https://github.com/1hehaq/oty
Oty is a fast, customizable, CLI tool designed to streamline your Bug Bounty and Pentesting workflows. Powered by a simple yet flexible YAML based DSL, Oty allows you to integrate your tools into it
https://github.com/1hehaq/oty
automation bugbounty developer devops pentest security
Last synced: 11 days ago
JSON representation
Oty is a fast, customizable, CLI tool designed to streamline your Bug Bounty and Pentesting workflows. Powered by a simple yet flexible YAML based DSL, Oty allows you to integrate your tools into it
- Host: GitHub
- URL: https://github.com/1hehaq/oty
- Owner: 1hehaq
- License: bsd-3-clause
- Created: 2024-11-26T18:41:04.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2025-01-27T18:16:02.000Z (about 1 year ago)
- Last Synced: 2025-01-27T19:36:40.727Z (about 1 year ago)
- Topics: automation, bugbounty, developer, devops, pentest, security
- Language: Python
- Homepage: https://reconhawk.pages.dev
- Size: 52.7 KB
- Stars: 9
- Watchers: 1
- Forks: 6
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
OTY is a powerful, flexible workflow automation tool that transforms complex workflows into simple, reproducible YAML-based scripts. Whether you're a Developer, DevOps engineer, Security Researcher, or System Administrator, OTY streamlines your repetitive tasks with elegance and precision.
Features
| Category | Core Capabilities | Advanced Functionality | Intelligent Automation |
|----------|------------------|------------------------|------------------------|
| **Workflow Design** | • _`YAML-based DSL`_
• _`Dynamic Variable Substitution`_ | • _`Template Validation`_
• _`Pre-execution Checks`_ | • _`Intelligent Variable Resolution`_
• _`Contextual Prompting`_ |
| **Execution Management** | • _`Precise Command Execution`_
• _`Dry-run Mode`_ | • _`Resumable Workflows`_
• _`Real-time Output`_ | • _`Graceful Error Handling`_
• _`Interactive Step Control`_ |
| **State Tracking** | • _`Persistent State Files`_
• _`Execution Logging`_ | • _`Cross-session Resume`_
• _`Detailed Reporting`_ | • _`Comprehensive Audit Trails`_
• _`Timestamp Tracking`_ |
| **Flexibility** | • _`Multi-domain Support`_
• _`Customizable Steps`_ | • _`Interactive Variables`_
• _`Conditional Execution`_ | • _`Adaptive Workflow Patterns`_
• _`Extensible Architecture`_ |
## Installation
```bash
pipx install git+https://github.com/1hehaq/oty.git
```
## Usage
### Basic Workflow Execution
```bash
# Run a workflow
oty run
# Dry run (simulate without executing)
oty run
# Resume an interrupted workflow
oty run --resume
```
### Workflow Management
```bash
# Validate a workflow template
oty validate
# List saved workflow states
oty list-states
# Clear a specific workflow state
oty clear-state
```
## Templates
OTY uses simple, powerful YAML templates for workflow definition. Here are two example templates:
⇛ For Software Developers
Web App Deployment Template
```yaml
name: WebAppDeployment
description: Deploy a web application to a target server
variables:
APP_NAME: mywebapp
REPO_URL: https://github.com/example/mywebapp.git
DEPLOY_DIR: /var/www/{{APP_NAME}}
steps:
- name: Clone Repository
command: git clone {{REPO_URL}} {{DEPLOY_DIR}}
continue_on_error: false
- name: Install Dependencies
command: cd {{DEPLOY_DIR}} && npm install
continue_on_error: false
- name: Build Application
command: cd {{DEPLOY_DIR}} && npm run build
continue_on_error: false
- name: Restart Service
command: systemctl restart {{APP_NAME}}
continue_on_error: true
```
⇛ For Security Researchers
Bug Bounty Recon Template
```yaml
name: BugBountyRecon
description: Comprehensive reconnaissance workflow
variables:
OUTPUT_DIR: "{{TARGET}}"
THREADS: "50"
WORDLIST: "/usr/share/wordlists/SecLists/Discovery/DNS/dns-Jhaddix.txt"
steps:
- name: Subdomain Enumeration
command: subfinder -d {{TARGET}} -o {{OUTPUT_DIR}}/subdomains.txt
- name: DNS Resolution
command: puredns resolve {{OUTPUT_DIR}}/subdomains.txt
- name: HTTP Probing
command: httpx -l {{OUTPUT_DIR}}/resolved.txt -o {{OUTPUT_DIR}}/live_hosts.txt
- name: Vulnerability Scanning
command: nuclei -l {{OUTPUT_DIR}}/live_hosts.txt -o {{OUTPUT_DIR}}/vulnerabilities.txt
```
## Planned Features
- [ ] Parallel Step Execution
- [ ] Enhanced Variable Interpolation
- [ ] Plugin System
- [ ] Step Timeout Functionality
- [ ] Community Templates Library