⚙️ Complete Bug Bounty tool List ⚙️
Enjoy :)
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/
oxml_xxe https://github.com/BuffaloWill/oxml_xxe/
XXE Injector https://github.com/enjoiz/XXEinjector
The JSON Web Token Toolkit https://github.com/ticarpi/jwt_tool
ground-control https://github.com/jobertabma/ground-control
ssrfDetector https://github.com/JacobReynolds/ssrfDetector
LFISuit https://github.com/D35m0nd142/LFISuite
GitTools https://github.com/internetwache/GitTools
dvcs-ripper https://github.com/kost/dvcs-ripper
tko-subs https://github.com/anshumanbh/tko-subs
HostileSubBruteforcer https://github.com/nahamsec/HostileSubBruteforcer
Race the Web https://github.com/insp3ctre/race-the-web
ysoserial https://github.com/GoSecure/ysoserial
PHPGGC https://github.com/ambionics/phpggc
CORStest https://github.com/RUB-NDS/CORStest
Retire-js https://github.com/RetireJS/retire.js
getsploit https://github.com/vulnersCom/getsploit
Findsploit https://github.com/1N3/Findsploit
bfac https://github.com/mazen160/bfac
WPScan https://wpscan.org/
CMSMap https://github.com/Dionach/CMSmap
Amass https://github.com/OWASP/Amass
Extra Tools
http://projectdiscovery.io
Enjoy :)
dnscan https://github.com/rbsec/dnscan
Knockpy https://github.com/guelfoweb/knock
Sublist3r https://github.com/aboul3la/Sublist3r
massdns https://github.com/blechschmidt/massdns
Nmap https://nmap.org
Masscan https://github.com/robertdavidgraham/masscan
EyeWitness https://github.com/ChrisTruncer/EyeWitness
DirBuster https://sourceforge.net/projects/dirbuster/
dirsearch https://github.com/maurosoria/dirsearch
Gitrob https://github.com/michenriksen/gitrob
git-secrets https://github.com/awslabs/git-secrets
sandcastle https://github.com/yasinS/sandcastle
bucket_finder https://digi.ninja/projects/bucket_finder.php
GoogD0rker https://github.com/ZephrFish/GoogD0rker/
Wayback Machine https://web.archive.org
waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050
Sn1per https://github.com/1N3/Sn1per/
XRay https://github.com/evilsocket/xray
wfuzz https://github.com/xmendez/wfuzz/
patator https://github.com/lanjelot/patator
datasploit https://github.com/DataSploit/datasploit
hydra https://github.com/vanhauser-thc/thc-hydra
changeme https://github.com/ztgrace/changeme
MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/
Apktool https://github.com/iBotPeaches/Apktool
dex2jar https://sourceforge.net/projects/dex2jar/
sqlmap http://sqlmap.org/
oxml_xxe https://github.com/BuffaloWill/oxml_xxe/
XXE Injector https://github.com/enjoiz/XXEinjector
The JSON Web Token Toolkit https://github.com/ticarpi/jwt_tool
ground-control https://github.com/jobertabma/ground-control
ssrfDetector https://github.com/JacobReynolds/ssrfDetector
LFISuit https://github.com/D35m0nd142/LFISuite
GitTools https://github.com/internetwache/GitTools
dvcs-ripper https://github.com/kost/dvcs-ripper
tko-subs https://github.com/anshumanbh/tko-subs
HostileSubBruteforcer https://github.com/nahamsec/HostileSubBruteforcer
Race the Web https://github.com/insp3ctre/race-the-web
ysoserial https://github.com/GoSecure/ysoserial
PHPGGC https://github.com/ambionics/phpggc
CORStest https://github.com/RUB-NDS/CORStest
Retire-js https://github.com/RetireJS/retire.js
getsploit https://github.com/vulnersCom/getsploit
Findsploit https://github.com/1N3/Findsploit
bfac https://github.com/mazen160/bfac
WPScan https://wpscan.org/
CMSMap https://github.com/Dionach/CMSmap
Amass https://github.com/OWASP/Amass
Extra Tools
http://projectdiscovery.io
GitHub
GitHub - rbsec/dnscan
Contribute to rbsec/dnscan development by creating an account on GitHub.
