Repository files navigation Bug Bounty Curriculum (Year-long)
Month 1-2: Web Fundamentals
Basics: Methods, Status Codes, Headers, Cookies
HTTP/2 & HTTP/3
Tools: Burp Suite, Wireshark
MDN Web Docs
Same-origin policy
Cross-Origin Resource Sharing (CORS)
Security features: CSP, HSTS, WebSockets
Browser Internals
Frameworks: Express, Django, Flask, Rails
RESTful APIs & GraphQL
MVC structure
Deep dive into HTML, CSS, JS
Modern JS frameworks: React, Angular, Vue
DOM manipulation & event handling
Month 3-4: Common Web Vulnerabilities
1. Authentication and Session Management Bugs
Password reset flaws
Session fixation
JWT issues
Sensitive information in URLs or error messages
Misconfigured cloud storage
Using components with known vulnerabilities
Month 5-6: Advanced Web Vulnerabilities
Token-based mitigation
SameSite cookies
Stored, Reflected, DOM-based
Content Security Policy (CSP) bypass
4. File Inclusions & Upload Vulnerabilities
Month 6-8: Hacking + Code Review + Specialization
1. Code Review for Vulnerabilities
Git repositories
Public code snippets
Common coding errors leading to vulnerabilities
2. Specialization (Select Topics based on Interest)
Mobile application security
IoT security
Cloud security (AWS, Azure, GCP)
Month 8-12: Advanced Hacking Techniques
1. Advanced Exploitation Techniques
Bypassing WAFs
Chaining vulnerabilities
Out-of-band data exfiltration
2. Networking and Infrastructure Hacking
Basics of network protocols
Network vulnerability scanning
Custom scripts for recon and vulnerability scanning
Tools: Nmap, Dirsearch, Amass, SQLmap, etc.
4. Responsible Disclosure & Reporting
How to write an impactful vulnerability report
Ethics and legal considerations
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
You can’t perform that action at this time.