User Guide
Bug Bounty Center is a self-hosted platform for bug bounty hunters. It runs locally on your machine as a Docker container and brings together 40+ features covering every phase of the hunting workflow. This guide covers every section of the application.
Global Search
Press Ctrl+K (or Cmd+K on Mac) at any time to open the global search. It searches across everything in your database in real time: programs, targets, vulnerabilities, reports, tasks, notes, scripts, snippets, payloads, dorks, wordlists, Nuclei templates, methodologies, checklists, writeups, lessons learned, auth flows, business flows, API documentation, hunting sessions, weekly goals, collaborations, CVE entries, glossary terms, and the tools catalog.
Results are grouped by type and navigable with the keyboard. You can also use it as a quick way to jump between sections by typing the section name.
Multipanel Layout
Bug Bounty Center supports a multipanel layout that lets you view up to four sections at the same time. You can choose between five layout modes: single view, two panels side by side, two panels stacked vertically, three panels, or four panels in a grid.
Each panel operates independently. You can select which section to display in each panel, navigate within it, and maximize or close individual panels. The layout and panel assignments are saved automatically and restored when you reopen the application.
Scratchpad
Press Ctrl+. at any time to open the Scratchpad, a floating notepad that stays on top of whatever section you are working in. It supports up to 5 independent tabs, so you can keep multiple quick notes open at the same time.
The Scratchpad auto-saves as you type and persists across sessions. You can also send any scratch note directly to the Notepad section with one click if you want to keep it long-term.
Buggy Assistant
Buggy is the platform's built-in assistant. It appears as a floating terminal in the bottom-right corner of the screen and has read access to all your application data: programs, targets, vulnerabilities, reports, tasks, sessions, workflows, notes, mood entries, and more.
You can ask Buggy questions about your data, get summaries of your current workload, or use it as a quick way to query information without navigating to a specific section. Buggy processes everything locally and does not send any data to external services.
Buggy is currently in early beta and under active development.
1. Dashboard
The Dashboard is the first screen you see when you open Bug Bounty Center. It provides a real-time overview of your entire hunting activity.
A line chart tracking four metrics over time: bounty earned, reports submitted, accepted vulnerabilities, and acceptance rate. Toggle each metric on or off and switch between three time ranges (6 months, 1 year, or all time).
Five charts covering: program status distribution, severity breakdown, vulnerability types, pending vs. resolved, and report status distribution.
The Schedule widget shows your upcoming hunting sessions. The Program ROI chart ranks your programs by earnings and rating.
An integrated task list where you can create, complete, and delete tasks directly from the Dashboard. Tasks support three priority levels, optional program assignment, and due dates.
A contribution heatmap showing your daily activity over the past year, calculated from programs, reports, vulnerabilities, collaborations, and completed tasks.
2. Schedule
A calendar-based planner for organizing your hunting sessions with four views: day, week, month, and year.
Shows a single day with all scheduled sessions on the left and a 24-hour timeline on the right.
Seven day columns in a grid. Toggle between fixed Monday-Sunday or rolling "next 7 days" layout.
Traditional calendar grid. Click any day to jump to the day view.
All 12 months as mini-calendars. Days with sessions are highlighted.
Each session has a title, type (Recon, Testing, Reporting, Learning, or Break), and a scheduled date. Optionally assign a program and target, set start time and duration, define objectives, specify tools, and add notes. Supports recurrence (daily, weekly, or custom days).
If you have set weekly goals with review notes, a Weekly Review panel appears in the sidebar.
3. Tasks
A dedicated task manager with more functionality than the Dashboard task list.
Four cards showing total pending, high-priority, due within 3 days, and completed tasks.
Search by title and description. Filter by priority (high, medium, low) and category (Recon, Testing, Exploit, Report, Learning, Other). Toggle visibility of completed tasks.
Create or edit with title, description, priority, due date, category, program assignment, subtasks (added inline), and a linked item system referencing items from 16 different sections.
4. Notepad
A three-panel note-taking system for organizing research, findings, and free-form text.
Default folders: All Notes, Pinned, General, Research, Targets, Payloads, Ideas. Create custom folders. Archived section for old notes.
Plain-text editor with auto-save. Color assignment (8 colors), pin toggle, move to folder or archive, and delete with confirmation.
Notes sent from the Scratchpad automatically appear in the General folder.
5. Focus
A configurable timer for structuring your hunting sessions into focused work intervals with breaks.
