Bug Bounty Hunting
- Web Application Vulnerabilities
- Injection Vulnerabilities
- Cross-Site Scripting (XSS)
- Authentication and Session Vulnerabilities
- Access Control Vulnerabilities
- Security Misconfiguration
- Cross-Site Request Forgery (CSRF)
- Server-Side Request Forgery (SSRF)
- Deserialization Vulnerabilities
- Business Logic Vulnerabilities