Various tools I've made for bug bounty hunting
/js
-
beautify-js.py:
- Why: Mass download of JS files and beautify for easier reading/grepping
- Uses: Recon, Source code
- Syntax:
python3 beautify-js.py --infile [file with a ton of URLS in it] --outdir [where to save the beautified results]
/ssrf
-
sentry-scraping-ssrf.py:
- Why: Sentry scraping could result in unwanted exposure of debug info
- Uses: SSRF
- Syntax:
python3 sentry-scraping-ssrf.py --infile [file with a ton of URLS in it] --payload [a malicious callback link (burp collab?) --threads [x]
/generators
-
wayback-words.py:
- Why: Generate a wordlist based on things from the past
- Uses: Recon
- Syntax:
python3 wayback-words.py --infile [file with a ton of URLs in it] --outfile [where to save the generated list] --exclusions [extensions to exclude (ie: .png .jpg)]
/fuzzing
-
param-replace.py:
- Why: Mass find/replace of all parameters in a URL with a given payload.
- Uses: Open Redirect, SSRF
- Syntax:
python3 param-replace.py --infile [file with ton of URLs in it] --outfile [where to save the results] --payload [a malicious callback link (burp collab>)]
-
param-stuffing.py:
- Why: Stuff given parameters in a URL with a given payload.
- Uses: Open Redirect, SSRF
- Syntax:
python3 param-stuffing.py --infile [file with ton of URLs in it] --outfile [where to save the results] --params [url redirect u r etc] --payload [a malicious callback link (burp collab>)]
-
header-check.py:
- Why: Stuff a payload in URL parameters and see if they are reflected in response headers.
- Uses: Header tampering, XSS
- Syntax:
python3 header-checky.py --infile [file with ton of URLs in it] --outfile [where to save the results] --payload [a malicious callback link (burp collab>)]
-
header-fuzz.py:
- Why: Stuff custom headers into a request to see what happens.
- Uses: Header tampering, Open Redirect, SSRF
- Syntax:
python3 header-fuzz.py --infile [file with ton of URLs in it] --outfile [where to save the results] --headers [User-Agent X-Forwarded-For etc...] --payload [a malicious callback link (burp collab>)]