id":"https:\/\/bergee.it\/blog\/bug-bounty-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bergee.it\/blog\/bug-bounty-resources\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bergee.it\/blog\/bug-bounty-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bergee.it\/blog\/"},{"@type":"ListItem","position":2,"name":"Bug Bounty Resources"}]},{"@type":"WebSite","@id":"https:\/\/bergee.it\/blog\/#website","url":"https:\/\/bergee.it\/blog\/","name":"Bergee&#039;s Stories on Bug Hunting","description":"hacking, cyber security and programming","publisher":{"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bergee.it\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/bergee.it\/blog\/#\/schema\/person\/a37382384cc58e596119b1eec4869d73","name":"bergee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","url":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","contentUrl":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png","width":129,"height":150,"caption":"bergee"},"logo":{"@id":"https:\/\/bergee.it\/blog\/wp-content\/uploads\/2022\/08\/berdzi_drawing_150x150_x.png"},"sameAs":["http:\/\/localhost\/wordpress","https:\/\/www.linkedin.com\/in\/bartlomiej-bergier","https:\/\/x.com\/https:\/\/twitter.com\/bergee"]}]}},"_links":{"self":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/pages\/247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/comments?post=247"}],"version-history":[{"count":2,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/pages\/247\/revisions"}],"predecessor-version":[{"id":249,"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/pages\/247\/revisions\/249"}],"wp:attachment":[{"href":"https:\/\/bergee.it\/blog\/wp-json\/wp\/v2\/media?parent=247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}