https://github.com/sw33tLie/bbscope
Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
https://github.com/sw33tLie/bbscope
Last synced: 2 months ago
JSON representation
Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi!
- Host: GitHub
- URL: https://github.com/sw33tLie/bbscope
- Owner: sw33tLie
- License: apache-2.0
- Created: 2020-12-04T18:15:17.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2024-10-16T15:43:15.000Z (9 months ago)
- Last Synced: 2024-11-08T04:03:57.989Z (8 months ago)
- Language: Go
- Homepage:
- Size: 10.6 MB
- Stars: 1,019
- Watchers: 20
- Forks: 145
- Open Issues: 18
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- DeFi-Developer-Road-Map - bbscope
- awesome-hacking-lists - sw33tLie/bbscope - Scope gathering tool for HackerOne, Bugcrowd, Intigriti, YesWeHack, and Immunefi! (Go)
README
# bbscope
**bbscope** is a powerful scope aggregation tool for all major bug bounty platforms:
- [HackerOne](https://hackerone.com/)
- [Bugcrowd](https://bugcrowd.com/)
- [Intigriti](https://intigriti.com/)
- [Immunefi](https://immunefi.com/)
- [YesWeHack](https://yeswehack.com/)Developed by [sw33tLie](https://x.com/sw33tLie), bbscope helps you efficiently collect and manage program scopes from the platforms where you're active. Whether you're hunting for domains, Android APKs, or binaries to reverse engineer, **bbscope** makes the process quick and simple.
---
## 📦 Installation
Ensure you have a recent version of Go installed, then run:
```bash
go install github.com/sw33tLie/bbscope@latest
```---
## 🔐 Authentication
Each supported platform requires specific authentication:
- **HackerOne:** Use your API token, available from [H1 API Token Settings](https://hackerone.com/settings/api_token/edit).
**Note:** The `-u ` flag is mandatory.
- **Bugcrowd:** You have two options:
- **Option 1:** Supply your email, password, and OTP generation command. This allows bbscope to log in programmatically and obtain a valid token.
- **Option 2:** Manually log in through your browser and then provide the `_bugcrowd_session` cookie value via the `-t ` flag.
*(Both methods require 2FA; see below for additional details.)*
- **Intigriti:** Generate a personal access token from [Intigriti Personal Access Tokens](https://app.intigriti.com/researcher/personal-access-tokens).
- **YesWeHack:** Use a bearer token collected from API requests. *(Requires 2FA, see below)*
- **Immunefi:** No token is required.### Two-Factor Authentication (2FA) for Bugcrowd & YesWeHack
Bugcrowd and YesWeHack require two-factor authentication to access authenticated endpoints. We recommend installing the following [2FA CLI tool](https://github.com/rsc/2fa):
```bash
go install rsc.io/2fa@latest
```Once installed, configure it for Bugcrowd (adjust similarly for YesWeHack):
```bash
2fa -add bugcrowd
2fa key for bugcrowd: your_2fa_key_here
```Then, supply the OTP automatically using the `--otpcommand` flag in your **bbscope** command:
```bash
--otpcommand "2fa bugcrowd"
```Replace `"2fa bugcrowd"` with `"2fa yeswehack"` as needed, or whatever name you gave to the 2FA code.
Please note that the `--otpcommand` flag simply runs a shell command to fetch the OTP, and it expects the OTP to be printed to stdout. You can use any other way to fetch the OTP, as long as it prints the OTP to stdout.
---
## 🛠️ Usage
Invoke **bbscope** with the appropriate subcommand and flags:
```bash
bbscope (h1|bc|it|ywh|immunefi) -t [options]
```For a complete list of options, run:
```bash
bbscope --help
```Note that subcommands have different options, so be sure to check the help for each subcommand for more information.
---
## 📖 Examples
### HackerOne
Get in-scope targets from bounty-based HackerOne programs:
```bash
bbscope h1 -t -u -b -o t
```List Android APKs from your HackerOne programs:
```bash
bbscope h1 -t -u -o t -c android
```Include descriptions and program URLs with your targets:
```bash
bbscope h1 -t -u -o tdu -d ", "
```Retrieve URLs from private HackerOne programs:
```bash
bbscope h1 -t -u -o u -p | sort -u
```### Bugcrowd
List targets from private Bugcrowd programs that offer rewards, with automatic login:
```bash
bbscope bc -E -P "" -b -p -o t --otpcommand "2fa bugcrowd"
```Similarly, you can use the `-t ` flag to manually log in and supply the `_bugcrowd_session` cookie value:
```bash
bbscope bc -t -b -p -o t
```Note that the cookie value will expire after some minutes, so the first method is recommended.
### Intigriti
Get targets and program URLs from all Intigriti programs, including out-of-scope elements:
```bash
bbscope it -t -o tu --oos
```### Immunefi
Retrieve all available scope data from Immunefi:
```bash
bbscope immunefi
```---
## ⚠️ Scope Parsing Considerations
Bug bounty programs may not consistently categorize assets. When hunting for URLs with the `-c url` flag, consider also using `-c all` to ensure no relevant targets are missed.
---
## 🙏 Credits
Thanks to the following contributors:
- [0xatul](https://github.com/0xatul)
- [JoeMilian](https://github.com/JoeMilian)
- [ByteOven](https://github.com/ByteOven)
- [dee-see](https://gitlab.com/dee-see)
- [jub0bs](https://jub0bs.com)
- [0xbeefed](https://github.com/0xbeefed)
- [bsysop](https://x.com/bsysop)