Bug bounty tools list categorized for reconnaissance, scanning, and exploitation purposes.
Tools for fast subdomains enumeration, in-depth attack surface mapping, DNS subdomain scanners and analysis features are listed.
Multiple web application security scanners, such as SQL injection and other injection detection and exploitation tools, are provided.
List of tools to find and exploit subdomain takeovers, and other misconfigured DNS records.
Resources for learning web application security like PentesterLab, Hack The Box, CTFTime, and vulnerable web applications, such as Juice Shop and WebGoat are offered.
Vulnerable cloud infrastructure creation through tools like Terraform and CloudGoat is discussed.
Also includes vulnerable mobile operating systems like Damn Insecure and Vulnerable App for Android, Oversecured Vulnerable Android App, and AndroGoat.
The author's contact information for feedback, suggestions, or discussion is shared.