Programs Overview¶
This section contains detailed documentation for individual HackerOne bounty programs, including reconnaissance findings, vulnerability assessments, and program evolution tracking.
📋 Program Categories¶
Active Programs¶
Currently running bounty programs with ongoing research activities.
Archived Programs¶
Completed or discontinued programs with historical documentation.
Program Templates¶
Standardized documentation templates for consistent program documentation.
🎯 Program Documentation Structure¶
Each program follows a standardized structure:
program-name/
├── README.md # Program overview and quick reference
├── scope.md # Detailed scope analysis
├── reconnaissance/ # Target enumeration and discovery
├── vulnerabilities/ # Identified security issues
├── timeline.md # Chronological updates and changes
└── assets/ # Screenshots, diagrams, and evidence
📊 Quick Stats¶
Program Statistics
- Total Programs Documented: 0
- Active Research: 0 programs
- Archived Research: 0 programs
- Average Program Duration: N/A
🚀 Getting Started¶
Adding a New Program¶
- Create a new directory under
programs/with the program name - Use the program template for initial documentation
- Follow the standardized structure for consistency
- Update navigation in
mkdocs.ymlif needed
Documentation Best Practices¶
- Consistent Naming: Use lowercase with hyphens (e.g.,
example-corp) - Date Stamps: Include dates for all observations and updates
- Evidence: Store screenshots and files in the
assets/subdirectory - Links: Cross-reference related programs and techniques
- Legal Compliance: Ensure all documentation follows responsible disclosure
🔍 Search and Navigation¶
Use the search functionality to quickly find: - Specific programs by name or company - Vulnerability types across programs - Techniques used in different contexts - Timeline entries for specific dates
⚖️ Legal Considerations¶
Important Guidelines
- Only document authorized bounty programs
- Follow each program's specific terms and conditions
- Respect scope limitations and exclusions
- Practice responsible disclosure for all findings
- Never include live credentials or sensitive data
Ready to start documenting? Check out our templates to get started!