Skip to content

vikrantbatra05/HuntTheBug

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

13 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ” HuntTheBug

License Platform Shell Bug Bounty Stars

๐Ÿš€ Advanced Reconnaissance Framework for Bug Bounty Hunters

HuntTheBug is a comprehensive, automated reconnaissance toolkit designed specifically for bug bounty hunters and security researchers. It combines 30+ industry-leading tools into a unified workflow for efficient vulnerability discovery.

๐Ÿ“– About

  • ๐ŸŽฏ Purpose: Automated reconnaissance for bug bounty programs
  • ๐Ÿ› ๏ธ Tools: 30+ integrated security tools
  • โšก Speed: Parallel execution for maximum efficiency
  • ๐Ÿ“ฑ Notifications: Real-time Telegram bot alerts

๐ŸŽฏ Features

๐Ÿ”“ Subdomain Enumeration

  • Multi-Source Discovery: Amass, SubFinder, Sublist3r, Crobat, AssetFinder, FindDomain, GitHub, Subscraper
  • Live Domain Verification: HTTPX + Httprobe for active subdomain detection
  • Status Code Analysis: Hakcheckurl for 200/403 subdomain identification

๐ŸŽญ Subdomain Takeover

  • Automated Scanning: SubJack + Nuclei for vulnerable subdomain identification
  • Real-time Alerts: Telegram bot notifications for immediate threat response

๐ŸŒ URL & JavaScript Analysis

  • Historical URL Discovery: GAU + WaybackURLs for comprehensive endpoint mapping
  • Live URL Verification: FFUF for active endpoint confirmation
  • Parameter Extraction: ParamSpider for attack surface expansion
  • JavaScript Mining: SecretFinder + JSFinder for sensitive data extraction

๐Ÿ“ Directory & Port Scanning

  • Advanced Fuzzing: Dirsearch with custom wordlists
  • Port Discovery: Naabu for open port identification
  • Vulnerability Assessment: Nuclei template-based scanning

๐Ÿข Organization Intelligence

  • Reverse WHOIS: Knockknock for corporate asset mapping
  • IP Intelligence: IPinfo for infrastructure analysis

๐Ÿ† Key Advantages

๐Ÿš€ Speed ๐ŸŽฏ Accuracy ๐Ÿ›ก๏ธ Security ๐Ÿ“ฑ Automation
Parallel execution Multi-tool validation Safe scanning practices Real-time notifications
Optimized workflows Comprehensive coverage Non-intrusive methods Scheduled scans
Smart caching False positive reduction Ethical guidelines Custom alerting

๐Ÿ› ๏ธ Installation

๐Ÿ“‹ System Requirements

Requirement Minimum Recommended
OS Kali Linux Kali Linux Latest
CPU 2+ Cores 4+ Cores
RAM 4GB+ 8GB+
Storage 10GB+ 20GB+

โš ๏ธ Warning: Tested with 1GB RAM + 1 Core CPU resulted in system crashes. Ensure minimum requirements.

๐Ÿš€ Quick Install

# Install dependencies
apt install zsh git -y

# Clone the repository
cd ~
git clone https://github.com/vikrantbatra05/HuntTheBug

# Navigate and setup
cd ~/HuntTheBug
chmod +x *.zsh

# Run installation script
./install.zsh

โš™๏ธ Configuration

Advanced Subdomain Tools Setup

Amass Configuration:

nano ~/HuntTheBug/config/amass-config.ini

๐Ÿ“– Detailed Guide

SubFinder Configuration:

nano ~/HuntTheBug/config/subfinder-config.yaml

๐Ÿ“– Setup Tutorial

Telegram Bot Setup:

nano ~/HuntTheBug/conf.zsh

Resources:

๐ŸŽฎ Usage Guide

Choose Your Mission

Scope Target Purpose
Medium *.target.com Comprehensive recon
Small app.target.com Focused analysis
Organization company_name Asset discovery
403 Bypass https://target.com Access testing

Launch Commands

Medium Scope Programs:

./recon.zsh target.com

Small Scope Programs:

./dom_hunt.zsh app.target.com
./dom_hunt.zsh target.com

Organization Intelligence:

./org_hunt.zsh organization_name

403 Bypass Testing:

./403_hunt.zsh https://target.com

๐Ÿ”„ Workflow Breakdown

Medium Scope Reconnaissance (recon.zsh)