Configure focus duration, break frequency, break duration, and alert sound (Bell, Chime, Beep, Digital, or None).
Large countdown display with progress bar. Controls for Start/Pause, Reset, and Skip Break. Optionally select a program and set a session name.
Four cards: today's focus time, weekly total, consecutive-day streak, and all-time completed sessions.
When you leave the Focus page with an active timer, a floating mini-timer appears in the bottom corner so you can manage your timer from any section.
6. Methodology
Create, organize, and consult your personal hunting methodologies. This is the core of the platform's value as a methodology builder.
A collapsible reference panel providing a comprehensive bug bounty testing framework organized into 9 categories: Reconnaissance, Enumeration, Vulnerability Analysis, Mobile Security, API Security, Cloud and Infrastructure, Exploitation and Validation, Reporting, and Post-Reporting.
Search by name, filter favorites, and create new methodologies. Displayed as cards with name, section/step counts, description, and tags.
Full-screen modal with View Mode (clean read-only rendering) and Edit Mode (build structure with sections, items, and sub-items nested up to 10 levels deep). Keyboard navigation: Tab to increase nesting, Enter on empty input to decrease.
7. Research
A hub grouping six knowledge-base tools.
A two-panel knowledge base for documenting vulnerability types. 65+ types across 11 categories. Each entry has dozens of fields organized into collapsible sections: core knowledge, detection and exploitation, severity assessment, remediation, tooling, reporting templates, references, and bounty context.
A three-panel writeup analysis tool. Paste writeup content, switch to read mode to highlight passages. Highlights use 5 color-coded categories: Key Techniques, Tools/Commands, Endpoints/Params, Bypass Techniques, and Impact/Escalation.
A visual diagramming tool. Create mind maps from scratch or from predefined templates. Nodes support multiple types and connections support labeled edge types. Export to Markdown.
A curated database of CVEs relevant to bug bounty. Searchable with filters for severity. Each CVE includes details, testing guides, and related payloads.
An interactive glossary with 150+ terms covering vulnerabilities, techniques, protocols, and security concepts. Searchable and filterable by category and difficulty.
A reference database of common misconfigurations organized by technology (Nginx, Apache, IIS, Cloud, Docker, Firebase, CORS, Security Headers, WordPress, Jenkins, Kubernetes, Git).
8. Vuln Guides
A comprehensive, read-only reference library covering 30 vulnerability classes in a tabbed interface: Subdomain Takeover, Account Takeover, Registration and Pre-Hijack, Cache Attacks, Clickjacking, Template Injection, Path Traversal, Command Injection, Cookie Hacking, CORS Bypass, CRLF Injection, CSRF, Dependency Confusion, Deserialization, File Inclusion, File Upload, HTTP Request Smuggling, IDOR, JWT Attacks, Mass Assignment, SQL Injection, NoSQL Injection, Open Redirect, Parameter Pollution, PostMessage, Race Condition, SAML Attacks, SSRF, XXE, and XSS.
Each guide shows the total number of attack categories and techniques, a search bar with expand/collapse controls, and a list of collapsible category cards. Each category contains techniques with descriptions, step-by-step instructions, and optional pro tips.
The Subdomain Takeover guide additionally includes a Fingerprint Database with status cards (Confirmed Vulnerable, Edge Cases, Not Vulnerable) and searchable service entries with CNAME patterns and response fingerprints.
9. Bypasses
A read-only reference database focused on techniques for bypassing security controls, organized in 7 tabs: WAF Bypass, 2FA/MFA/OTP, CAPTCHA, Login, Password Reset, Rate Limit, and Payment.
The WAF Bypass tab organizes payloads by bypass type: WAF Rule Bypasses, Application Filter Bypasses, Parser Quirk Exploits, and Encoding Gap Exploits. Search by payload or description. Filter by context (XSS, SQLi, RCE, Path Traversal, SSRF, Header Injection, General). Each bypass includes the payload, context badge, and a technical description.
All other tabs follow the same structure with attack categories, techniques, steps, and pro tips.
10. Where to Hunt
A quick-reference mapping vulnerability types to the application areas where they are most commonly found.
Stats show vulnerability types covered, total hunting locations, and high-priority count. Search by location name and filter by priority level. Each vulnerability type expands to show a table with location, description, copyable example payloads, and priority badge.
