# Overview

- [Let's Start](/bug-bounty-notes/overview/lets-start.md)
- [Exploring Top Platforms and Websites for Hacking Practice and Learning](/bug-bounty-notes/overview/lets-start/exploring-top-platforms-and-websites-for-hacking-practice-and-learning.md)
- [Resources](/bug-bounty-notes/overview/lets-start/resources.md)
- [30 cybersecurity search engines](/bug-bounty-notes/overview/lets-start/resources/30-cybersecurity-search-engines.md)
- [From Zero to Hero: Navigating Linux Commands Like a Pro](/bug-bounty-notes/overview/lets-start/resources/from-zero-to-hero-navigating-linux-commands-like-a-pro.md)
- [Cracking the Code: How Damn Vulnerabilities Lab List Can Make You a Cybersecurity Pro](/bug-bounty-notes/overview/lets-start/resources/cracking-the-code-how-damn-vulnerabilities-lab-list-can-make-you-a-cybersecurity-pro.md)
- [Level Up Your Cybersecurity Skills: A TryHackMe Roadmap for Success](/bug-bounty-notes/overview/lets-start/resources/level-up-your-cybersecurity-skills-a-tryhackme-roadmap-for-success.md)
- [The Ultimate Guide to Mastering Offensive Virtual Machines for Ethical Hacking](/bug-bounty-notes/overview/lets-start/resources/the-ultimate-guide-to-mastering-offensive-virtual-machines-for-ethical-hacking.md)
- [Stay One Step Ahead of Hackers: Discover the Ultimate Cybersecurity YouTube Channels](/bug-bounty-notes/overview/lets-start/resources/stay-one-step-ahead-of-hackers-discover-the-ultimate-cybersecurity-youtube-channels.md)
- [All DAMN vulnerable resources](/bug-bounty-notes/overview/lets-start/resources/all-damn-vulnerable-resources.md)
- [Hacking Resources](/bug-bounty-notes/overview/lets-start/resources/hacking-resources.md)
- [OSINT](/bug-bounty-notes/overview/osint.md)
- [Exploring the Digital Universe: Mastering Tools for IP, Domain, and Email Analysis🌐🔍💼](/bug-bounty-notes/overview/osint/your-ultimate-guide-tools-for-ip-domain-and-email-analysis.md)
- [Google Hacking using Dorks](/bug-bounty-notes/overview/google-hacking-using-dorks.md)
- [Essential Bug Bounty Resources: Books and References](/bug-bounty-notes/overview/google-hacking-using-dorks/books-and-references.md)
- [Optimizing Bug Bounty with GitHub Dorks: A Comprehensive Guide](/bug-bounty-notes/overview/google-hacking-using-dorks/github-dorks.md): https://github.com/0xPugazh/Awesome-Dorks - Reference