🚀 LFI - Interesting Linux files
/etc/issue
/etc/passwd
/etc/shadow
/etc/group
/etc/hosts
/etc/motd
/etc/mysql/my.cnf
/proc/[0-9]*/fd/[0-9]* (first number is the PID, second is the filedescriptor)
/proc/self/environ
/proc/version
/proc/cmdline
/proc/sched_debug
/proc/mounts
/proc/net/arp
/proc/net/route
/proc/net/tcp
/proc/net/udp
/proc/self/cwd/index.php
/proc/self/cwd/main.py
/home/$USER/.bash_history
/home/$USER/.ssh/id_rsa
/run/secrets/kubernetes.io/serviceaccount/token
/run/secrets/kubernetes.io/serviceaccount/namespace
/run/secrets/kubernetes.io/serviceaccount/certificate
/var/run/secrets/kubernetes.io/serviceaccount
/var/lib/mlocate/mlocate.db
/var/lib/plocate/plocate.db
/var/lib/mlocate.db
#bugbounty #bugbountytips #bugbountytip #hackerone #bugcrowd #infosec #cybersecurity #pentesting #redteam #informationsecurity #securitycipher #technology #coding #code #recon #ai #llm #owasp
/etc/issue
/etc/passwd
/etc/shadow
/etc/group
/etc/hosts
/etc/motd
/etc/mysql/my.cnf
/proc/[0-9]*/fd/[0-9]* (first number is the PID, second is the filedescriptor)
/proc/self/environ
/proc/version
/proc/cmdline
/proc/sched_debug
/proc/mounts
/proc/net/arp
/proc/net/route
/proc/net/tcp
/proc/net/udp
/proc/self/cwd/index.php
/proc/self/cwd/main.py
/home/$USER/.bash_history
/home/$USER/.ssh/id_rsa
/run/secrets/kubernetes.io/serviceaccount/token
/run/secrets/kubernetes.io/serviceaccount/namespace
/run/secrets/kubernetes.io/serviceaccount/certificate
/var/run/secrets/kubernetes.io/serviceaccount
/var/lib/mlocate/mlocate.db
/var/lib/plocate/plocate.db
/var/lib/mlocate.db
#bugbounty #bugbountytips #bugbountytip #hackerone #bugcrowd #infosec #cybersecurity #pentesting #redteam #informationsecurity #securitycipher #technology #coding #code #recon #ai #llm #owasp
Kubernetes
Configure Service Accounts for Pods
Kubernetes offers two distinct ways for clients that run within your cluster, or that otherwise have a relationship to your cluster's control plane to authenticate to the API server.
A service account provides an identity for processes that run in a Pod,…
A service account provides an identity for processes that run in a Pod,…
A Comprehensive Repo for Shodan Dorks
This GitHub repository provides a range of Shodan dorks to find vulnerabilities and configuration issues in various types of devices such as webcams, routers, and servers.
• Repository: https://github.com/nullfuzz-pentest/shodan-dorks
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #shodan #recon #dork
This GitHub repository provides a range of Shodan dorks to find vulnerabilities and configuration issues in various types of devices such as webcams, routers, and servers.
• Repository: https://github.com/nullfuzz-pentest/shodan-dorks
#infosec #cybersecurity #bugbounty #pentest #bugbountyTips #shodan #recon #dork
GitHub
GitHub - nullfuzz-pentest/shodan-dorks: Shodan Dorks
Shodan Dorks. Contribute to nullfuzz-pentest/shodan-dorks development by creating an account on GitHub.
generate the poc for cors-miss endpoint https://vral-parmar.github.io/CORS-POC-Generator
http://GitBook_s.t.me
http://GitBook_s.t.me
🚀 Google Dorks for Bug Bounty & Web Security! 🔍
A powerful list of Google Dorks to uncover hidden files, API endpoints, server errors, and more for pentesting & bug bounty hunting! 🎯
🔥 Broad Domain Search (Exclude Common Subdomains)
🔥 PHP Files with Parameters
🔥 API Endpoints Discovery
🔥 Juicy Extensions (Sensitive Files)
🔥 High-Value InURL Keywords
🔥 Finding Server Errors
💥 Master these dorks to find misconfigurations, sensitive data leaks, and security flaws!
📢 #BugBounty #GoogleDorks #OSINT #EthicalHacking #Pentesting #CyberSecurity
A powerful list of Google Dorks to uncover hidden files, API endpoints, server errors, and more for pentesting & bug bounty hunting! 🎯
🔥 Broad Domain Search (Exclude Common Subdomains)
site:example.com -www -shop -share -ir -mfa
🔥 PHP Files with Parameters
site:example.com ext:php inurl:?
