Bug-Bounty-Methodology These are my checklists which I use during my bug bounty hunting. List Testing 2 Factor Authentication Captcha Bypass Bypassing CSRF Protection Testing Password Reset Functionality Bypassing Rate Limit Protection JWT Misconfiguration Contact Us