11. Checklist
Build and track methodology checklists with nested items and per-item progress.
Checklists displayed as cards with name, category/item counts, progress bar, favorites toggle, and delete button.
Full-screen view with numbered categories, per-category progress bars, and checkable items. Completed items show with strikethrough.
Items can be checked, annotated with notes, nested up to 10 levels deep, and deleted. Keyboard navigation: Tab increases depth, Shift+Tab decreases, Enter adds, Enter on empty returns to parent.
12. Programs
The central hub for managing bug bounty programs.
Stats cards for total, active, paused, and inactive programs. Search by name or platform. Filter by platform (23 options), status, and type. Sort by rating or status.
Sortable columns for name, platform, type, status, interactive rating (1-5 stars), bounty range, and actions.
A persisted list of programs you are interested in but not yet hunting. Quick add with name, platform, and URL.
Full program workspace with Program Intel (reports, vulnerabilities, assets, technologies, WAFs), requirements and notes, bounty ranges, in-scope and out-of-scope targets, business logic section, credentials vault (encrypted, master password protected), and ROI calculator.
13. Auto-Recon
A fully automated reconnaissance pipeline that orchestrates 20+ security tools through a Docker-backed backend. Two views: Configure (build and launch scans) and History (review past scans).
Organization (full digital footprint mapping), Domain (deep-dive on a single domain with fuzzing, crawling, JS analysis), and Single Target (focused host analysis with Nuclei fingerprinting using ~3800 templates).
Stealth (passive only, minimal threads), Balanced (mixed passive/active, medium threads), and Aggressive (full active recon, full port range 1-65535).
Pipeline log with timestamps, current step/tool indicator, system resource usage, queue status, pause and stop controls.
Select results to build a Markdown reconnaissance brief with findings, scan metadata, and hunter notes. Downloads as a .md file.
Export selected results directly into the linked program's Reconnaissance section as structured assets.
14. Reconnaissance
A structured asset inventory for tracking everything discovered during reconnaissance, organized by program.
9 categories with 50+ asset types: Network (Subdomain, IP, URL, Endpoint, Port, Parameter, JS File), Cloud (S3, GCS, Azure, Lambda, Kubernetes), Infrastructure (ASN, IP Range, CDN/WAF, Technology), Code (Repository, Leak, Commit), Mobile (Android, iOS, Backend, Deep Link), APIs (Endpoint, Schema, GraphQL, Webhook), AI/ML (LLM, Model, Agent, Training Data, Prompt Surface), Supply Chain (Scripts, CDN, npm, Dependencies, iFrame), Extensions (Chrome, Firefox, Plugin, Extension API).
Categories View (assets by tab) and Overview Mode (all categories with counts). Quick filter presets: High Interest, Untested, In Progress, Network + High Interest.
Add individual assets with type, value, interest level, exploit status, impact, HTTP status, hypothesis, notes, technologies, and WAFs. Bulk import supports one value per line.
15. Attack Graph
A visual diagramming tool for mapping and analyzing attack paths using an interactive canvas.
53 node types across 8 categories. 19 relationship types across 5 categories, including animated edges for critical relationships like "Bypasses Auth" and "Exfiltrates To."
8 pre-built patterns: Authentication Bypass, IDOR Chain, SSRF to Internal, JWT Confusion, Stored XSS Chain, SQLi to Data, Open Redirect Chain, and Privilege Escalation.
Analyzes the graph and detects 16 vulnerability patterns by severity with OWASP references.
Discovers up to 10 paths between any two nodes, tracking authentication requirements.
JSON (full data) or Markdown (structured report with nodes, relationships, and issues).
16. Auth Flows
A dedicated workspace for testing authentication and authorization mechanisms. Structured as a project-based system.
25 auth-specific node types across 9 categories. 18 edge types across 7 categories. 7 pre-built templates: OAuth 2.0 (PKCE), JWT, Session Cookie, MFA, Password Reset, SAML SSO, and API Key Authentication.
55 pre-built security tests in 13 categories. Each test has 6 status options: Not Tested, Secure, Vulnerable, Weak, Needs Investigation, N/A. Also supports importing custom checklists.
A searchable database of 400+ default credentials organized by category (CMS, Database, Network, DevOps, Server, IoT, Cloud, Other).
17. Business Flows
A visual mapping and testing workspace for identifying business logic vulnerabilities.
