Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/xthezealot/saar

Saar is a bug bounty script combining the best tools for a smooth recon workflow
https://github.com/xthezealot/saar

bugbounty dns http hunting nuclei pentesting recon redteam scanner security subdomain vulnerability

Last synced: 25 days ago
JSON representation

Saar is a bug bounty script combining the best tools for a smooth recon workflow

Awesome Lists containing this project

README

        

# Saar

Saar is a bug bounty script combining the best tools for a smooth recon workflow.

## Install

1. Install Saar and its dependencies
```sh
curl -fLSs -o /usr/local/bin/saar https://raw.githubusercontent.com/xthezealot/saar/main/saar.sh && saar update
```
2. Configure dependencies:
- To find more subdomains, add API keys to [`$HOME/.config/subfinder/provider-config.yaml`](https://github.com/projectdiscovery/subfinder#post-installation-instructions)
- To find more hosts, add API keys to [`$HOME/.config/uncover/provider-config.yaml`](https://github.com/projectdiscovery/uncover#provider-configuration)
- To be notified of new findings, add your Telegram bot to [`$HOME/.config/notify/provider-config.yaml`](https://github.com/projectdiscovery/notify#provider-config)
```yml
telegram:
- id: "saar"
telegram_api_key: ""
telegram_chat_id: ""
telegram_format: "{{data}}"
telegram_parsemode: "MarkdownV2"
```

## Usage

For every new hunt:

1. Make a new directory and move in
2. Create a `scope.txt` file and add your targets (domain, IP, CIDR, ASN), one per line
3. Run `saar` (you can skip steps with `-skip` flags)
**Tip:** Sometimes a large number of garbage subdomains are found, and you want to filter them out manually so as not to waste time. In this case, split the workflow:
1. Stop after subdomains have been found: `saar -skip uncover -skip portscan -skip wordlists -skip http -skip vulns`
2. Remove garbage
3. Carry on: `saar -skip subs`
4. Once the scan is complete, see:
- `ports.txt` for open ports
- `ports.gnnmap` for additional port info from Nmap
- `http.txt` (and the `http` directory) for successful HTTP requests (use command `saar pphttp` for a better view)
- `secrets.txt` for secret keys found in HTTP responses
- `vulns.txt` for common vulnerabilities found by scanners
5. Find an interesting entry point and get to work

## Help

```
_________ _____ ______
/ ___/ __ `/ __ `/ ___/
(__ ) /_/ / /_/ / /
/____/\__,_/\__,_/_/ v1.0.0

Saar is a bug bounty script that discovers targets from a scope and performs all the usual scans.

Usage:
saar [flags]

Commands:
pphttp pretty print http.txt results
update update saar and its dependencies

Flags:
-s, -skip string skip a step (flag can be used multiple times) (choices: subs, uncover, portscan, wordlists, http, vulns)
```