Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/freyxfi/bugrecon
An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, and report generation.
https://github.com/freyxfi/bugrecon
bugbounty bugbounty-tool bugbountytips bughunting hacktoberfest hacktoberfest-accepted hacktoberfest2024 recon reconnaissance
Last synced: 2 days ago
JSON representation
An automated bug hunting tool for comprehensive reconnaissance, including subdomain enumeration, port scanning, vulnerability detection, and report generation.
- Host: GitHub
- URL: https://github.com/freyxfi/bugrecon
- Owner: freyxfi
- Created: 2024-10-03T05:32:48.000Z (3 months ago)
- Default Branch: main
- Last Pushed: 2024-10-08T08:43:37.000Z (3 months ago)
- Last Synced: 2024-12-14T21:17:03.951Z (8 days ago)
- Topics: bugbounty, bugbounty-tool, bugbountytips, bughunting, hacktoberfest, hacktoberfest-accepted, hacktoberfest2024, recon, reconnaissance
- Language: Python
- Homepage:
- Size: 38.1 KB
- Stars: 11
- Watchers: 1
- Forks: 10
- Open Issues: 10
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Overview
BugRecon is an automated bug hunting tool designed to streamline the reconnaissance phase of bug bounty hunting and penetration testing. It performs essential tasks such as subdomain enumeration, port scanning, directory brute-forcing, vulnerability scanning, and screenshot capturing. By automating these tasks, BugRecon allows security researchers to focus on deeper analysis and exploitation, enhancing efficiency and effectiveness in identifying vulnerabilities.
# Features
1. Target Input: Prompts the user to enter the target domain.
2. Reconnaissance Depth: Allows selection of recon depth (shallow, medium, deep) to customize the extent of scanning.
3. Subdomain Enumeration: Retrieves subdomains using crt.sh.
4. Port Scanning: Identifies open ports using nmap.
5. Directory Brute-Forcing: Discovers hidden directories using ffuf.
6. Vulnerability Scanning: Checks for common vulnerabilities like SQL Injection (SQLi) and Cross-Site Scripting (XSS).
7. Screenshot Capturing: Takes screenshots of discovered web applications using EyeWitness.
8. Report Generation: Compiles findings into a comprehensive report.
9. Modular Design: Although provided as a single script, the tool is structured for easy expansion and integration of additional features.
# Prerequisites
Before using BugRecon, ensure that the following tools and dependencies are installed on your system:## External Tools
1. Python 3.6+
[Download Python](https://www.python.org/downloads/)
2. Nmap Install`go install github.com/ffuf/ffuf@latest`
3. ffuf (Fuzz Faster U Fool)`go install github.com/ffuf/ffuf@latest`
4. EyeWitness
```
git clone https://github.com/FortyNorthSecurity/EyeWitness.git
cd EyeWitness/Python/setup
python setup.py install
```# Python Packages
Install the required Python packages using pip
`pip install -r requirements.txt
`# Installation
1. Clone the Repository
2. Install Python Dependencies
3. Ensure External Tools are Installed
Make sure that nmap, ffuf, and EyeWitness are installed and added to your system's PATH.# Usage (update it)
Run the bug_recon.py script using Python# Step-by-Step Guide (comming soon)
# Recon Depth Levels (comming soon)
# Example (comming soon)
# Generated Report (example.com_report.txt)
(comming soon)
something like this```
Bug Recon Report for example.com
Subdomains Found:
- subdomain1.example.com
- subdomain2.example.com
- subdomain3.example.com
- subdomain4.example.com
- subdomain5.example.comOpen Ports:
- 80
- 443
- 8080Vulnerabilities:
- subdomain1.example.com:80
- Possible SQL Injection
- Possible XSS
- subdomain3.example.com:443
- Possible XSS
```# Contributing (comming soon)
Contributions are welcome! If you'd like to enhance BugRecon, follow these steps:
# License
Note :- feel free to update and contribute