Documentation

User Guide

Bug Bounty Center is a self-hosted platform for bug bounty hunters. It runs locally on your machine as a Docker container and brings together 40+ features covering every phase of the hunting workflow. This guide covers every section of the application.

38Sections
9Categories
40+Features
Platform Features
4

Multipanel Layout

Bug Bounty Center supports a multipanel layout that lets you view up to four sections at the same time. You can choose between five layout modes: single view, two panels side by side, two panels stacked vertically, three panels, or four panels in a grid.

Each panel operates independently. You can select which section to display in each panel, navigate within it, and maximize or close individual panels. The layout and panel assignments are saved automatically and restored when you reopen the application.

Scratchpad

Press Ctrl+. at any time to open the Scratchpad, a floating notepad that stays on top of whatever section you are working in. It supports up to 5 independent tabs, so you can keep multiple quick notes open at the same time.

The Scratchpad auto-saves as you type and persists across sessions. You can also send any scratch note directly to the Notepad section with one click if you want to keep it long-term.

Buggy Assistant

Buggy is the platform's built-in assistant. It appears as a floating terminal in the bottom-right corner of the screen and has read access to all your application data: programs, targets, vulnerabilities, reports, tasks, sessions, workflows, notes, mood entries, and more.

You can ask Buggy questions about your data, get summaries of your current workload, or use it as a quick way to query information without navigating to a specific section. Buggy processes everything locally and does not send any data to external services.

Buggy is currently in early beta and under active development.

Planning & Productivity
5

1. Dashboard

The Dashboard is the first screen you see when you open Bug Bounty Center. It provides a real-time overview of your entire hunting activity.

Performance Chart

A line chart tracking four metrics over time: bounty earned, reports submitted, accepted vulnerabilities, and acceptance rate. Toggle each metric on or off and switch between three time ranges (6 months, 1 year, or all time).

Analytics Widgets

Five charts covering: program status distribution, severity breakdown, vulnerability types, pending vs. resolved, and report status distribution.

Schedule & ROI

The Schedule widget shows your upcoming hunting sessions. The Program ROI chart ranks your programs by earnings and rating.

Task Manager

An integrated task list where you can create, complete, and delete tasks directly from the Dashboard. Tasks support three priority levels, optional program assignment, and due dates.

Activity Heatmap

A contribution heatmap showing your daily activity over the past year, calculated from programs, reports, vulnerabilities, collaborations, and completed tasks.

2. Schedule

A calendar-based planner for organizing your hunting sessions with four views: day, week, month, and year.

Day View

Shows a single day with all scheduled sessions on the left and a 24-hour timeline on the right.

Week View

Seven day columns in a grid. Toggle between fixed Monday-Sunday or rolling "next 7 days" layout.

Month View

Traditional calendar grid. Click any day to jump to the day view.

Year View

All 12 months as mini-calendars. Days with sessions are highlighted.

Sessions

Each session has a title, type (Recon, Testing, Reporting, Learning, or Break), and a scheduled date. Optionally assign a program and target, set start time and duration, define objectives, specify tools, and add notes. Supports recurrence (daily, weekly, or custom days).

Weekly Review

If you have set weekly goals with review notes, a Weekly Review panel appears in the sidebar.

3. Tasks

A dedicated task manager with more functionality than the Dashboard task list.

Stats

Four cards showing total pending, high-priority, due within 3 days, and completed tasks.

Filters

Search by title and description. Filter by priority (high, medium, low) and category (Recon, Testing, Exploit, Report, Learning, Other). Toggle visibility of completed tasks.

Task Form

Create or edit with title, description, priority, due date, category, program assignment, subtasks (added inline), and a linked item system referencing items from 16 different sections.

4. Notepad

A three-panel note-taking system for organizing research, findings, and free-form text.

Folder Sidebar

Default folders: All Notes, Pinned, General, Research, Targets, Payloads, Ideas. Create custom folders. Archived section for old notes.

