Helping you connect the bug to bounty

Learn how to test for security vulnerabilities on web applications and learn all about bug bounties and how to get started. Browse and digest security researcher tutorials, guides, writeups and then instantly apply that knowledge on recreated bug bounty scenarios! Learn and then test your knowledge.

Made with by @zseano
Artwork by laracallejaillustrations

Web application hacking

New or experienced, test your skills against custom made web application challenges based on real bug bounty findings! Learn about new techniques and bypasses whilst embracing the mindset of a hacker. With a variety of challenges designed to teach you a broad amount of web application bugs there is something for everyone.

Can you discover how to bypass super secure XSS filters? Learn how developers make mistakes and how vulnerabilities end up in live code. The stage is yours, take it.

View available challenges

For newcomers

You may only redirect to *

For newcomers

Change the class of our image and pick your favourite!

For newcomers

Can you obtain the sensitive information somehow?

🔥 Level up

Can you steal the SSO token?

Practise like a pro BugBountyHunter

Take your learning to the next level and learn to hack like a pro bug bounty hunter. Take advantage of our membership area which grants you access to a private platform and website to hack on. The website works just like a real one would meaning you can signup and interact with it and there is over 100 vulnerabilities waiting for you to discover! Real bugs from real life scenarios, all you have to do is understand the features & test for vulnerabilities! True hacker style.

INCLUDED zseano's methodology

zseano's methodology is a methodology/flow/checklist to follow when looking for vulnerabilities on web applications. It's a simple approach that has helped him discover over 1,000+ vulnerabilities on bug bounty programs! The guide contains a complete run-down of how zseano approaches hacking on web applications & how he applies this on bug bounty programs, including how to choose the right programs! Use the methodology on BARKER and begin practising the flow instantly.

"Hello Sean, I just DM'ed you to say I love you!, I got 7 XSS and a Open redirect on a private program today, all done with your methodology! Thank you so much! "

Top #30 BugBountyHunter Member, HolyBugx

Reading material

Jump into our treasure trove of security related content and begin your journey into the world of infosec! Learn about the various types of security vulnerabilities, explore disclosed vulnerabilities & read guides to help you with bug bounties.

New to bug bounties and need a helping hand on how to get started? Or perhaps you're interested in learning about various tools used by top bug hunters? Look no further, we've got it all covered for you here.

Recently Disclosed

From View more