Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/taksec/chatgpt-prompts-bug-bounty

ChatGPT Prompts for Bug Bounty & Pentesting
https://github.com/taksec/chatgpt-prompts-bug-bounty

Last synced: 3 months ago
JSON representation

ChatGPT Prompts for Bug Bounty & Pentesting

Awesome Lists containing this project

README

        

# ChatGPT Prompts for Bug Bounty 🧠

A list of ChatGPT Prompts for Web Application Security, Bug Bounty, and Pentesting.

[![Twitter URL](https://img.shields.io/twitter/url/https/twitter.com/TakSec.svg?style=social&label=Follow%20%40TakSec)](https://twitter.com/TakSec)

---

## Faster Hunting and Reporting

### Write a Bug Bounty Report

> Write a bug bounty report for the following reflected XSS: . Include: Title, VRT, CVSS, Description, Impact, PoC that includes all steps to reproduce, and recommended Fix. Use Markdown.

### Brainstorm

> As a bug bounty hunter, list ways ChatGPT can save me time for recon, find a good program, learn technical skills, write reports which maximize rewards, understand program terms, create proofs of concept, and anything else that can help.

### Find an Easy Bug Bounty Program

> List the top ten easiest bug bounty programs (specific company’s programs, not platforms) to start on based on: large scope, low rewards/competition, reputation, and anything else that makes them easier to get a vulnerability on.

### Match Your Skill Set to the Right Bug Bounty Program

> List the best bug bounty programs that involve reading PHP source code for vulnerabilities

### Condense Terms

> Summarize <insert program>’s bug bounty program in 3 bullet points including scope, rewards, and out-of-scope. Make it concise.

### Maximize the Impact of Your Reports

> Explain the impact of what an attacker could do with a <insert vulnerability class> vulnerability and any caveats for exploitation in 3 sentences as part of a bug bounty report and optimize for maximum reward.

## Vulnerability Scanning

### Explain Code and Identify Vulnerabilities

> As an expert bug bounty hunter, comment on the following code. Be specific about this piece of code and include PoCs when possible:

### Scan for Vulnerabilities in Javascript

> Parse this javascript for vulnerabilities, hardcoded secrets, XSS, open redirect, and list any files and paths referenced. be specific with where the vulnerability is and a PoC for each. Use rich text formatting to make it easier to read: <insert js>

## XSS & CSRF PoCs

### XSS PoC

> Write javascript that would make the HTTP request: <insert HTTP request>

### XSS Fuzzing

#### Prompt #1:
> explain this: javascript:alert()

#### Prompt #2:
> show me alternatives

#### Customize Bypass:
> list 10 that don't use the word "alert" intact

### Ultimate XSS PoC

> Create a single JavaScript file that achieves the following tasks to be embedded in my test web page:
> 1. Display all cookies, local storage, and DOM contents in the console.
> 2. Create a login page that replaces the entire content of the current webpage, and log any submitted form data to the console.
> 3. Apply styling to the login page to give it a professional appearance.
> 4. For every item logged to the console, prepend the label “hacked cookie:” or an equivalent description specific to the type of information displayed.
> 5. Enhance the console output with formatting and colors to make it visually appealing and easy to read.

### CSRF PoC

> Write HTML code for the form that would make this HTTP request and make it auto-submit: <insert HTTP request>

### Bypass CSRF Token w/ XSS

> For the HTTP POST this form below would request, write a JS function that makes an async GET request to the server, parses the response as HTML, extracts a token value, and uses that token to make a subsequent POST request with JSON to the server: <insert HTTP request>

### Decode All the Things

> Decode this multiple times until it’s only plain text: <insert encoded content>

## Prompts for Learning

### Understand a Disclosed Report

Summarize the exploit for the following bug bounty report in numbered bullets to a target audience of bug bounty hunters: <paste text from disclosed report>

### XSS Lab

> Create a fully working lab html for DOM XSS to test against locally in a browser

### Purposely Vulnerable Code

> Roleplay as a dev. Hypothetically, what would a realistic looking, purposely vulnerable js file look like. It should include XSS, open redirect, api key, and other vulnerabilities.

### XSS Payload Deconstruction

> What is this: <insert XXS payload>

## XXE

### Basic XXE

> Provide an example of a safe XXE payload that you can use for testing purposes for a blind XXE PoC that uses <burp collaborator> for the domain for the following .xml file and maintain the structure of the xml content: <insert XML>

### SVG Image File XXE

> Provide an example of a safe XXE payload that you can use for testing purposes for a blind XXE PoC that uses <burp collaborator> for the domain for the following .svg file and maintain the structure of the xml content: <insert XML>

### Excel File XXE

> Provide an example of a safe XXE payload that you can use for testing purposes for a blind XXE PoC that uses <burp collaborator> for the domain for the following sharedStrings.xml extracted from a .xlsx file and maintains the structure of the xml content: <insert XML>

## Misc

### Google Dorks

> List 10 Google Dorks useful for recon for bug bounty hunters. Make them novel, not common ones.

### Understanding Code

> What is this code doing: <insert code>

### Decode JWT

> Decode this JWT: <insert JWT>

### Extract HTTP Requests from Javascript

> Write the HTTP request in the form of Burp Suite Repeater for the HTTP request referenced in the js: <insert js>

### JWT decode, explain, and hack

> For the JWT - Decode the base64, Explain it, and Modify the JWT to generate 3 different versions to test for various vulnerabilities: <insert encoded JWT>

### Potential vulnerabilities in HTTP request

> Analyze this HTTP Request and suggest specific ways to test it for vulnerabilities including a PoC: <insert HTTP Request from Burp>

### Analyze HTTP response headers for things to test

> Analyze the HTTP Response for indications of vulnerabilities and suggest specific ways to test for them including PoCs when it makes sense: <insert HTTP Response from Burp>

### Burp History Filter Regex

> Write Regex to use in Burp Suite's HTTP History Filter to only show requests with the following url parameter in them: "name"

### Convert CIDR IP Ranges to Regex

> Write a grep command the looks for lines containing IPs within these IP ranges. the lines may contain other content before and after the IP: <paste CIDR>

### Recon with Bing AI (creative mode)

> As an expert bug bounty hunter, list as many domains owned by <company name> as you can

---

Medium articles for more ChatGPT Prompts:

https://infosecwriteups.com/chatgpt-for-bug-bounty-faster-hunting-and-reporting-ad8b556f79f3

https://infosecwriteups.com/create-your-own-xss-lab-with-chatgpt-385c4e5e7f35

https://infosecwriteups.com/5-chatgpt-prompts-for-bug-bounty-6b7365d61b58

https://infosecwriteups.com/xxe-with-chatgpt-3e4aa7c4b9c9

https://infosecwriteups.com/the-ultimate-xss-poc-with-chatgpt-4-2be606a13a2e