Editor

Plain-text editor with auto-save. Color assignment (8 colors), pin toggle, move to folder or archive, and delete with confirmation.

Scratchpad Integration

Notes sent from the Scratchpad automatically appear in the General folder.

5. Focus

A configurable timer for structuring your hunting sessions into focused work intervals with breaks.

Settings

Configure focus duration, break frequency, break duration, and alert sound (Bell, Chime, Beep, Digital, or None).

Timer

Large countdown display with progress bar. Controls for Start/Pause, Reset, and Skip Break. Optionally select a program and set a session name.

Stats

Four cards: today's focus time, weekly total, consecutive-day streak, and all-time completed sessions.

Focus Widget

When you leave the Focus page with an active timer, a floating mini-timer appears in the bottom corner so you can manage your timer from any section.

Research & Knowledge
2

6. Methodology

Create, organize, and consult your personal hunting methodologies. This is the core of the platform's value as a methodology builder.

Framework Guide

A collapsible reference panel providing a comprehensive bug bounty testing framework organized into 9 categories: Reconnaissance, Enumeration, Vulnerability Analysis, Mobile Security, API Security, Cloud and Infrastructure, Exploitation and Validation, Reporting, and Post-Reporting.

Methodology List

Search by name, filter favorites, and create new methodologies. Displayed as cards with name, section/step counts, description, and tags.

Editor

Full-screen modal with View Mode (clean read-only rendering) and Edit Mode (build structure with sections, items, and sub-items nested up to 10 levels deep). Keyboard navigation: Tab to increase nesting, Enter on empty input to decrease.

7. Research

A hub grouping six knowledge-base tools.

Vulnerability Wiki

A two-panel knowledge base for documenting vulnerability types. 65+ types across 11 categories. Each entry has dozens of fields organized into collapsible sections: core knowledge, detection and exploitation, severity assessment, remediation, tooling, reporting templates, references, and bounty context.

Technical Writeups

A three-panel writeup analysis tool. Paste writeup content, switch to read mode to highlight passages. Highlights use 5 color-coded categories: Key Techniques, Tools/Commands, Endpoints/Params, Bypass Techniques, and Impact/Escalation.

Mind Maps

A visual diagramming tool. Create mind maps from scratch or from predefined templates. Nodes support multiple types and connections support labeled edge types. Export to Markdown.

CVE Explorer

A curated database of CVEs relevant to bug bounty. Searchable with filters for severity. Each CVE includes details, testing guides, and related payloads.

Glossary

An interactive glossary with 150+ terms covering vulnerabilities, techniques, protocols, and security concepts. Searchable and filterable by category and difficulty.

Misconfigurations Database

A reference database of common misconfigurations organized by technology (Nginx, Apache, IIS, Cloud, Docker, Firebase, CORS, Security Headers, WordPress, Jenkins, Kubernetes, Git).

Vulnerability Guides
4

8. Vuln Guides

A comprehensive, read-only reference library covering 30 vulnerability classes in a tabbed interface: Subdomain Takeover, Account Takeover, Registration and Pre-Hijack, Cache Attacks, Clickjacking, Template Injection, Path Traversal, Command Injection, Cookie Hacking, CORS Bypass, CRLF Injection, CSRF, Dependency Confusion, Deserialization, File Inclusion, File Upload, HTTP Request Smuggling, IDOR, JWT Attacks, Mass Assignment, SQL Injection, NoSQL Injection, Open Redirect, Parameter Pollution, PostMessage, Race Condition, SAML Attacks, SSRF, XXE, and XSS.

Each guide shows the total number of attack categories and techniques, a search bar with expand/collapse controls, and a list of collapsible category cards. Each category contains techniques with descriptions, step-by-step instructions, and optional pro tips.

The Subdomain Takeover guide additionally includes a Fingerprint Database with status cards (Confirmed Vulnerable, Edge Cases, Not Vulnerable) and searchable service entries with CNAME patterns and response fingerprints.

