Introduction | Pentest & Bug Bounty Resources and Techniques