๐ Advanced Reconnaissance Framework for Bug Bounty Hunters
HuntTheBug is a comprehensive, automated reconnaissance toolkit designed specifically for bug bounty hunters and security researchers. It combines 30+ industry-leading tools into a unified workflow for efficient vulnerability discovery.
- ๐ฏ Purpose: Automated reconnaissance for bug bounty programs
- ๐ ๏ธ Tools: 30+ integrated security tools
- โก Speed: Parallel execution for maximum efficiency
- ๐ฑ Notifications: Real-time Telegram bot alerts
- Multi-Source Discovery: Amass, SubFinder, Sublist3r, Crobat, AssetFinder, FindDomain, GitHub, Subscraper
- Live Domain Verification: HTTPX + Httprobe for active subdomain detection
- Status Code Analysis: Hakcheckurl for 200/403 subdomain identification
- Automated Scanning: SubJack + Nuclei for vulnerable subdomain identification
- Real-time Alerts: Telegram bot notifications for immediate threat response
- Historical URL Discovery: GAU + WaybackURLs for comprehensive endpoint mapping
- Live URL Verification: FFUF for active endpoint confirmation
- Parameter Extraction: ParamSpider for attack surface expansion
- JavaScript Mining: SecretFinder + JSFinder for sensitive data extraction
- Advanced Fuzzing: Dirsearch with custom wordlists
- Port Discovery: Naabu for open port identification
- Vulnerability Assessment: Nuclei template-based scanning
- Reverse WHOIS: Knockknock for corporate asset mapping
- IP Intelligence: IPinfo for infrastructure analysis
| ๐ Speed | ๐ฏ Accuracy | ๐ก๏ธ Security | ๐ฑ Automation |
|---|---|---|---|
| Parallel execution | Multi-tool validation | Safe scanning practices | Real-time notifications |
| Optimized workflows | Comprehensive coverage | Non-intrusive methods | Scheduled scans |
| Smart caching | False positive reduction | Ethical guidelines | Custom alerting |
| Requirement | Minimum | Recommended |
|---|---|---|
| OS | Kali Linux | Kali Linux Latest |
| CPU | 2+ Cores | 4+ Cores |
| RAM | 4GB+ | 8GB+ |
| Storage | 10GB+ | 20GB+ |
โ ๏ธ Warning: Tested with 1GB RAM + 1 Core CPU resulted in system crashes. Ensure minimum requirements.
# Install dependencies
apt install zsh git -y
# Clone the repository
cd ~
git clone https://github.com/vikrantbatra05/HuntTheBug
# Navigate and setup
cd ~/HuntTheBug
chmod +x *.zsh
# Run installation script
./install.zshAmass Configuration:
nano ~/HuntTheBug/config/amass-config.ini๐ Detailed Guide
SubFinder Configuration:
nano ~/HuntTheBug/config/subfinder-config.yaml๐ Setup Tutorial
Telegram Bot Setup:
nano ~/HuntTheBug/conf.zshResources:
- ๐ค Bot Token & Chat ID
- ๐ Alternative Method
- ๐ GitHub Token
| Scope | Target | Purpose |
|---|---|---|
| Medium | *.target.com | Comprehensive recon |
| Small | app.target.com | Focused analysis |
| Organization | company_name | Asset discovery |
| 403 Bypass | https://target.com | Access testing |
Medium Scope Programs:
./recon.zsh target.comSmall Scope Programs:
./dom_hunt.zsh app.target.com
./dom_hunt.zsh target.comOrganization Intelligence:
./org_hunt.zsh organization_name403 Bypass Testing:
./403_hunt.zsh https://target.com| Phase | Tools | Purpose | Output |
|---|---|---|---|
| 1. Subdomain Discovery | Amass, SubFinder, SubLis3R, Crobat, AssetFinder, FindDomain, GitHub, Subscraper | Comprehensive enumeration | Raw subdomain list |
| 2. Live Verification | HTTPX, Httprobe | Active subdomain identification | Live domains only |
| 3. Status Analysis | Hakcheckurl | 200/403 filtering | Responsive subdomains |
| 4. Takeover Detection | SubJack, Nuclei | Vulnerable subdomain ID | Takeover candidates |
| 5. URL Discovery | GAU, WaybackURLs | Historical endpoint mapping | URL database |
| 6. Live URL Testing | FFUF | Active endpoint verification | Live URLs |