9. Bypasses

A read-only reference database focused on techniques for bypassing security controls, organized in 7 tabs: WAF Bypass, 2FA/MFA/OTP, CAPTCHA, Login, Password Reset, Rate Limit, and Payment.

The WAF Bypass tab organizes payloads by bypass type: WAF Rule Bypasses, Application Filter Bypasses, Parser Quirk Exploits, and Encoding Gap Exploits. Search by payload or description. Filter by context (XSS, SQLi, RCE, Path Traversal, SSRF, Header Injection, General). Each bypass includes the payload, context badge, and a technical description.

All other tabs follow the same structure with attack categories, techniques, steps, and pro tips.

10. Where to Hunt

A quick-reference mapping vulnerability types to the application areas where they are most commonly found.

Stats show vulnerability types covered, total hunting locations, and high-priority count. Search by location name and filter by priority level. Each vulnerability type expands to show a table with location, description, copyable example payloads, and priority badge.

11. Checklist

Build and track methodology checklists with nested items and per-item progress.

List View

Checklists displayed as cards with name, category/item counts, progress bar, favorites toggle, and delete button.

View Mode

Full-screen view with numbered categories, per-category progress bars, and checkable items. Completed items show with strikethrough.

Edit Mode

Items can be checked, annotated with notes, nested up to 10 levels deep, and deleted. Keyboard navigation: Tab increases depth, Shift+Tab decreases, Enter adds, Enter on empty returns to parent.

Programs & Reconnaissance
3

12. Programs

The central hub for managing bug bounty programs.

Main Page

Stats cards for total, active, paused, and inactive programs. Search by name or platform. Filter by platform (23 options), status, and type. Sort by rating or status.

Programs Table

Sortable columns for name, platform, type, status, interactive rating (1-5 stars), bounty range, and actions.

Watchlist

A persisted list of programs you are interested in but not yet hunting. Quick add with name, platform, and URL.

Program Detail

Full program workspace with Program Intel (reports, vulnerabilities, assets, technologies, WAFs), requirements and notes, bounty ranges, in-scope and out-of-scope targets, business logic section, credentials vault (encrypted, master password protected), and ROI calculator.

13. Auto-Recon

A fully automated reconnaissance pipeline that orchestrates 20+ security tools through a Docker-backed backend. Two views: Configure (build and launch scans) and History (review past scans).

Target Types

Organization (full digital footprint mapping), Domain (deep-dive on a single domain with fuzzing, crawling, JS analysis), and Single Target (focused host analysis with Nuclei fingerprinting using ~3800 templates).

Intensity Profiles

Stealth (passive only, minimal threads), Balanced (mixed passive/active, medium threads), and Aggressive (full active recon, full port range 1-65535).

Live Monitoring

Pipeline log with timestamps, current step/tool indicator, system resource usage, queue status, pause and stop controls.

AI Briefcase

Select results to build a Markdown reconnaissance brief with findings, scan metadata, and hunter notes. Downloads as a .md file.

Send to Recon

Export selected results directly into the linked program's Reconnaissance section as structured assets.

14. Reconnaissance

A structured asset inventory for tracking everything discovered during reconnaissance, organized by program.

Categories

9 categories with 50+ asset types: Network (Subdomain, IP, URL, Endpoint, Port, Parameter, JS File), Cloud (S3, GCS, Azure, Lambda, Kubernetes), Infrastructure (ASN, IP Range, CDN/WAF, Technology), Code (Repository, Leak, Commit), Mobile (Android, iOS, Backend, Deep Link), APIs (Endpoint, Schema, GraphQL, Webhook), AI/ML (LLM, Model, Agent, Training Data, Prompt Surface), Supply Chain (Scripts, CDN, npm, Dependencies, iFrame), Extensions (Chrome, Firefox, Plugin, Extension API).

View Modes

Categories View (assets by tab) and Overview Mode (all categories with counts). Quick filter presets: High Interest, Untested, In Progress, Network + High Interest.

Asset Management

Add individual assets with type, value, interest level, exploit status, impact, HTTP status, hypothesis, notes, technologies, and WAFs. Bulk import supports one value per line.