🔥 API Endpoints Discovery
site:example[.]com inurl:api | site:*/rest | site:*/v1 | site:*/v2 | site:*/v3
🔥 Juicy Extensions (Sensitive Files)
site:"example[.]com" ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess | ext:json
🔥 High-Value InURL Keywords
inurl:conf | inurl:env | inurl:cgi | inurl:bin | inurl:etc | inurl:root | inurl:sql | inurl:backup | inurl:admin | inurl:php site:example[.]com
🔥 Finding Server Errors
inurl:"error" | intitle:"exception" | intitle:"failure" | intitle:"server at" | inurl:exception | "database error" | "SQL syntax" | "undefined index" | "unhandled exception" | "stack trace" site:example[.]com
💥 Master these dorks to find misconfigurations, sensitive data leaks, and security flaws!
📢 #BugBounty #GoogleDorks #OSINT #EthicalHacking #Pentesting #CyberSecurity
List of the most useful curl commands!
🎯 Most Useful curl Commands for Downloading and Interacting with URLs
(With Emoji for Better Understanding)
# 1️⃣ Basic GET Request
Use curl to fetch the content of a URL.
# 2️⃣ Save to a File
Use -o to save the downloaded content to a file.
# 3️⃣ Display Response Headers
Use -I to only fetch the response headers.
# 4️⃣ Follow Redirects
Use -L to follow redirects (if the URL redirects you).
# 5️⃣ Download a File (with Resume)
Use -C to resume a partially downloaded file.
# 6️⃣ Show Progress
Use -# to show a progress bar during download.
# 7️⃣ Download a Torrent
Use -o to download and save a .torrent file.
# 8️⃣ Send a POST Request
Use -X POST to send data to a server (e.g., form submission).
# 9️⃣ Include Custom Headers
Use -H to add custom headers to your request.
# 🔟 Make a PUT Request
Use -X PUT to send data to update a resource.
# 🔒 Send Data with Authentication
Use -u to pass authentication credentials.
# 1️⃣1️⃣ Save Cookies
Use -c to save cookies to a file.
# 1️⃣2️⃣ Use Cookies from a File
Use -b to send cookies from a saved file.
# 1️⃣3️⃣ Limit Download Speed
Use --limit-rate to limit download speed.
# 1️⃣4️⃣ Show Full Request & Response
Use -v for verbose output (request and response details).
# 1️⃣5️⃣ Send Data as JSON
Use -H and -d to send data as JSON.
# 1️⃣6️⃣ Access a URL with SSL Verification Disabled
Use -k or --insecure to skip SSL certificate verification (not recommended for production).
# 1️⃣7️⃣ Limit Request Time
Use --max-time to limit the total request time.
# 1️⃣8️⃣ Download Multiple Files
Use -O to download multiple files at once.
# 1️⃣9️⃣ Get Information About the URL
Use -I to fetch only headers for a URL.
# 2️⃣0️⃣ Use a Proxy
Use -x to route your request through a proxy.
🎯 Most Useful curl Commands for Downloading and Interacting with URLs
(With Emoji for Better Understanding)
# 1️⃣ Basic GET Request
Use curl to fetch the content of a URL.
curl https://example.com
# 2️⃣ Save to a File
Use -o to save the downloaded content to a file.
curl -o filename.html https://example.com
# 3️⃣ Display Response Headers
Use -I to only fetch the response headers.
curl -I https://example.com
# 4️⃣ Follow Redirects
Use -L to follow redirects (if the URL redirects you).
curl -L https://example.com
# 5️⃣ Download a File (with Resume)
Use -C to resume a partially downloaded file.
curl -C - -O https://example.com/largefile.zip
# 6️⃣ Show Progress
Use -# to show a progress bar during download.
curl -# -O https://example.com/largefile.zip
# 7️⃣ Download a Torrent
Use -o to download and save a .torrent file.
curl -o ubuntu-22.04.iso.torrent https://releases.ubuntu.com/22.04/ubuntu-22.04.5-live-server-amd64.iso.torrent
# 8️⃣ Send a POST Request
Use -X POST to send data to a server (e.g., form submission).
curl -X POST -d "username=user&password=pass" https://example.com/login
# 9️⃣ Include Custom Headers
Use -H to add custom headers to your request.
curl -H "Authorization: Bearer TOKEN" https://api.example.com/data
# 🔟 Make a PUT Request
Use -X PUT to send data to update a resource.
curl -X PUT -d '{"name": "John"}' -H "Content-Type: application/json" https://example.com/update
# 🔒 Send Data with Authentication
Use -u to pass authentication credentials.
curl -u username:password https://example.com
# 1️⃣1️⃣ Save Cookies
Use -c to save cookies to a file.
curl -c cookies.txt https://example.com
# 1️⃣2️⃣ Use Cookies from a File
Use -b to send cookies from a saved file.
curl -b cookies.txt https://example.com
# 1️⃣3️⃣ Limit Download Speed
Use --limit-rate to limit download speed.
