https://github.com/arkadiyt/bounty-targets-data
http://www.asnlookup.com/
{ | |
"84kr3q1592995213323": { | |
"type": 1, | |
"color": "#cc883a", | |
"title": "Burp", | |
"active": true, | |
"address": "127.0.0.1", | |
"port": 8080, | |
"proxyDNS": false, | |
"username": "", |
<!DOCTYPE html> | |
<html> | |
<head> | |
<title>CORS PoC Exploit</title> | |
</head> | |
<body> | |
<center> | |
<h1>CORS Exploit<br>secureITmania</h1> | |
<hr> |
### | |
# ▶ go get -u github.com/lc/gau | |
# ▶ go get -u github.com/tomnomnom/qsreplace | |
# ▶ go get -u github.com/tomnomnom/hacks/kxss | |
# ▶ go get -u github.com/hahwul/dalfox | |
# ▶ git clone https://github.com/dwisiswant0/DSSS | |
### | |
gauq() { |
#!/bin/bash | |
OUT="~/nuclei-results/$1" | |
TPL="~/nuclei-templates" | |
mkdir -p ${OUT} | |
SUB=$(subfinder -d $1 -silent | httprobe | tee ${OUT}/$1.txt) | |
cd ${TPL}; git pull origin master && cd - | |
for tpl in $(find $TPL -name "*.yaml"); do |
#!/bin/bash | |
#Escape slash from name for folder name | |
folderName=$(echo $1| awk '{gsub("/","_")}1'); | |
mkdir $folderName && cd $folderName | |
fqdn=$1; | |
ipList=$(dig +short $fqdn|grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}'); #Get all A names | |
if [ -z "$ipList" ] | |
then | |
ipArgument=$fqdn |
#!/bin/bash | |
##### (Cosmetic) Colour output | |
RED="\033[01;31m" # Issues/Errors | |
GREEN="\033[01;32m" # Success | |
YELLOW="\033[01;33m" # Warnings/Information | |
BLUE="\033[01;34m" # Heading | |
BOLD="\033[01;01m" # Highlight | |
RESET="\033[00m" # Normal |
This checklist may help you to have a good methodology for bug bounty hunting
When you have done a action, don't forget to check ;)
Happy hunting !
#!/usr/bin/env python3 | |
# v.0.2 | twitter.com/si9int | |
import requests, sys | |
from bs4 import BeautifulSoup as bs | |
domain = sys.argv[1] | |
subdomains = [] | |
def get_csrf_params(): | |
csrf_params = {} |