Request a Demo Contact Us
Need a Pen Test? Get Started Now!
Learn more

Targeting for Bug Bounty Research


Learn to find and evaluate many potential targets for a Bugcrowd program. This talk goes beyond DNS-based methods, obvious CLI tools, and clever Google queries to include new and creative resources. Researchers attending this session will walk away with a method for casting their net wide and tricks for separating the wheat from the chaff. Emphasis is placed on producing many results, efficiently gathering and recording them, and professional use that respects program guidelines and avoids common pitfalls.

More resources


GSuite Security: Everyone wants it but not everyone gets it

Learn More

Hunting “ID Substitution” Attacks for Big Dollars with Z-winK

Learn More

Navigating the Uncharted Waters of Crowdsourced Security

Watch Now

Get Started with Bugcrowd

Every minute that goes by, your unknown vulnerabilities leave you more exposed to cyber attacks.