Phase Tools Purpose Output
1. Subdomain Discovery Amass, SubFinder, SubLis3R, Crobat, AssetFinder, FindDomain, GitHub, Subscraper Comprehensive enumeration Raw subdomain list
2. Live Verification HTTPX, Httprobe Active subdomain identification Live domains only
3. Status Analysis Hakcheckurl 200/403 filtering Responsive subdomains
4. Takeover Detection SubJack, Nuclei Vulnerable subdomain ID Takeover candidates
5. URL Discovery GAU, WaybackURLs Historical endpoint mapping URL database
6. Live URL Testing FFUF Active endpoint verification Live URLs
7. Parameter Mining ParamSpider Attack surface expansion Parameterized URLs
8. JavaScript Analysis SecretFinder, JSFinder Sensitive data extraction Secrets & endpoints
9. Directory Fuzzing Dirsearch Hidden endpoint discovery Directory structure
10. Port Scanning Naabu Open port identification Port inventory
11. Vulnerability Scanning Nuclei Known vulnerability detection Vulnerability report

Small Scope Reconnaissance (dom_hunt.zsh)

Phase Tools Purpose
URL Discovery GAU, WaybackURLs Historical endpoint collection
Live Testing FFUF Active endpoint verification
Pattern Analysis GF Tool Security pattern matching
Parameter Extraction ParamSpider Parameter discovery
JavaScript Mining JSFinder, jsvar.sh Endpoint and variable extraction
Secret Detection SecretFinder Sensitive data discovery
Directory Fuzzing Dirsearch Hidden directory discovery
Vulnerability Scanning Nuclei Known vulnerability detection

Organization Intelligence (org_hunt.zsh)

Phase Tools Purpose
Domain Discovery Knockknock Reverse WHOIS lookup
Live Verification HTTPX Active domain confirmation
IP Intelligence IPinfo Infrastructure analysis

๐Ÿ›ก๏ธ Security Tools Integration

Core Reconnaissance Tools

Tool Purpose Repository
Amass Advanced subdomain enumeration OWASP/Amass
SubFinder Passive subdomain discovery projectdiscovery/subfinder
Nuclei Vulnerability scanning projectdiscovery/nuclei
HTTPX HTTP probing projectdiscovery/httpx
Naabu Port scanning projectdiscovery/naabu

Specialized Tools

Tool Purpose Repository
SubJack Subdomain takeover haccer/subjack
GAU URL gathering lc/gau
FFUF Web fuzzing ffuf/ffuf
Dirsearch Directory brute force maurosoria/dirsearch
SecretFinder Secret detection in JS m4ll0k/SecretFinder

403 Bypass Tools

Tool Repository
byp4xx lobuhi/byp4xx
403bypasser yunemse48/403bypasser
bypass-403 iamj0ker/bypass-403

๐Ÿ“ Project Structure

HuntTheBug/
โ”œโ”€โ”€ config/                 # Configuration files
โ”‚   โ”œโ”€โ”€ amass-config.ini   # Amass settings
โ”‚   โ””โ”€โ”€ subfinder-config.yaml  # SubFinder settings
โ”œโ”€โ”€ wordlist/              # Custom wordlists
โ”‚   โ”œโ”€โ”€ raft-*.txt        # Raft wordlists
โ”‚   โ”œโ”€โ”€ all.txt           # Comprehensive wordlist
โ”‚   โ””โ”€โ”€ dns-resolvers.txt # DNS resolvers
โ”œโ”€โ”€ *.zsh                 # Main reconnaissance scripts
โ”œโ”€โ”€ conf.zsh             # Global configuration
โ”œโ”€โ”€ install.zsh          # Installation script
โ””โ”€โ”€ LICENSE             # GPL v3 License

๐Ÿค Contributing

We welcome contributions! Here's how you can help:

  1. Report Issues: Found a bug? Open an issue
  2. Feature Requests: Have an idea? Suggest a feature
  3. Pull Requests: Want to contribute code? Submit a PR

Development Guidelines

  • Follow existing code style
  • Test your changes thoroughly
  • Update documentation as needed
  • Ensure compatibility with Kali Linux

๐Ÿ“œ License

This project is licensed under the GNU General Public License v3.0 - see the LICENSE file for details.

๐Ÿ™ Acknowledgments

Special thanks to all the open-source tools that make HuntTheBug possible:

Tool Authors

  • ProjectDiscovery - For amazing tools like Nuclei, SubFinder, HTTPX, Naabu
  • TomNomNom - For incredible reconnaissance tools
  • OWASP - For the Amass project
  • All other tool authors - Your contributions are invaluable!

Community

  • The bug bounty community for feedback and suggestions
  • Security researchers who test and improve these tools
  • Everyone who contributes to open-source security

๐Ÿ“ž Support & Contact

โšก Quick Start

# Clone and install
git clone https://github.com/vikrantbatra05/HuntTheBug
cd ~/HuntTheBug
chmod +x *.zsh
./install.zsh

# Configure
nano conf.zsh

# Start hunting!
./recon.zsh target.com

** Happy Hunting! May you find many bugs! ๐Ÿ”ฅ**

Built with โค๏ธ for the Bug Bounty Community

About

Advanced reconnaissance framework for bug bounty hunters - Automate subdomain enumeration, vulnerability scanning, and security reconnaissance with 30+ integrated tools.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages