Bug hunting tools
- Use
git clone https://github.com/djmahe4/bug-bounty/ - Go to bug-bounty folder using
cd bug-bounty - Give execute permissions
chmod +x *
- Windows users go to
Pythondirectory and create a virtual environment.
- Execute shellcodes that begins with 'init' to initialize the 'proced' shell code
- Wait for download to complete
- Run
pip install requirements.txt
- Run the 'proced' shell code to start using
./ - Enter the domain name to scan
- Wait for the execution to complete
- Run the programs by following the tutorials
- Click on the urls which seems diverse and look for vulnerabilities (while taking the scope into consideration!)
- Use ai chatbots like grok.com and chat.deepseek.com if necessary
- Report the vulnerabilities through bug bounty platforms or direct contact
Note!: Please run rm *.txt after the 'proced' file is executed so that 'tee' commands wont be affected..
init1.sh > proced1.sh
:OSINT-driven reconnaissance with active probing for asset enumeration and vulnerability discovery
Step 1: Use subfinder, assetfinder, amass, and curl with crt.sh to gather subdomains (passive recon).
Step 5: Manually or automatically analyze the results for vulnerabilities (e.g., exposed reset tokens).
This process is often called a "reconnaissance pipeline" or "attack surface mapping" in security contexts, as it systematically builds a picture of the target’s exposed assets and potential weaknesses.
init2.sh > proced2.sh
:Used to Build a comprehensive map of the target domain’s attack surface focusing on javascript and secrets
Outcome: A set of files (subdomains.txt, httpx.txt, allurls.txt, js.txt, mantra.txt) containing potential targets for manual or automated exploitation.
init3.sh > proced3.sh
:Bug hunting methodology devoloped by Zlatan H.
'"><svg/onload=prompt(5);>{{7*7}}" ==> for Sql injection
"><svg/onload=prompt(5);> ==> for XSS
{{7*7}} ==> for SSTI/CSTI
init4.sh > proced4.sh
: Makes use of Prototype Pollution vulnerability in JavaScript that allows an attacker to manipulate an object's prototype and change the behavior of the entire application. Since JavaScript objects inherit properties from their prototype, modifying the prototype affects all instances of that object type.
./ip.sh: Used to find the ip address of the domain
wapp_vuln.py=> Enter the url to perform fingerprinting and vulnerability lookup using exploit-db.comdorking.py=> Enter the url to perform dorking using binggithub_dorking.py=> Makes use of github api to perform dorking (Edit the TOKEN variable to the token created from github "with repo permissions only" or manually enter when prompted)xss_check.py=> Performs a basic xss scan using BeautifulSoup, requests and suggest xss payloads403_bypass.py=> Executes 403 (Forbidden) bypass techniques using requests module
- ODIN: Find exposed buckets and files
- Webscout: IP address scanner
- jimpl: Image metadata extractor (upload profile pic and copypaste url)
- creepyCrawler: Web crawler which carries out active reconnaissance.
- Websift: Extract contact details and other urls.
- Getting Started in Bug Bounty
- Free Bug Bounty Course
- Recon like a boss by Brut security
- Workflow
- Browser Extensions
- Url Scanner
- Time Machine
- Web3 Block Explorer
- Web Vulnerabilities
- Nuclei ai prompts
- API Vulnerabilities
- Bug Bounty
- Security+
- NahamSec
- NullSecX
- Cyber X List
- shodan cleansheet
- Bugbounty targets
- worldlists
- Recon dorks
- More resources
SQL Injection -> More
- Basic SQL Injection: Explains simple payloads like
' OR '1'='1to bypass login forms by making the query always return true. - Union-Based SQL Injection: Shows how to use UNION to extract data from other tables, e.g.,
' UNION SELECT database(), user(), version() --. - Error-Based SQL Injection: Demonstrates using errors to reveal database info, like
' OR 1=CONVERT(int, (SELECT @@version)) --. - Blind SQL Injection: Covers cases where no direct output is shown, using techniques like
IF(1=1, SLEEP(5), 0)to infer data via delays. - Common Payloads: Lists examples such as
' DROP TABLE users --or' AND SUBSTRING((SELECT database()),1,1)='a'.