12 pre-built flow templates in 4 categories (Money and Value, Auth and Authorization, Sensitive Data, State Transitions), each with pre-configured nodes, connections, and security tests.
Three-panel layout with connection type sidebar (16 edge types), interactive canvas (10 node types), and node detail panel with test management. 8 test types including IDOR, Race Condition, Step Bypass, and Value Manipulation.
47 curated business logic flaw test cases tracked per program across 6 categories: Payment and Pricing, Auth and Access Control, Data and State Manipulation, Race Conditions, Workflow Bypass, and Feature Abuse.
18. Vulnerabilities
The central registry for tracking all discovered security issues.
Severity stats, search and program filter, sortable table with title, severity badge, CVSS score, status (New, Triaged, Accepted, Rejected, Duplicate, Fixed), program, and linked report.
Form with program, linked report, vulnerability type (80+ types in 11 categories), title, affected asset (with automatic scope validation), severity, status, CVSS score and vector string, description, proof of concept, impact, and screenshot evidence (drag-and-drop, up to 10 images).
6 auto-computed metrics (total found, highest CVSS, acceptance rate, top vuln type, best month, accepted count). Track hunting objectives with title, target severity, deadline, notes, and completion toggle.
Interactive calculator with Base (8), Temporal (3), and Environmental (3) metrics. Real-time score display with circular indicators, gradient bar, and vector string generation.
Create escalation sessions from existing vulnerabilities. Visual escalation flow diagram with 10 pre-defined techniques. Chain vulnerabilities together to demonstrate compound impact.
19. Reports
Tracks vulnerability submissions and provides a draft system for preparing reports.
Stats (total, accepted, pending, duplicate, rejected), search and program filter, sortable table with status badges, severity, bounty amount, and actions.
10 auto-computed metrics: total earnings, highest bounty, best month, acceptance rate, longest accepted streak, and severity-level counts.
Create drafts with title, severity, vulnerability type, target program, endpoint, and content fields (summary, steps to reproduce, impact, PoC, remediation, personal notes). All content fields support Markdown with a live Preview mode.
Full submission form with program, linked vulnerability, target URL (with scope validation), title, platform report ID, date, status, severity, bounty amount, notes, and Markdown content fields.
20. Payloads & Dorks
The largest module, combining Google dorking management, custom payload storage, and a built-in payload reference library.
Set a target domain to automatically adapt all dorks with site:. Create custom dorks with name, category, and query. Ready-to-Use Dorks section with pre-built collection across 15 categories.
Create payload lists organized by vulnerability type (14 types). Multi-select type filter. Each payload is clickable to copy.
39 sub-tabs covering SSRF, SQLi, XSS, XXE, SSTI, Redirect, Path Traversal, LFI/RFI, Command Injection, IDOR, CORS, CRLF, NoSQL, LDAP, GraphQL, JWT, Upload, Prototype Pollution, Deserialization, Mass Assignment, Cache Poisoning, Web Cache Deception, HTTP Smuggling, and more. Each sub-tab provides categorized payloads with descriptions and copy buttons.
21. Scripts & Templates
Manages custom hunting scripts and Nuclei vulnerability scanner templates.
12 category filters (Recon, Enumeration, Fuzzing, Scanning, Exploit, OSINT, Automation, Parsing, Wordlist, Cleanup, Reporting, Misc) and 7 language filters (Bash, Python, JavaScript, Ruby, Go, Rust, PowerShell). Terminal-styled code preview with copy (auto-generated header).
Two-level category filter with 11 vulnerability categories and 63 specific types. Each template shows severity badge, code preview with line numbers, tested status toggle, and use count. Copy auto-generates full Nuclei YAML structure.
22. Command Snippets
A library for reusable commands, one-liners, and tool configurations.
Set a target domain to replace placeholders in all commands. Create snippets with name, description, command, category (19 options), language, and tags. Copy count tracks usage.
Curated library of one-liners from experienced hunters, grouped by 17 categories. Each snippet shows command, explanation, tools used, and button to add to your library.
Interactive command generator for 20 security tools (Nmap, ffuf, Nuclei, SQLmap, Subfinder, httpx, Amass, and more). Built-in and custom presets, live command preview, and save to snippets library.
23. Analyzer
Three client-side security analysis tools for inspecting code and URLs.
