Helping you connect the bug to bounty


Learn how to test for security vulnerabilities on web applications and learn all about bug bounties and how to get started. Browse and digest security researcher tutorials, guides, writeups and then instantly apply that knowledge on recreated bug bounty scenarios! Learn and then test your knowledge.

Made with by @zseano
Artwork by laracallejaillustrations


Web application hacking

New or experienced, test your skills against custom made web application challenges based on real bug bounty findings! Learn about new techniques and bypasses whilst embracing the mindset of a hacker. With a variety of challenges designed to teach you a broad amount of web application bugs there is something for everyone.

Can you discover how to bypass super secure XSS filters? Learn how developers make mistakes and how vulnerabilities end up in live code. The stage is yours, take it.


View available challenges

🔥 Level up

What's behind this admin panel?

For newcomers

Can you find any XSS? No HTML tags allowed!

🔥 Level up

Can you access our private tool, XSS Destroyer?

For newcomers

Can you obtain the sensitive information somehow?

Practise like a pro BugBountyHunter

Take your learning to the next level and learn to hack like a pro bug bounty hunter. Take advantage of our membership area which grants you access to a private platform and website to hack on. The website works just like a real one would meaning you can signup and interact with it and there is over 100 vulnerabilities waiting for you to discover! Real bugs from real life scenarios, all you have to do is understand the features & test for vulnerabilities! True hacker style.


INCLUDED zseano's methodology

zseano's methodology is a methodology/flow/checklist to follow when looking for vulnerabilities on web applications. It's a simple approach that has helped him discover over 1,000+ vulnerabilities on bug bounty programs! The guide contains a complete run-down of how zseano approaches hacking on web applications & how he applies this on bug bounty programs, including how to choose the right programs! Use the methodology on BARKER and begin practising the flow instantly.

Learn more »

"Hello Sean, I just DM'ed you to say I love you!, I got 7 XSS and a Open redirect on a private program today, all done with your methodology! Thank you so much! "

Top #30 BugBountyHunter Member, HolyBugx


Reading material

Jump into our treasure trove of security related content and begin your journey into the world of infosec! Learn about the various types of security vulnerabilities, explore disclosed vulnerabilities & read guides to help you with bug bounties.

New to bug bounties and need a helping hand on how to get started? Or perhaps you're interested in learning about various tools used by top bug hunters? Look no further, we've got it all covered for you here.


Recently Disclosed

From HackerOne.com. View more