https://medium.com/@trapp3rhat/bug-hunting-methodology-part-3-457eaf9768a5
https://medium.com/@khaled.hassan/bugbountyprotip-collection-4a19e5b5b296
https://awesomeaakash.github.io/2019/03/24/Bug-Hunting-Tips/
https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248
https://medium.com/@ehsahil/data-breaches-are-on-the-rise-is-it-too-hard-to-p%CC%B6r%CC%B6e%CC%B6v%CC%B6e%CC%B6n%CC%B6t%CC%B6-control-data-breaches-c32dc563bb5
https://blog.usejournal.com/bug-hunting-methodology-part-2-5579dac06150?source=---------5------------------
https://blog.usejournal.com/how-recon-helped-samsung-protect-their-production-repositories-of-samsungtv-ecommerce-estores-4c51d6ec4fdd