A structured collection of public bug bounty and vulnerability disclosure programs
across multiple platforms worldwide.
This repository is designed to help security researchers quickly navigate, discover, and track bug bounty programs from different providers in one centralized place.
The Bug Bounty Programs Collection repository aggregates various platforms that host:
- π Bug Bounty Programs
- π Vulnerability Disclosure Programs (VDP)
- π° Responsible Disclosure Initiatives
- π’ Private & Public Security Programs
This project helps researchers:
- Discover new programs faster
- Organize reconnaissance targets
- Compare platforms
- Track opportunities across ecosystems
Below are major bug bounty and security disclosure platforms included in this repository:
- Bugcrowd
- HackerOne
- Intigriti
- YesWeHack
- Synack
- Cobalt
- Open Bug Bounty
- HackenProof
- Federacy
- Detectify Crowdsource
- Google VRP
- Microsoft MSRC
- Apple Security Bounty
- Meta (Facebook) Bug Bounty
- GitHub Security Lab
- Shopify Bug Bounty
- PayPal Bug Bounty
- Netflix Bug Bounty
- Uber Bug Bounty
- Airbnb Bug Bounty
- Binance Bug Bounty
- Coinbase Bug Bounty
- Kraken Security Program
- Crypto.com Bug Bounty
- Tether Security Program
- Blockchain.com Security
- Polygon Bug Bounty
- Ethereum Foundation
- Solana Security Program
- US Department of Defense (Hack The Pentagon)
- UK Government Vulnerability Disclosure
- Singapore GovTech
- European Union Bug Bounty
- Various National CERT Programs
- Company-hosted Responsible Disclosure pages
- ISO 29147-compliant VDPs
- Security.txt-based disclosures
- Self-hosted bounty portals
Example structure:
Bug-Bounty-Programs/
β
βββ bugcrowd/
βββ hackerone/
βββ intigriti/
βββ yeswehack/
βββ synack/
βββ crypto/
βββ tech-companies/
βββ government/
βββ README.md
Each folder may contain:
- Program lists
- Engagement details
- Scope references
- Research notes
- Automation scripts (if applicable)
This repository aims to:
- Centralize bug bounty intelligence
- Assist reconnaissance planning
- Improve researcher workflow
- Provide structured navigation across platforms
It is intended for:
- Ethical hackers
- Bug bounty hunters
- Security researchers
- Pentesters
- Red teamers
- Always read and follow each programβs rules.
- Only test targets that are explicitly marked as in-scope.
- Respect platform Terms of Service.
- Unauthorized testing is illegal.
This repository is for educational and authorized security research purposes only.
The author does not encourage or support illegal activities.
Users are responsible for ensuring compliance with all applicable laws and program policies.
SecAnalysts
Security Research & Automation
If this repository helps your research, you may support my work:
BTC Address:
1sAXERLyPhg4Fg4rkhuRQfm9eek2NJo6V
Your contribution supports continued development and my childβs education. π