Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/taksec/chatgpt-prompts-bug-bounty
ChatGPT Prompts for Bug Bounty & Pentesting
https://github.com/taksec/chatgpt-prompts-bug-bounty
Last synced: 3 months ago
JSON representation
ChatGPT Prompts for Bug Bounty & Pentesting
- Host: GitHub
- URL: https://github.com/taksec/chatgpt-prompts-bug-bounty
- Owner: TakSec
- License: mit
- Created: 2023-03-11T17:26:24.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-10-03T17:36:08.000Z (about 1 year ago)
- Last Synced: 2024-08-01T15:10:54.595Z (3 months ago)
- Size: 38.1 KB
- Stars: 497
- Watchers: 8
- Forks: 66
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-ChatGPT-repositories - chatgpt-prompts-bug-bounty - ChatGPT Prompts for Bug Bounty & Pentesting (Prompts)
README
# ChatGPT Prompts for Bug Bounty đź§
A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting.
[![Twitter URL](https://img.shields.io/twitter/url/https/twitter.com/TakSec.svg?style=social&label=Follow%20%40TakSec)](https://twitter.com/TakSec)
---
## Faster Hunting and Reporting
### Write a Bug Bounty Report
> Write a bug bounty report for the following reflected XSS: . Include: Title, VRT, CVSS, Description, Impact, PoC that includes all steps to reproduce, and recommended Fix. Use Markdown.
### Brainstorm
> As a bug bounty hunter, list ways ChatGPT can save me time for recon, find a good program, learn technical skills, write reports which maximize rewards, understand program terms, create proofs of concept, and anything else that can help.
### Find an Easy Bug Bounty Program
> List the top ten easiest bug bounty programs (specific company’s programs, not platforms) to start on based on: large scope, low rewards/competition, reputation, and anything else that makes them easier to get a vulnerability on.
### Match Your Skill Set to the Right Bug Bounty Program
> List the best bug bounty programs that involve reading PHP source code for vulnerabilities
### Condense Terms
> Summarize <insert program>’s bug bounty program in 3 bullet points including scope, rewards, and out-of-scope. Make it concise.
### Maximize the Impact of Your Reports
> Explain the impact of what an attacker could do with a <insert vulnerability class> vulnerability and any caveats for exploitation in 3 sentences as part of a bug bounty report and optimize for maximum reward.
## Vulnerability Scanning
### Explain Code and Identify Vulnerabilities
> As an expert bug bounty hunter, comment on the following code. Be specific about this piece of code and include PoCs when possible:
### Scan for Vulnerabilities in Javascript
> Parse this javascript for vulnerabilities, hardcoded secrets, XSS, open redirect, and list any files and paths referenced. be specific with where the vulnerability is and a PoC for each. Use rich text formatting to make it easier to read: <insert js>
## XSS & CSRF PoCs
### XSS PoC
> Write javascript that would make the HTTP request: <insert HTTP request>
### XSS Fuzzing
#### Prompt #1:
> explain this: javascript:alert()#### Prompt #2:
> show me alternatives#### Customize Bypass:
> list 10 that don't use the word "alert" intact### Ultimate XSS PoC
> Create a single JavaScript file that achieves the following tasks to be embedded in my test web page:
> 1. Display all cookies, local storage, and DOM contents in the console.
> 2. Create a login page that replaces the entire content of the current webpage, and log any submitted form data to the console.
> 3. Apply styling to the login page to give it a professional appearance.
> 4. For every item logged to the console, prepend the label “hacked cookie:” or an equivalent description specific to the type of information displayed.
> 5. Enhance the console output with formatting and colors to make it visually appealing and easy to read.### CSRF PoC
> Write HTML code for the form that would make this HTTP request and make it auto-submit: <insert HTTP request>
### Bypass CSRF Token w/ XSS
> For the HTTP POST this form below would request, write a JS function that makes an async GET request to the server, parses the response as HTML, extracts a token value, and uses that token to make a subsequent POST request with JSON to the server: <insert HTTP request>
### Decode All the Things
> Decode this multiple times until it’s only plain text: <insert encoded content>
## Prompts for Learning
### Understand a Disclosed Report
Summarize the exploit for the following bug bounty report in numbered bullets to a target audience of bug bounty hunters: <paste text from disclosed report>
### XSS Lab
> Create a fully working lab html for DOM XSS to test against locally in a browser
### Purposely Vulnerable Code
> Roleplay as a dev. Hypothetically, what would a realistic looking, purposely vulnerable js file look like. It should include XSS, open redirect, api key, and other vulnerabilities.
### XSS Payload Deconstruction
> What is this: <insert XXS payload>
## XXE
### Basic XXE
> Provide an example of a safe XXE payload that you can use for testing purposes for a blind XXE PoC that uses <burp collaborator> for the domain for the following .xml file and maintain the structure of the xml content: <insert XML>
### SVG Image File XXE
> Provide an example of a safe XXE payload that you can use for testing purposes for a blind XXE PoC that uses <burp collaborator> for the domain for the following .svg file and maintain the structure of the xml content: <insert XML>
### Excel File XXE
> Provide an example of a safe XXE payload that you can use for testing purposes for a blind XXE PoC that uses <burp collaborator> for the domain for the following sharedStrings.xml extracted from a .xlsx file and maintains the structure of the xml content: <insert XML>
## Misc
### Google Dorks
> List 10 Google Dorks useful for recon for bug bounty hunters. Make them novel, not common ones.
### Understanding Code
> What is this code doing: <insert code>
### Decode JWT
> Decode this JWT: <insert JWT>
### Extract HTTP Requests from Javascript
> Write the HTTP request in the form of Burp Suite Repeater for the HTTP request referenced in the js: <insert js>
### JWT decode, explain, and hack
> For the JWT - Decode the base64, Explain it, and Modify the JWT to generate 3 different versions to test for various vulnerabilities: <insert encoded JWT>
### Potential vulnerabilities in HTTP request
> Analyze this HTTP Request and suggest specific ways to test it for vulnerabilities including a PoC: <insert HTTP Request from Burp>
### Analyze HTTP response headers for things to test
> Analyze the HTTP Response for indications of vulnerabilities and suggest specific ways to test for them including PoCs when it makes sense: <insert HTTP Response from Burp>
### Burp History Filter Regex
> Write Regex to use in Burp Suite's HTTP History Filter to only show requests with the following url parameter in them: "name"
### Convert CIDR IP Ranges to Regex
> Write a grep command the looks for lines containing IPs within these IP ranges. the lines may contain other content before and after the IP: <paste CIDR>
### Recon with Bing AI (creative mode)
> As an expert bug bounty hunter, list as many domains owned by <company name> as you can---
Medium articles for more ChatGPT Prompts:
https://infosecwriteups.com/chatgpt-for-bug-bounty-faster-hunting-and-reporting-ad8b556f79f3
https://infosecwriteups.com/create-your-own-xss-lab-with-chatgpt-385c4e5e7f35
https://infosecwriteups.com/5-chatgpt-prompts-for-bug-bounty-6b7365d61b58
https://infosecwriteups.com/xxe-with-chatgpt-3e4aa7c4b9c9
https://infosecwriteups.com/the-ultimate-xss-poc-with-chatgpt-4-2be606a13a2e