- https://scans.io/
- https://commoncrawl.org/
- https://web.archive.org/ (For JS snippets this can be extremely handy. See killbox.sh below that was written for a HackerOne event.)
- https://www.shodan.io/
- https://opendata.rapid7.com/
- https://www.virustotal.com/en/documentation/public-api/ (You can fetch previously-scanned URLs via the API.)
- https://securitytrails.com/
- https://threatcrowd.org/
- https://dnsdumpster.com/
- https://crt.sh/
- https://github.com/EdOverflow/hacks (There are some services in here that I rely on that could come in handy.)
- https://github.com and other Git services are great for reconnaissance (See https://edoverflow.com/2017/github-for-bugbountyhunters/ and https://edoverflow.com/2017/github-recon/).
- https://pastebin.com/
- Google groups and Trello boards often expose valuable information about a target.
- https://github.com/infosec-au/assetnote-poc
- https://github.com/pentester-io/commonspeak
- https://github.com/arkadiyt/bounty-targets
- https://github.com/misterch0c/twitterBFTD
Last active
April 29, 2021 13:29
-
-
Save EdOverflow/4d96b379da40b6c9006ac5e721450651 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
GREEN='\033[0;32m' | |
YELLOW='\033[0;33m' | |
RED='\033[0;31m' | |
CYAN='\033[0;36m' | |
END='\033[0m' | |
echo -e """${CYAN} | |
██╗ ██╗██╗██╗ ██╗ ██████╗ ██████╗ ██╗ ██╗ | |
██║ ██╔╝██║██║ ██║ ██╔══██╗██╔═══██╗╚██╗██╔╝ | |
█████╔╝ ██║██║ ██║ ██████╔╝██║ ██║ ╚███╔╝ | |
██╔═██╗ ██║██║ ██║ ██╔══██╗██║ ██║ ██╔██╗ | |
██║ ██╗██║███████╗███████╗██████╔╝╚██████╔╝██╔╝ ██╗ | |
╚═╝ ╚═╝╚═╝╚══════╝╚══════╝╚═════╝ ╚═════╝ ╚═╝ ╚═╝${END} | |
${RED}~ Frogs find bugs. ~${END} | |
""" | |
for id in {0..7}; do | |
echo "[+] GET 201$id" | |
curl -Ls "https://web.archive.org/web/201${id}0301234743js_/https://www.mapbox.com/base.js/dist/base.js" > "mapbox-$id" | |
js-beautify "mapbox-$id" > "mapbox-$id-lol" | |
python /root/LinkFinder/linkfinder.py -i "mapbox-$id-lol" -o cli > "mapbox-$id-endpoints" 2> /dev/null | |
done | |
echo | |
echo "[+] Diff files." | |
for doc in {0..6}; do | |
docplus=$((doc + 1)) | |
colordiff "mapbox-$doc-endpoints" "mapbox-$docplus-endpoints" | |
done | |
echo | |
echo "[+] Grep for passwords." | |
grep --color -i "password" "mapbox-7-lol" | |
echo | |
echo "[+] Grep for tokens." | |
grep --color -i "token" "mapbox-7-lol" | |
echo "In frogs we trust." | cowsay -f bud-frogs | lolcat |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment