Skip to content

Automated recon tool that discovers subdomains, fetches Wayback URLs, and extracts sensitive URLs or parameterized links. Optional flags allow direct scanning for JWTs, emails, or sensitive endpoints.

Notifications You must be signed in to change notification settings

Trabbit1/BHuntyHunter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

47 Commits
 
 
 
 
 
 

Repository files navigation

BHunty Logo


BHunty is a Python-based bug bounty reconnaissance toolkit by Trabbit0ne.
It automates subdomain enumeration, Wayback Machine URL collection, and optional sensitive keyword scanning for juicy recon findings.

Requirements

  • Python 3.6+
  • External tools required:
    • subfinder
    • assetfinder
    • waybackurls
  • Optional:
    • wcwidth (pip install wcwidth) — for proper message box width rendering

Installation

  1. Clone this repository:

    git clone https://github.com/Trabbit1/BHunty
    cd BHunty
  2. (Optional) Install the wcwidth module:

    pip3 install -r requirements.txt
  3. Make sure the required binaries (subfinder, assetfinder, waybackurls) are in your $PATH.


Usage

python3 bhunty.py <domain or URL> [option(s)]

You can also pass a full URL (e.g., https://sub.example.com/page) — BHunty will extract the domain automatically.

You’ll be prompted whether you want to scan the archive URLs for sensitive keywords.


Useful Usage Examples

Auto XSS

domain="domain.com"; yes y | bhunty "$domain" --param; clear; cat "results/$domain/params.txt" | dalfox pipe

Sensitive Access

domain="domain.com"; yes y | bhunty "$domain" --sensitive; clear; cat "results/$domain/sensitive.txt" | httpx -silent -sc

Auto 403 Discovery

domain="domain.com"; yes y | bhunty "$domain"; clear; cat "results/$domain/waybackurls.txt" | httpx -silent -mc 403

JWT Extractor

domain="domain.com"; yes y | bhunty "$domain"; clear; cat "results/$domain/waybackurls.txt" | grep -Eo 'eyJ[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+\.[A-Za-z0-9_-]+'

Output Structure

results/
└── example.com/
    ├── subdomains.txt       # Enumerated subdomains
    ├── waybackurls.txt      # URLs pulled from the Wayback Machine
    ├── params.txt           # (Optional) Parameters in URLs
    └── sensitive.txt        # (Optional) Matched keywords in URLs

Project Structure

BHunty/
  ├── bhunty.py
  └── README.md

Author

Made by Trabbit0ne

About

Automated recon tool that discovers subdomains, fetches Wayback URLs, and extracts sensitive URLs or parameterized links. Optional flags allow direct scanning for JWTs, emails, or sensitive endpoints.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages