skip to Main Content

Topic: Researcher Resources

Become Part of the ID Verified Crowd

One of the most Frequently Asked Questions Bugcrowd receives is “How can I as a researcher maximize my private bounty invitation potential?” Actively submitting critical issues and minimizing invalid submissions (Read the brief! Know the VRT!) are some of the…

Read More

Tips from Top Hackers – Bug Hunting methodology and the importance of writing quality submissions

Yesterday we shared how some of Bugcrowd’s top-ranked bug hunters fit bounties into their schedule and maximize payouts, and today we’re going to dive a bit deeper with one of those researchers. In today’s post, Brett Buerhaus, ranked 16 on Bugcrowd and experienced security researcher, shares his method for approaching new bug bounties and writing bug submissions.

Read More

Tips from Top Hackers – How to fit bounties into your schedule and maximize payouts

In our recently published report on the bug hunting community, we asked all kinds of bug hunters what motivates them to participate in bug bounties, and how they decide what programs to participate in. Amongst several of the groups identified in the report, time was a huge factor. With a full-time job, family and a social life, how does one fit bug bounty hunting into their busy schedule?

Read More

Q4 Researcher Promotion: Thick Client Targets

As the bug bounty space has matured, the range of targets to test against has expanded and diversified incredibly. Our programs offer a broad range of targets, from web and mobile, to APIs and IoT devices (even cars)! Over the last several months, Bugcrowd has launched more and more bounty programs that feature thick client applications.

Whether you have skills in testing thick client software, or want to expand your expertise, Bugcrowd has several public programs and numerous private programs available for you to hack on for fun and profit. This quarter we’re running a limited time promotion for all submissions found in thick client applications.  

Read More
Learn More About The Most Critical Vulnerabilities of 2019Download Report
+
Back To Top