Security Testing
3

15. Attack Graph

A visual diagramming tool for mapping and analyzing attack paths using an interactive canvas.

Nodes & Edges

53 node types across 8 categories. 19 relationship types across 5 categories, including animated edges for critical relationships like "Bypasses Auth" and "Exfiltrates To."

Attack Templates

8 pre-built patterns: Authentication Bypass, IDOR Chain, SSRF to Internal, JWT Confusion, Stored XSS Chain, SQLi to Data, Open Redirect Chain, and Privilege Escalation.

Issue Detection

Analyzes the graph and detects 16 vulnerability patterns by severity with OWASP references.

Path Finder

Discovers up to 10 paths between any two nodes, tracking authentication requirements.

Export

JSON (full data) or Markdown (structured report with nodes, relationships, and issues).

16. Auth Flows

A dedicated workspace for testing authentication and authorization mechanisms. Structured as a project-based system.

Flow Builder

25 auth-specific node types across 9 categories. 18 edge types across 7 categories. 7 pre-built templates: OAuth 2.0 (PKCE), JWT, Session Cookie, MFA, Password Reset, SAML SSO, and API Key Authentication.

Auth Checklist

55 pre-built security tests in 13 categories. Each test has 6 status options: Not Tested, Secure, Vulnerable, Weak, Needs Investigation, N/A. Also supports importing custom checklists.

Default Credentials

A searchable database of 400+ default credentials organized by category (CMS, Database, Network, DevOps, Server, IoT, Cloud, Other).

17. Business Flows

A visual mapping and testing workspace for identifying business logic vulnerabilities.

Flow Templates

12 pre-built flow templates in 4 categories (Money and Value, Auth and Authorization, Sensitive Data, State Transitions), each with pre-configured nodes, connections, and security tests.

Flow Editor

Three-panel layout with connection type sidebar (16 edge types), interactive canvas (10 node types), and node detail panel with test management. 8 test types including IDOR, Race Condition, Step Bypass, and Value Manipulation.

Cheat Sheet

47 curated business logic flaw test cases tracked per program across 6 categories: Payment and Pricing, Auth and Access Control, Data and State Manipulation, Race Conditions, Workflow Bypass, and Feature Abuse.

Vulnerabilities & Reports
2

18. Vulnerabilities

The central registry for tracking all discovered security issues.

Vulnerability List

Severity stats, search and program filter, sortable table with title, severity badge, CVSS score, status (New, Triaged, Accepted, Rejected, Duplicate, Fixed), program, and linked report.

Add Vulnerability

Form with program, linked report, vulnerability type (80+ types in 11 categories), title, affected asset (with automatic scope validation), severity, status, CVSS score and vector string, description, proof of concept, impact, and screenshot evidence (drag-and-drop, up to 10 images).

Records & Goals

6 auto-computed metrics (total found, highest CVSS, acceptance rate, top vuln type, best month, accepted count). Track hunting objectives with title, target severity, deadline, notes, and completion toggle.

CVSS 3.1 Calculator

Interactive calculator with Base (8), Temporal (3), and Environmental (3) metrics. Real-time score display with circular indicators, gradient bar, and vector string generation.

Escalation

Create escalation sessions from existing vulnerabilities. Visual escalation flow diagram with 10 pre-defined techniques. Chain vulnerabilities together to demonstrate compound impact.

19. Reports

Tracks vulnerability submissions and provides a draft system for preparing reports.

Submitted Reports

Stats (total, accepted, pending, duplicate, rejected), search and program filter, sortable table with status badges, severity, bounty amount, and actions.

Personal Records

10 auto-computed metrics: total earnings, highest bounty, best month, acceptance rate, longest accepted streak, and severity-level counts.

Report Drafts

Create drafts with title, severity, vulnerability type, target program, endpoint, and content fields (summary, steps to reproduce, impact, PoC, remediation, personal notes). All content fields support Markdown with a live Preview mode.

