Pentesting:

	https://www.tutorialspoint.com/penetration_testing/penetration_testing_tutorial.pdf

	https://github.com/AJProjectEureka/Hacking/blob/master/Penetration%20Testing%20A%20Hands-On%20Introduction%20to%20Hacking.pdf

	https://repo.zenk-security.com/Magazine%20E-book/Penetration%20Testing%20-%20A%20hands-on%20introduction%20to%20Hacking.pdf

	https://www.pdfdrive.com/penetration-testing-a-hands-on-introduction-to-hacking-e36645450.html

Security Assessments:
		
	https://www.holmsecurity.com/security-assessments

	https://www.isaca.org/resources/isaca-journal/past-issues/2010/performing-a-security-risk-assessment

	https://www.infradata.com/news-blog/the-5-key-cyber-security-assessment-types/

	https://en.wikipedia.org/wiki/Information_technology_security_assessment

	https://danielmiessler.com/study/security-assessment-types/

VAPT:

	https://www.redscan.com/services/penetration-testing/vapt/

	https://www.guru99.com/vulnerability-assessment-testing-analysis.html

	https://vapt.in/

	https://cyberops.in/vapt

	https://www.esecforte.com/services/vapt-security-testing-services/

	https://danielmiessler.com/study/security-assessment-types/

	https://github.com/PetaByte89/VAPT-Vulnerability-Assesment-And-Penetration-Testing

	https://gist.github.com/MrMugiwara/6bb7e3f64b5890a18317e7a7f34ddbe0

	https://github.com/Hackscode/Automate-VAPT

	https://github.com/TruBurbank/VAPT-Report-Generator/blob/master/ReportGenerator.py

	https://www.bugcrowd.com/resource/code-of-conduct/

Bug Bounty GitHub:

	https://github.com/enaqx/awesome-pentest

	https://bounty.github.com/

	https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

	https://github.com/djadmin/awesome-bug-bounty

	https://github.com/EdOverflow/bugbounty-cheatsheet

	https://github.com/devanshbatham/Awesome-Bugbounty-Writeups

	https://github.com/Muhammd/awesome-bug-bounty

	https://github.com/EdOverflow/bugbounty-cheatsheet

	https://github.com/disclose/disclose

Bug Bounty Medium:
	
	https://medium.com/bugbountywriteup/the-bug-bounty-mindset-that-leads-to-success-5bf32dcab48

	https://medium.com/swlh/mastering-the-skills-of-bug-bounty-2201eb6a9f4

	https://medium.com/inbughunters/getting-started-in-bug-bounty-7052da28445a

	https://chawdamrunal.medium.com/pro-tips-for-bug-bounty-f9982a5fc5e9

	https://medium.com/bugbountywriteup/tagged/bug-bounty

	https://medium.com/bugbountywriteup/how-to-get-started-into-bug-bounty-1be52b3064e0

	https://medium.com/seconset/how-to-get-started-into-bug-bounty-deb1c61793b6

Pentesting Medium:

	https://medium.com/hootsuite-engineering/penetration-testing-d887d081c5c5

	https://medium.com/bugbountywriteup/31-tips-api-security-pentesting-480b5998b765

	https://exploityte.medium.com/penetration-testing-3882124f411c

	https://medium.com/@Aptive/what-is-penetration-testing-16603da21bbb

	https://medium.com/@gergely.revay/how-to-become-a-web-pentester-526a4da541f8

	https://medium.com/@asfiyashaikh10/web-services-api-pentesting-part-1-464313481720

	https://medium.com/@jeremy.trinka/five-pentesting-tools-and-techniques-that-sysadmins-should-know-about-4ceca1488bff

	https://medium.com/exploitable/penetration-testing-100-terms-you-need-to-know-a723c38cd8c8

	http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines#Reporting

	https://medium.com/bugbountywriteup/bug-bounty-hunting-methodology-toolkit-tips-tricks-blogs-ef6542301c65

	https://whoami.securitybreached.org/2019/06/03/guide-getting-started-in-bug-bounty-hunting/

Bug Bounty Reporting:

	https://naveenroy008.medium.com/how-to-write-a-bug-bounty-report-ffe60c4ae702

	https://corneacristian.medium.com/top-25-rce-bug-bounty-reports-bc9555cca7bc

Responsible Disclosure:

	https://en.wikipedia.org/wiki/Responsible_disclosure

	https://www.bugcrowd.com/resource/what-is-responsible-disclosure/

	https://www.pon-cat.com/en/responsible-disclosure

	https://www.smokescreen.io/responsible-disclosure-policy/

	https://www.securitas.com/en/about-us/responsible-disclosure/

	https://www.hackerone.com/responsible-disclosure-overview

Bug Bounty Platforms:

	https://www.intigriti.com/

	https://www.bugcrowd.com/

	https://www.hackerone.com/

	https://hackenproof.com/

	https://www.synack.com/

	https://www.yeswehack.com/

	https://yogosha.com/

	https://www.openbugbounty.org/

	https://www.zerocopter.com/