BugBase Documentation
  • 👋Welcome to BugBase Docs
  • Overview
    • 💡What we do
    • ⚡Changelogs
    • ✨Our Features
    • 📂Programs at BugBase
      • Vulnerability Disclosure Program (VDP)
      • Bug Bounty Program
      • Private Bounty Program
      • Pentest Program (VAPT)
  • Report Lifecycle
    • Bug Report
    • Report Status
  • How To
    • 👨‍💻Invite Organization Members to BugBase (RBAC)
    • 🚩Setup a Campaign for better program engagement
    • 🐛Submit a Bug Report on BugBase
    • 📑Create a Bug Bounty Program on BugBase
    • ⬇️Download the mobile app
  • Company Guide
    • 👨‍💼Create a Company Account
    • 🧭Navigation
    • 🛡️Assets Dashboard
    • 🗝️Credential Vaults
      • Creating a Credential Vault
      • Adding Credentials to Vault
      • Connect Credential Vault to an Asset
      • Require Whitelisting for a Credential
    • 🔐VPN Servers
      • Create, Configure and Deploy VPN server
      • Monitor Live Statistics and Logs
    • 🗂️Programs Dashboard
      • ⛳Create a Program
    • 📢Customer Support
    • 💵Bounty Bin
    • ⚙️Company Settings
      • 👨‍🏫Profile
      • 🏢Organisation
      • 👨‍🏭Roles and Permissions
      • 🔐Security & Authentication
        • Multi-Factor Authentication
        • SSO with SAML
          • Okta SSO setup via SAML
          • Google SSO setup via SAML
      • 🎨Customization
        • Automations
        • Report Tags
      • 📙Manage Access
    • 📈Insights Dashboard
    • 🔊Campaigns
    • 💲Understanding Currencies Used in BugBase
    • 🤝Whitelist
  • Program guide
    • Bug Bounty Dashboard
      • Program Reports Section
        • Report Components
        • Report Actions
        • Duplicating Reports
        • Assigning Swags
        • Assigning Bounties
        • Assigning Thanks to Reporters
        • Assigning Bonus Bounty
        • Automatic Response Generator using ChatGPT
      • Program Policy
        • Editing Program Policy
          • Best Practices For Designing Policy
          • Best Practices For Bounty Tables
      • Payouts
      • Settings
    • Private Bug Bounty Dashboard
      • Invite Hackers
      • Manage Credentials
    • VDP Dashboard
    • Pentest Dashboard
      • Pentest Overview
      • Vulnerabilities Section
        • Pentest Report Components
        • Pentest Report Actions
      • Global Pentest Chat
    • Competition Dashboard
      • Dashboard
      • Creating a Competition
        • Adding Challenges
      • Manage Competitions
        • Statistics
        • Leaderboard
        • Manage Users
  • Bounty Hunter Guide
    • Bounty Hunter Dashboard
    • Bounty Hunter Profile
    • Programs Directory
      • Program Policy Page
      • Credentials
      • VPN Access
      • Whitelist
      • Collaborate
    • Bounty Hunter Reports Section
      • Submitting Reports
      • Interaction with Program Representees
      • Collaboration
      • Response Generation through ChatGPT on Report Chat
    • Competitions
    • Discord Community
    • Leaderboard
    • Multi-Factor Authentication
    • Settings
      • Verify KYC
    • Email Alias
    • 🚀Apollo Community
  • Integrations
    • 🔗Supported Integrations
    • Webhooks
    • JIRA
      • Creating a JIRA Issue
    • Slack
      • Managing Integration
    • Microsoft Teams
    • Github
    • Asana
    • Sumo Logic
    • PagerDuty
  • on-premise
    • Running Automated Testing
    • Sandbox Environment
Powered by GitBook
On this page
  • Subsections
  • Public Programs
  • Private Programs
  • Programs not listed on BugBase
  • Saved Programs

Was this helpful?

  1. Bounty Hunter Guide

Programs Directory

List of all Active Programs on BugBase

PreviousBounty Hunter ProfileNextProgram Policy Page

Last updated 1 year ago

Was this helpful?

Subsections

The Programs Directory is sub divided into three categories all of which present bug bounty programs to the hackers. The sections are as follows:

  • Public Programs

  • Private Programs

  • Programs Not Listed on BugBase

  • Saved Programs

Public Programs

This section provides the hackers with a plethora of bug bounty programs which are hosted by various organizations.

The organization name is accompanied by their Launch date, bounty range and labels which provide some additional information to the hacker so that they can pick a program that they like.

Program Policy, Scope Restrictions and other statistics of the programs can be viewed by clicking on the program.

Private Programs

This section show the hacker what private programs they have access to and similar Launch Date, bounty range and labels are present which again, provide additional information to the hacker about the program.

Just like the public programs, the program policy, scope restrictions and other statistics of the programs can be viewed by clicking on the program.

Programs not listed on BugBase

This section allows a hacker to submit a report for a bug bounty program which is not listed on BugBase.

BugBase makes an effort to allow hackers to submit the reports to other bug bounty programs as well.

Saved Programs

This section allow hackers to access programs they have previously saved. This section provides a convenient and organized way for hackers to access and manage the programs they use most frequently, without having to search. Information like Launch Date, bounty range and labels are present which again, provide additional information to the hacker about the program.

This allows for quick and efficient follow-up on resolved bugs, and helps to keep track of all reported issues.

Public VDP/BugBounty Programs
Private Bug Bounty Programs
Submitting Reports to a program that doesn't exist on BugBase