New or experienced, test your skills against custom made web application challenges based on real bug bounty findings! Learn about new techniques and bypasses whilst embracing the mindset of a hacker. With a variety of challenges designed to teach you a broad amount of web application bugs there is something for everyone.
Can you discover how to bypass "super secure" XSS filters? Learn how developers make mistakes and how vulnerabilities end up in live code. The stage is yours, take it.
🔥 Level upWhat's behind this admin panel?
For newcomersCan you find any XSS? No HTML tags allowed!
🔥 Level upCan you steal the SSO token?
For newcomersOnly relative redirects are allowed!
Take your learning to the next level and put your knowledge & skills around web vulnerabilities to the test and apply them on our fully working web application dubbed BARKER. Gain confidence when hacking as you go through the application & begin to understand how the webapp works, rather than being told, "there's xss here, can you find the bypass?".
BARKER contains over 100 real-life vulnerabilities, real bugs from real life scenarios, all you have to do is understand the features & test for vulnerabilities!
True hacker style. Signup, login and begin interacting with the various features and start testing for vulnerabilities instantly.
Jump into our treasure trove of security related content and begin your journey into the world of bug bounties! Learn about the various types of security vulnerabilities, explore disclosed vulnerabilities & read guides to help you with bug bounties.
New to bug bounties and need a helping hand on how to get started? Or perhaps you're interested in learning about various tools used by top bug hunters? Look no further, we've got it all covered for you here.
Our guide on how to get easily get started in bug bounties and begin hunting for vulnerabilities from the comfort of your own home
Learn about the different types of XSS and how to begin hunting for them
A variety of tools to help you with your hunt
Gain insight into why top bounty hunters use WayBackMachine to help them discover web application vulnerabilities