Developed for educational purposes only (use it ethically)
This repository contains automated shell scripts for recon in bug bounty hunting. The process is structured and takes input from a targets.txt file. These scripts are optimized for wildcard domains and designed to be run sequentially, where each step builds on the output of the previous one.
Create a targets.txt file containing your target domains, one per line:
nano targets.txtRun the recon scripts in the following order. Each script uses output files generated by the previous step.
This script performs subdomain enumeration, live host checking, nuclei scanning, and wayback URL gathering.
bash basic.shOutput files:
subdomains.txt— Discovered subdomainslive.txt— Live domains verified via HTTPnuclei.txt— Nuclei scan results (panels, takeovers, CVEs, exposures)wayback.txt— URLs fetched from Wayback Machineparams.txt— URLs with parameters extracted from wayback URLs
This script performs deep endpoint discovery, JavaScript secret hunting, parameter analysis with gf patterns, Dalfox XSS scanning, and header misconfiguration analysis.
bash advanced.shOutput files:
deep-endpoints.txt— Endpoints discovered via katana, hakrawler, and gaujsfiles.txt— JavaScript files extracted from wayback URLssecret-js.txt— Potential secrets found in JavaScript filesgf-xss.txt,gf-ssrf.txt,gf-redirect.txt— Parameter filters using gf patternsdalfox-xss.txt— Dalfox XSS scan reportheaders.txt— HTTP header analysis for CORS, CSP, and other misconfigurations
Happy hunting! 🚀
