Note: This repository is a backup of my personal Bug Bounty notes from my Obsidian vault.
This repository contains my personal notes and methodologies related to Bug Bounty and Web Security, including:
- Recon methodologies (general + personal workflows)
- Techniques to find hidden assets
- Various attack vectors
- Notes from articles, blogs, and videos
- Concepts from multiple cybersecurity domains
These notes are written while I’m actively learning—whether I’m watching a video, reading an article, or researching a topic. Everything I learn, I document here for reference.
This is a minimal public repository.
To ensure data security, certain folders are kept private and are not exposed publicly.
If you find anything sensitive that should not be public, such as:
- API keys
- Tokens
- Credentials
- Any confidential information
Please inform me immediately via one of the following channels:
- Instagram: @bugatsec
- Email: bugatsec@gmail.com
Your help is appreciated 🙏
These notes are:
- Personal learning notes
- Not guaranteed to be complete or correct
- Intended for educational purposes only
Use responsibly.