New Report

Full submission form with program, linked vulnerability, target URL (with scope validation), title, platform report ID, date, status, severity, bounty amount, notes, and Markdown content fields.

Payloads, Scripts & Analysis
10

20. Payloads & Dorks

The largest module, combining Google dorking management, custom payload storage, and a built-in payload reference library.

Google Dorking

Set a target domain to automatically adapt all dorks with site:. Create custom dorks with name, category, and query. Ready-to-Use Dorks section with pre-built collection across 15 categories.

Payloads

Create payload lists organized by vulnerability type (14 types). Multi-select type filter. Each payload is clickable to copy.

Examples Library

39 sub-tabs covering SSRF, SQLi, XSS, XXE, SSTI, Redirect, Path Traversal, LFI/RFI, Command Injection, IDOR, CORS, CRLF, NoSQL, LDAP, GraphQL, JWT, Upload, Prototype Pollution, Deserialization, Mass Assignment, Cache Poisoning, Web Cache Deception, HTTP Smuggling, and more. Each sub-tab provides categorized payloads with descriptions and copy buttons.

21. Scripts & Templates

Manages custom hunting scripts and Nuclei vulnerability scanner templates.

Scripts

12 category filters (Recon, Enumeration, Fuzzing, Scanning, Exploit, OSINT, Automation, Parsing, Wordlist, Cleanup, Reporting, Misc) and 7 language filters (Bash, Python, JavaScript, Ruby, Go, Rust, PowerShell). Terminal-styled code preview with copy (auto-generated header).

Nuclei Templates

Two-level category filter with 11 vulnerability categories and 63 specific types. Each template shows severity badge, code preview with line numbers, tested status toggle, and use count. Copy auto-generates full Nuclei YAML structure.

22. Command Snippets

A library for reusable commands, one-liners, and tool configurations.

My Snippets

Set a target domain to replace placeholders in all commands. Create snippets with name, description, command, category (19 options), language, and tags. Copy count tracks usage.

Common Snippets

Curated library of one-liners from experienced hunters, grouped by 17 categories. Each snippet shows command, explanation, tools used, and button to add to your library.

Command Builder

Interactive command generator for 20 security tools (Nmap, ffuf, Nuclei, SQLmap, Subfinder, httpx, Amass, and more). Built-in and custom presets, live command preview, and save to snippets library.

23. Analyzer

Three client-side security analysis tools for inspecting code and URLs.

JS Analyzer

Paste or upload JavaScript files. 10 detection categories: API Endpoints, API Keys and Tokens, Secrets and Passwords, URLs and Connections, AWS Infrastructure, Sensitive Comments, Debug Code, Backdoors and Bypasses, PII, and Obfuscation. Includes Shannon entropy analysis. Export as JSON.

URL Analyzer

Paste URLs in bulk. Analyzes for attack surface indicators across 8 vulnerability classes (IDOR, LFI, Open Redirect, SSRF, SQLi, XSS, RCE, Auth Token Leak) plus 20+ interesting parameters and path patterns. Each URL receives a composite score.

Code Secrets

Multi-language secret scanner supporting 20+ file types. 14 detection categories: Cloud Provider Keys, Payment and SaaS, Communication, Database Credentials, Private Keys, OAuth and JWT, Env/Config Leaks, Hardcoded Credentials, Infrastructure Secrets, Webhooks, Encryption, Internal Infrastructure, and Dangerous Functions.

24. API Documentation

A centralized repository for storing, managing, and analyzing API specifications.

Import

Import from OpenAPI JSON/YAML, Postman Collection v2.1, or manual entry. Auto-detection of format.

Security Analysis

Automated engine detects IDOR, admin endpoints, internal exposure, file upload, data export, sensitive parameters, account takeover paths, injection points, SSRF/redirect risks, user enumeration, privilege escalation, and mass assignment.

Endpoint Cards

Grouped by path segment. Each shows method badge, path, status, security findings, parameters table, headers, body/response examples, notes, and 3 cURL generators (normal, no-auth, IDOR test).