Paste or upload JavaScript files. 10 detection categories: API Endpoints, API Keys and Tokens, Secrets and Passwords, URLs and Connections, AWS Infrastructure, Sensitive Comments, Debug Code, Backdoors and Bypasses, PII, and Obfuscation. Includes Shannon entropy analysis. Export as JSON.
Paste URLs in bulk. Analyzes for attack surface indicators across 8 vulnerability classes (IDOR, LFI, Open Redirect, SSRF, SQLi, XSS, RCE, Auth Token Leak) plus 20+ interesting parameters and path patterns. Each URL receives a composite score.
Multi-language secret scanner supporting 20+ file types. 14 detection categories: Cloud Provider Keys, Payment and SaaS, Communication, Database Credentials, Private Keys, OAuth and JWT, Env/Config Leaks, Hardcoded Credentials, Infrastructure Secrets, Webhooks, Encryption, Internal Infrastructure, and Dangerous Functions.
24. API Documentation
A centralized repository for storing, managing, and analyzing API specifications.
Import from OpenAPI JSON/YAML, Postman Collection v2.1, or manual entry. Auto-detection of format.
Automated engine detects IDOR, admin endpoints, internal exposure, file upload, data export, sensitive parameters, account takeover paths, injection points, SSRF/redirect risks, user enumeration, privilege escalation, and mass assignment.
Grouped by path segment. Each shows method badge, path, status, security findings, parameters table, headers, body/response examples, notes, and 3 cURL generators (normal, no-auth, IDOR test).
Generates a fuzzing wordlist from your API documentation with 9 sections: full paths, directories, path segments, path variants, extension variants, parameters, query parameters, body fields, and hidden parameter candidates.
25. Wordlists
A personal wordlist library and an advanced wordlist generator.
7 categories (Directories, Subdomains, Parameters, Usernames, Passwords, Extensions, Custom). View, copy, download, edit, delete. Combinator Tool merges wordlists using union, intersection, or Cartesian product.
12 generation types. Input custom keywords, target domain, and REST resources. 10 tech-stack injections (Rails, Django, Spring Boot, Laravel, Next.js, WordPress, Express, ASP.NET, Flask, PHP). 8 mutation options. 5 engagement presets (Quick Recon, Standard Audit, Full Audit, Stealth Mode, Infrastructure). Export including Burp Suite format.
26. Request Logger
Save and analyze interesting HTTP requests and responses encountered during testing.
Two-tab form for request (title, vulnerability type, program, method, URL, headers, body) and response (status code, headers, body). Additional fields for tags, notes, and interesting flag.
Expandable cards with method badge, title, URL, tags, timestamp. Expanded view shows request/response with syntax highlighting, security findings, and actions (copy as cURL, copy as Markdown).
Automatic checks for CORS misconfiguration, cookie security flags (HttpOnly, Secure, SameSite), error/stack trace disclosure, sensitive data in responses, and information disclosure headers.
27. Encoder
A comprehensive multi-tool with 15 independent tabs for encoding, decoding, hashing, and data analysis.
11 encoders (Base64, URL, URL Full, HTML Entities, Hex, Unicode Escape, ASCII Decimal, Binary, ROT, ROT47, Gzip). Smart Decode auto-detects and chains decodings. Chain Mode for custom sequences.
5 hash algorithms (MD5, SHA1, SHA256, SHA512, SHA3). Hash Identifier with confidence levels. 4 HMAC algorithms.
Decoder, vulnerability analysis (none algorithm, weak algorithms, expiration), secret bruteforcer with 80+ weak secrets, "none" attack generator, and modified JWT generator.
Framework detection (9 frameworks), payload extraction, flag analysis, and vulnerability detection.
Pattern testing with match highlighting. Automated ReDoS vulnerability detection with complexity scoring and attack payload generation.
Format detection, sequential detection, timestamp detection, entropy analysis, per-position heatmap, pattern classification, enumeration simulation, and auto-generated Python script for IDOR testing.
Timestamp converter, JSON prettify/minify/validate, Diff viewer, SAML decoder with vulnerability detection, IP converter with SSRF bypass payloads, XML formatter, Certificate parser/comparator, and Multi-Format Converter.
28. Unicode Lab
Advanced Unicode security testing tools with 7 specialized tabs and an integrated Attack Workflow Guide.
6 attack scenarios: WAF Bypass, Auth/Username Filter Bypass, Domain Homograph Detection, File Extension Spoofing, Invisible Character Injection, Payload Verification.
