Skip to content

djmahe4/bug-bounty

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

bug-bounty

Bug hunting tools

Step1: Download

  • Use git clone https://github.com/djmahe4/bug-bounty/
  • Go to bug-bounty folder usingcd bug-bounty
  • Give execute permissions chmod +x *

Windows

  • Windows users go to /Python directory

Step2: Initialize

  • Execute shellcodes that begins with 'init' to initialize the 'proced' shell code
  • Wait for download to complete

Windows

  • Run pip install requirements.txt

Step3: Run

  • Run the 'proced' shell code to start using ./
  • Enter the domain name to scan
  • Wait for the execution to complete

Windows

  • Run the programs by following the tutorials

Step4: Analyze

  • Click on the urls which seems diverse and look for vulnerabilities (while taking the scope into consideration!)
  • Use ai chatbots like grok.com and chat.deepseek.com if necessary

Step5: Report

  • Report the vulnerabilities through bug bounty platforms or direct contact

Traces

Note!: Please run rm *.txt after the 'proced' file is executed so that 'tee' commands wont be affected..

init1.sh > proced1.sh :OSINT-driven reconnaissance with active probing for asset enumeration and vulnerability discovery

Step 1: Use subfinder, assetfinder, amass, and curl with crt.sh to gather subdomains (passive recon).

Step 2: Filter and deduplicate with jq, sed, sort, and tee.

Step 3: Verify live subdomains with httpx (active recon).

Step 4: Enumerate endpoints with katana and waybackurls (mixed recon).

Step 5: Manually or automatically analyze the results for vulnerabilities (e.g., exposed reset tokens).

This process is often called a "reconnaissance pipeline" or "attack surface mapping" in security contexts, as it systematically builds a picture of the target’s exposed assets and potential weaknesses.


init2.sh > proced2.sh :Used to Build a comprehensive map of the target domain’s attack surface focusing on javascript and secrets

Step 1: Enumerate subdomains (subfinder, assetfinder).

Step 2: Identify live hosts (httpx-pd).

Step 3: Crawl for endpoints (katana, gospider, waybackurls).

Step 4: Consolidate and deduplicate URLs (anew).

Step 5: Focus on JavaScript files (grep, mantra) for deeper analysis.

Outcome: A set of files (subdomains.txt, httpx.txt, allurls.txt, js.txt, mantra.txt) containing potential targets for manual or automated exploitation.


proced3.sh :Bug hunting methodology devoloped by Zlatan H.

'"><svg/onload=prompt(5);>{{7*7}}" ==> for Sql injection

"><svg/onload=prompt(5);> ==> for XSS

{{7*7}} ==> for SSTI/CSTI

./ip.sh: Used to find the ip address of the domain


Python

  1. wapp_vuln.py => Enter the url to perform fingerprinting and vulnerability lookup using exploit-db.com
  2. dorking.py => Enter the url to perform dorking using bing
  3. github_dorking.py => Makes use of github api to perform dorking (Edit the TOKEN variable to the token created from github "with repo permissions only" or manually enter when prompted)
  4. xss_check.py => Performs a basic xss scan using BeautifulSoup, requests and suggest xss payloads
  5. 403_bypass.py => Executes 403 (Forbidden) bypass techniques using requests module

OSINT

  • ODIN: Find exposed buckets and files
  • Webscout: IP address scanner

Other Usefull Links

SQL Injection

  • Basic SQL Injection: Explains simple payloads like ' OR '1'='1 to bypass login forms by making the query always return true.
  • Union-Based SQL Injection: Shows how to use UNION to extract data from other tables, e.g., ' UNION SELECT database(), user(), version() --.
  • Error-Based SQL Injection: Demonstrates using errors to reveal database info, like ' OR 1=CONVERT(int, (SELECT @@version)) --.
  • Blind SQL Injection: Covers cases where no direct output is shown, using techniques like IF(1=1, SLEEP(5), 0) to infer data via delays.
  • Common Payloads: Lists examples such as ' DROP TABLE users -- or ' AND SUBSTRING((SELECT database()),1,1)='a'.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published