Wordlist Generator

Generates a fuzzing wordlist from your API documentation with 9 sections: full paths, directories, path segments, path variants, extension variants, parameters, query parameters, body fields, and hidden parameter candidates.

25. Wordlists

A personal wordlist library and an advanced wordlist generator.

Library

7 categories (Directories, Subdomains, Parameters, Usernames, Passwords, Extensions, Custom). View, copy, download, edit, delete. Combinator Tool merges wordlists using union, intersection, or Cartesian product.

Generator

12 generation types. Input custom keywords, target domain, and REST resources. 10 tech-stack injections (Rails, Django, Spring Boot, Laravel, Next.js, WordPress, Express, ASP.NET, Flask, PHP). 8 mutation options. 5 engagement presets (Quick Recon, Standard Audit, Full Audit, Stealth Mode, Infrastructure). Export including Burp Suite format.

26. Request Logger

Save and analyze interesting HTTP requests and responses encountered during testing.

Logging

Two-tab form for request (title, vulnerability type, program, method, URL, headers, body) and response (status code, headers, body). Additional fields for tags, notes, and interesting flag.

Request Cards

Expandable cards with method badge, title, URL, tags, timestamp. Expanded view shows request/response with syntax highlighting, security findings, and actions (copy as cURL, copy as Markdown).

Security Analysis

Automatic checks for CORS misconfiguration, cookie security flags (HttpOnly, Secure, SameSite), error/stack trace disclosure, sensitive data in responses, and information disclosure headers.

27. Encoder

A comprehensive multi-tool with 15 independent tabs for encoding, decoding, hashing, and data analysis.

Encode/Decode

11 encoders (Base64, URL, URL Full, HTML Entities, Hex, Unicode Escape, ASCII Decimal, Binary, ROT, ROT47, Gzip). Smart Decode auto-detects and chains decodings. Chain Mode for custom sequences.

Hash & HMAC

5 hash algorithms (MD5, SHA1, SHA256, SHA512, SHA3). Hash Identifier with confidence levels. 4 HMAC algorithms.

JWT

Decoder, vulnerability analysis (none algorithm, weak algorithms, expiration), secret bruteforcer with 80+ weak secrets, "none" attack generator, and modified JWT generator.

Cookie

Framework detection (9 frameworks), payload extraction, flag analysis, and vulnerability detection.

Regex

Pattern testing with match highlighting. Automated ReDoS vulnerability detection with complexity scoring and attack payload generation.

ID Patterns

Format detection, sequential detection, timestamp detection, entropy analysis, per-position heatmap, pattern classification, enumeration simulation, and auto-generated Python script for IDOR testing.

More Tabs

Timestamp converter, JSON prettify/minify/validate, Diff viewer, SAML decoder with vulnerability detection, IP converter with SSRF bypass payloads, XML formatter, Certificate parser/comparator, and Multi-Format Converter.

28. Unicode Lab

Advanced Unicode security testing tools with 7 specialized tabs and an integrated Attack Workflow Guide.

Attack Guide

6 attack scenarios: WAF Bypass, Auth/Username Filter Bypass, Domain Homograph Detection, File Extension Spoofing, Invisible Character Injection, Payload Verification.

Homograph

Generates lookalike text using Cyrillic, Greek, Armenian, Bengali, Cherokee, and other scripts. 4 strategies: Full Replacement, Cyrillic-only, Greek-only, Mixed Script.

Normalize

4 Unicode normalization forms (NFC, NFD, NFKC, NFKD) with character-by-character codepoint analysis.

Fullwidth

Converts ASCII to fullwidth Unicode equivalents for WAF bypass.

Invisible

25 invisible Unicode characters in 4 categories. Injection tool inserts selected characters between letters.

Bidi/RTLO

Generates filenames exploiting Right-to-Left Override for file extension spoofing.

Case Map

Bypass Mode generates Unicode alternatives that transform to a target string after case conversion or NFKC normalization. Analyze Mode shows character-by-character breakdown.