| 7. Parameter Mining | ParamSpider | Attack surface expansion | Parameterized URLs |
| 8. JavaScript Analysis | SecretFinder, JSFinder | Sensitive data extraction | Secrets & endpoints |
| 9. Directory Fuzzing | Dirsearch | Hidden endpoint discovery | Directory structure |
| 10. Port Scanning | Naabu | Open port identification | Port inventory |
| 11. Vulnerability Scanning | Nuclei | Known vulnerability detection | Vulnerability report |
| Phase | Tools | Purpose |
|---|---|---|
| URL Discovery | GAU, WaybackURLs | Historical endpoint collection |
| Live Testing | FFUF | Active endpoint verification |
| Pattern Analysis | GF Tool | Security pattern matching |
| Parameter Extraction | ParamSpider | Parameter discovery |
| JavaScript Mining | JSFinder, jsvar.sh | Endpoint and variable extraction |
| Secret Detection | SecretFinder | Sensitive data discovery |
| Directory Fuzzing | Dirsearch | Hidden directory discovery |
| Vulnerability Scanning | Nuclei | Known vulnerability detection |
| Phase | Tools | Purpose |
|---|---|---|
| Domain Discovery | Knockknock | Reverse WHOIS lookup |
| Live Verification | HTTPX | Active domain confirmation |
| IP Intelligence | IPinfo | Infrastructure analysis |
| Tool | Purpose | Repository |
|---|---|---|
| Amass | Advanced subdomain enumeration | OWASP/Amass |
| SubFinder | Passive subdomain discovery | projectdiscovery/subfinder |
| Nuclei | Vulnerability scanning | projectdiscovery/nuclei |
| HTTPX | HTTP probing | projectdiscovery/httpx |
| Naabu | Port scanning | projectdiscovery/naabu |
| Tool | Purpose | Repository |
|---|---|---|
| SubJack | Subdomain takeover | haccer/subjack |
| GAU | URL gathering | lc/gau |
| FFUF | Web fuzzing | ffuf/ffuf |
| Dirsearch | Directory brute force | maurosoria/dirsearch |
| SecretFinder | Secret detection in JS | m4ll0k/SecretFinder |
| Tool | Repository |
|---|---|
| byp4xx | lobuhi/byp4xx |
| 403bypasser | yunemse48/403bypasser |
| bypass-403 | iamj0ker/bypass-403 |
HuntTheBug/
โโโ config/ # Configuration files
โ โโโ amass-config.ini # Amass settings
โ โโโ subfinder-config.yaml # SubFinder settings
โโโ wordlist/ # Custom wordlists
โ โโโ raft-*.txt # Raft wordlists
โ โโโ all.txt # Comprehensive wordlist
โ โโโ dns-resolvers.txt # DNS resolvers
โโโ *.zsh # Main reconnaissance scripts
โโโ conf.zsh # Global configuration
โโโ install.zsh # Installation script
โโโ LICENSE # GPL v3 License
We welcome contributions! Here's how you can help:
- Report Issues: Found a bug? Open an issue
- Feature Requests: Have an idea? Suggest a feature
- Pull Requests: Want to contribute code? Submit a PR
- Follow existing code style
- Test your changes thoroughly
- Update documentation as needed
- Ensure compatibility with Kali Linux
This project is licensed under the GNU General Public License v3.0 - see the LICENSE file for details.
Special thanks to all the open-source tools that make HuntTheBug possible:
- ProjectDiscovery - For amazing tools like Nuclei, SubFinder, HTTPX, Naabu
- TomNomNom - For incredible reconnaissance tools
- OWASP - For the Amass project
- All other tool authors - Your contributions are invaluable!
- The bug bounty community for feedback and suggestions
- Security researchers who test and improve these tools
- Everyone who contributes to open-source security
- Twitter: @Vikrant_infosec
- Report Issues: GitHub Issues
- Support Development: Buy Me a Coffee
# Clone and install
git clone https://github.com/vikrantbatra05/HuntTheBug
cd ~/HuntTheBug
chmod +x *.zsh
./install.zsh
# Configure
nano conf.zsh
# Start hunting!
./recon.zsh target.com** Happy Hunting! May you find many bugs! ๐ฅ**
Built with โค๏ธ for the Bug Bounty Community