└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # Welcome to the Source Code Review Resources of 2022! 2 | 3 | This is a highly curated and well-maintained learning resource for source code review in bug bounty which includes blogs, YT Videos, and Books. 4 | 5 | 1. [JavaScript Code Review Guide for Bug Bounty Hunters](https://medium.com/techiepedia/javascript-code-review-guide-for-bug-bounty-hunters-c95a8aa7037a)- MikeChan | Blog 6 | 2. [Code-Review from Bug Bounty Bootcamp](https://attacker-codeninja.github.io/2021-08-24-code-review-notes-from-bug-bounty-bootcamp/)- Vickie Li | Blog 7 | 3. [Code Review Video by OWASP develop](https://youtu.be/fb-t3WWHsMQ)- OWASP Develop | YT Video 8 | 4. [Analyze Code for Bugs](https://youtu.be/A8CNysN-lOM)- BugBountyHunter.Com & Vickie Li | YT Video 9 | 5. [Analyzing JS Files](https://youtu.be/8sfc0PlVyWA)- XSSRat | YT Video 10 | 6. [Code Review With Chrome Extension](https://youtu.be/hmNNPUicpuY)- BugCrowd | YT Video 11 | 7. [Source Review](https://youtu.be/i4fd2Va3Jtg)- HackerOne | YT Video 12 | 8. [Sources & Sinks](https://youtu.be/ZaOtY4i5w_U)- LiveOverFlow | YT Video 13 | 9. [Code Review: The Offensive Security Way](https://youtu.be/weFl9bDnRiA)- Ekoparty Security Conference | YT Video 14 | 10. [Code Review by OWASP](https://www.google.com/url?sa=t&source=web&rct=j&url=https://owasp.org/www-pdf-archive/OWASP_Code_Review_Guide_v2.pdf&ved=2ahUKEwiZyL26sfz0AhWpgtgFHXX2AMY4ChAWegQIBRAB&usg=AOvVaw2_t69DAMPKMYdQphJj-LHL)- OWASAP Official | Book PDF 15 | 11. [JS file analysis](https://research.securitum.com/art-of-bug-bounty-a-way-from-js-file-analysis-to-xss/)- Securitum | Blog 16 | 12. [Source Code Review 101](https://medium.com/@Paul_io)- Paul | Blog Series 17 | 13. [AppSec Source code review](https://youtu.be/Kepd1HsoE8o)- OWASP AppSec Day | YT Video 18 | 14. [Security for Developers](https://youtu.be/qjrkV4RjgIU)- FreeCodeCamp | YT Video 19 | 20 | Credits: [Rahul Bhichher](https://twitter.com/rbhichher) 21 | --------------------------------------------------------------------------------