29. API Key Checker

A reference tool for validating leaked or discovered API keys, sourced from the KeyHacks repository and verified against official API documentation.

76 API services across categories covering Code Hosting, Messaging, Cloud Providers, Payment, Communication, AI/ML, DevOps/CI/CD, Monitoring, Security, Productivity, Social, Maps/Geo, and more.

Each service provides: key pattern and example, a ready-to-use curl command that auto-updates when you paste your key, extra input fields when multiple credentials are needed, step-by-step verification instructions, expected success and failure response patterns, and link to API documentation.

Tools & Community
5

30. Tools & Resources

Two tabs combining a curated tool catalog with a personal bookmarking system.

Tools Catalog

Approximately 485 external security tools in 19 categories: Reconnaissance, Scanning, Exploitation, Fuzzing, API Testing, Cloud, Authentication, Mobile, Wordlists, Web Resources, Browser Extensions, AI Assistants, Frameworks, CVE Tracking, Secrets and JS Analysis, Burp Extensions, CTF and Practice, Learning, and Oneliners. Each tool includes name, description, repository URL, tags, installation command, usage example, and feature list.

Tool Detail

Full description, features grid, installation and usage commands with copy-to-clipboard, repository link, and up to 4 related tools.

Personal Resources

A bookmarking system for saving security resources. 7 resource types (Writeup, Blog, Video, Cheatsheet, Tool, Course, Other). Create, edit, and delete with type and text filters.

31. Workflows

Visual workflow builder and freeform whiteboard.

Workflow Editor

Full-screen canvas with tool sidebar. Three node types: Tool nodes (drag from sidebar), Note nodes (import from Notepad), and Custom nodes (editable title, content, configurable color). Canvas interactions: drag-and-drop, click-to-connect, right-click-drag panning.

Whiteboard

A freeform drawing canvas for sketching ideas, diagramming attack flows, or brainstorming during engagements.

32. Collaborations

Track hunting partners, shared earnings, and joint report statistics.

Dashboard

Four aggregate cards: Partners count, Your Earnings total, Total Shared amount, and Shared Reports count. Pending balance alert shows when money is owed in either direction.

Partner Profiles

Each partner tracks: alias, specialties (Web Apps, APIs, Mobile, Cloud, Network, IoT, Crypto/Web3), reports together, reports accepted (with computed success rate), shared bounty, your earnings, pending balance, last collaboration date, next plans, and notes.

Management

Dedicated form pages for creating and editing partners with sections for basic info, specialties, collaboration stats (live success rate preview), earnings and balance, and contact/plans.

33. Achievements

A gamification system to track your progress as a hunter.

Level System

8 progression levels based on accumulated points: Rookie (0), Scout (50), Hacker (150), Hunter (300), Elite (500), Master (750), Legend (1000), Myth (1500). Each level has a unique icon and color.

Difficulty Tiers

5 tiers: Easy (10 pts, first-time actions), Medium (25 pts, regular milestones), Hard (50 pts, significant achievements), Legendary (100 pts, elite status), Mythic (250 pts, near-impossible goals). Approximately 90 achievements total.

UI

Click any achievement card to toggle its unlock state. Filter by difficulty tier. Level progression display shows all 8 levels and your current position.

34. Mental Health

A wellbeing tracker to help you avoid burnout and maintain a healthy relationship with hunting.

Mood Check-in

Log your mood daily with 5 levels: Great, Good, Okay, Bad, Terrible. Mood streak shows consecutive days with the same mood.

Motivational Quotes

Approximately 50 curated quotes auto-rotating every 8 seconds. Add your own custom quotes.

Hunting Streak

Tracks consecutive days of app usage. Manually add a bonus day or take a rest day (resets streak).

Burnout Meter

Visual progress bar: Healthy (green, 0-6 days), Warning (yellow, 7-13 days), Critical (red, 14+ days).

Mood History

Bar chart visualizing mood data over 4 time ranges (today, week, month, year). Bars color-coded: green for Good/Great, yellow for Okay, red for Bad/Terrible.