Generates lookalike text using Cyrillic, Greek, Armenian, Bengali, Cherokee, and other scripts. 4 strategies: Full Replacement, Cyrillic-only, Greek-only, Mixed Script.
4 Unicode normalization forms (NFC, NFD, NFKC, NFKD) with character-by-character codepoint analysis.
Converts ASCII to fullwidth Unicode equivalents for WAF bypass.
25 invisible Unicode characters in 4 categories. Injection tool inserts selected characters between letters.
Generates filenames exploiting Right-to-Left Override for file extension spoofing.
Bypass Mode generates Unicode alternatives that transform to a target string after case conversion or NFKC normalization. Analyze Mode shows character-by-character breakdown.
29. API Key Checker
A reference tool for validating leaked or discovered API keys, sourced from the KeyHacks repository and verified against official API documentation.
76 API services across categories covering Code Hosting, Messaging, Cloud Providers, Payment, Communication, AI/ML, DevOps/CI/CD, Monitoring, Security, Productivity, Social, Maps/Geo, and more.
Each service provides: key pattern and example, a ready-to-use curl command that auto-updates when you paste your key, extra input fields when multiple credentials are needed, step-by-step verification instructions, expected success and failure response patterns, and link to API documentation.
30. Tools & Resources
Two tabs combining a curated tool catalog with a personal bookmarking system.
Approximately 485 external security tools in 19 categories: Reconnaissance, Scanning, Exploitation, Fuzzing, API Testing, Cloud, Authentication, Mobile, Wordlists, Web Resources, Browser Extensions, AI Assistants, Frameworks, CVE Tracking, Secrets and JS Analysis, Burp Extensions, CTF and Practice, Learning, and Oneliners. Each tool includes name, description, repository URL, tags, installation command, usage example, and feature list.
Full description, features grid, installation and usage commands with copy-to-clipboard, repository link, and up to 4 related tools.
A bookmarking system for saving security resources. 7 resource types (Writeup, Blog, Video, Cheatsheet, Tool, Course, Other). Create, edit, and delete with type and text filters.
31. Workflows
Visual workflow builder and freeform whiteboard.
Full-screen canvas with tool sidebar. Three node types: Tool nodes (drag from sidebar), Note nodes (import from Notepad), and Custom nodes (editable title, content, configurable color). Canvas interactions: drag-and-drop, click-to-connect, right-click-drag panning.
A freeform drawing canvas for sketching ideas, diagramming attack flows, or brainstorming during engagements.
32. Collaborations
Track hunting partners, shared earnings, and joint report statistics.
Four aggregate cards: Partners count, Your Earnings total, Total Shared amount, and Shared Reports count. Pending balance alert shows when money is owed in either direction.
Each partner tracks: alias, specialties (Web Apps, APIs, Mobile, Cloud, Network, IoT, Crypto/Web3), reports together, reports accepted (with computed success rate), shared bounty, your earnings, pending balance, last collaboration date, next plans, and notes.
Dedicated form pages for creating and editing partners with sections for basic info, specialties, collaboration stats (live success rate preview), earnings and balance, and contact/plans.
33. Achievements
A gamification system to track your progress as a hunter.
8 progression levels based on accumulated points: Rookie (0), Scout (50), Hacker (150), Hunter (300), Elite (500), Master (750), Legend (1000), Myth (1500). Each level has a unique icon and color.
5 tiers: Easy (10 pts, first-time actions), Medium (25 pts, regular milestones), Hard (50 pts, significant achievements), Legendary (100 pts, elite status), Mythic (250 pts, near-impossible goals). Approximately 90 achievements total.
Click any achievement card to toggle its unlock state. Filter by difficulty tier. Level progression display shows all 8 levels and your current position.
34. Mental Health
A wellbeing tracker to help you avoid burnout and maintain a healthy relationship with hunting.
Log your mood daily with 5 levels: Great, Good, Okay, Bad, Terrible. Mood streak shows consecutive days with the same mood.
Approximately 50 curated quotes auto-rotating every 8 seconds. Add your own custom quotes.
Tracks consecutive days of app usage. Manually add a bonus day or take a rest day (resets streak).
Visual progress bar: Healthy (green, 0-6 days), Warning (yellow, 7-13 days), Critical (red, 14+ days).
Bar chart visualizing mood data over 4 time ranges (today, week, month, year). Bars color-coded: green for Good/Great, yellow for Okay, red for Bad/Terrible.