Last updated 3 years ago
https://medium.com/@trapp3rhat/bug-hunting-methodology-part-3-457eaf9768a5
https://medium.com/@khaled.hassan/bugbountyprotip-collection-4a19e5b5b296
https://awesomeaakash.github.io/2019/03/24/Bug-Hunting-Tips/
https://medium.com/@vignesh4303/collection-of-bug-bounty-tip-will-be-updated-daily-605911cfa248
https://medium.com/@ehsahil/data-breaches-are-on-the-rise-is-it-too-hard-to-p%CC%B6r%CC%B6e%CC%B6v%CC%B6e%CC%B6n%CC%B6t%CC%B6-control-data-breaches-c32dc563bb5
https://blog.usejournal.com/bug-hunting-methodology-part-2-5579dac06150?source=---------5------------------
https://blog.usejournal.com/how-recon-helped-samsung-protect-their-production-repositories-of-samsungtv-ecommerce-estores-4c51d6ec4fdd
https://github.com/Ma4xSec/Hunting-Tips/blob/master/Hunting%20Tips.md?fbclid=IwAR2sCo4HtxPW633pUbmAm5rsOP8JVk7KaQT2KB6y9nTFNOZkKd345-Wf0HQ
https://twitter.com/praseudo/status/988484997374922752
https://github.com/prinsharma1999/bug_bounty_tweets
https://github.com/Fawadkhanfk/Hunting-Tips/blob/main/tips%20for%20hunting.pdf
https://drive.google.com/file/d/11DPYdUuAbjC1Opr4SOi6jw5bRHRtLIPz/view - Book of Tips Aditya Shende
https://github.com/HolyBugx/HolyTips