curl --limit-rate 100K -O https://example.com/largefile.zip
# 1️⃣4️⃣ Show Full Request & Response
Use -v for verbose output (request and response details).
curl -v https://example.com
# 1️⃣5️⃣ Send Data as JSON
Use -H and -d to send data as JSON.
curl -X POST -H "Content-Type: application/json" -d '{"key": "value"}' https://example.com/api
# 1️⃣6️⃣ Access a URL with SSL Verification Disabled
Use -k or --insecure to skip SSL certificate verification (not recommended for production).
curl -k https://example.com
# 1️⃣7️⃣ Limit Request Time
Use --max-time to limit the total request time.
curl --max-time 10 https://example.com
# 1️⃣8️⃣ Download Multiple Files
Use -O to download multiple files at once.
curl -O https://example.com/file1.zip -O https://example.com/file2.zip
# 1️⃣9️⃣ Get Information About the URL
Use -I to fetch only headers for a URL.
curl -I https://example.com
# 2️⃣0️⃣ Use a Proxy
Use -x to route your request through a proxy.
curl -x proxy.example.com:8080 https://example.com
If you come across a WordPress website, fuzz for these files and patterns:
• You can generate wordlists with the patterns above or any pattern you want using Fback:
https://github.com/Spix0r/Fback
#InfoSec #CyberSecurity #Hacking #Course #bugbounty #wordpress #Fuzzing
.env.bak
.env.php
wp-config-backup.php
wp-config.php.save
wp-config.php~
wp-config.php.old
error_log.log
php_error.log
wp.sql
db.sql
wpbackup.sql
mysql_backup.sql
{TARGET}.zip
{TARGET}-backup.zip
• You can generate wordlists with the patterns above or any pattern you want using Fback:
https://github.com/Spix0r/Fback
#InfoSec #CyberSecurity #Hacking #Course #bugbounty #wordpress #Fuzzing
GitHub
GitHub - Spix0r/fback: This is a useful Python script for generating a target specific wordlist for fuzzing backup files.
This is a useful Python script for generating a target specific wordlist for fuzzing backup files. - Spix0r/fback
A Hacker's Notebook: Real Techniques from the World of Bug Bounty
https://snapdragon-copper-dd1.notion.site/A-Hacker-s-Notebook-Real-Techniques-from-the-World-of-Bug-Bounty-20ea797be4c680e6b542c20a943782d6?pvs=73
By: @bugbountyhints
http://GitBook_s.t.me
https://snapdragon-copper-dd1.notion.site/A-Hacker-s-Notebook-Real-Techniques-from-the-World-of-Bug-Bounty-20ea797be4c680e6b542c20a943782d6?pvs=73
By: @bugbountyhints
http://GitBook_s.t.me
snapdragon-copper-dd1 on Notion
A Hacker's Notebook: Real Techniques from the World of Bug Bounty | Notion
This document is a collection of practical tips and techniques gathered from various bug bounty write-ups. The goal is to share these real-world scenarios to get a better perspective on finding vulnerabilities and developing a hacker's mindset.
#cross_promotion
A channel specialized in Bug Bounty and vulnerability discovery. We share tools, tutorials, reports, and everything that helps you improve your hacking and bug hunting skills.
https://t.me/ExploitQuest
https://t.me/ExploitQuest
A channel specialized in Bug Bounty and vulnerability discovery. We share tools, tutorials, reports, and everything that helps you improve your hacking and bug hunting skills.
https://t.me/ExploitQuest
https://t.me/ExploitQuest
Telegram
ExploitQuest
contact: @ExploitQuestbot
Resume @GitBook_s #1en #2fa #3fa #4fa #5fa #6fa #7fa #8fa #9fa #10fa #11fa #12fa #13fa #14fa #15fa #16fa #17fa #18fa-1 #19fa-2 #20fa-3 #21fa-4 #22fa-5 #23fa-6 #24fa-7 #25fa-8 #26fa-check_list
http://GitBook_s.t.me
http://GitBook_s.t.me
Linkedin
Sharing a detailed step-by-step breakdown of a resume that got shortlisted by Google, Microsoft, and Amazon! | Priya Vajpeyi
Sharing a detailed step-by-step breakdown of a resume that got shortlisted by Google, Microsoft, and Amazon!
(You might not be planning to work there for now, but what's the harm in learning?) Feel free to reshare it! 🚀
🔥 Looking for a Resume writing…
(You might not be planning to work there for now, but what's the harm in learning?) Feel free to reshare it! 🚀
🔥 Looking for a Resume writing…