TODO - sadiga80/BountyHuntNotes GitHub Wiki
- To Do - Bug Bounties *
High-level idea for Blind XSS/HTMLi testing:
Step 1 - Ffuf to find endopints of URL Step 2 - Arjun to find parameters for each endpoint // At this point we have a JSON object for each endpoint with a list of parameters Step 3 - Cycle through and make requests for each endpoint with each parameter (maybe eventually this can test HPP) using webhook/xsshunter/burp-collaborator payload // Also use requests to send the payloads as headers, cookies, etc. Step 4 - Profit!
-
Parameter Discovery - Arjun (Engulf.py) - Done!
-
Automate Platform Identification (Part of Engulf.py?) CLI -wappalyzer -webanalyze -whatweb
Ignite.py
-
Fix "/" issue - Done!
-
Fix duplicate issue - Done!
-
ffuf: unauthenticated and authenticated
-
If ffuf fails (exit code 2), change VPN IP and continue for loop
-
Ffuf using different request methods? - Done!
Vuln Discovery Automation
- Add workflow feature to nuclei wrapper
Nuclei Brutespray - Add firewood.py to cron jobs on Recon Box Burp Bounty xsshunter Sn1per Nikto (on Target Url as part of enum automation) meg
- To Do - Away From Home *
Stand-alone ClearSky tool
Python script to generate Crontab
- Long Term *
Add Favfreak to Fire_Starter.py
Github_brute-dork automation script pulls users from WAPT framework and automatically uploads results
Fix Subdomainizer module (Clear out IPv6 Addresses in subdomains)
Attacks auto-populate based on enumeration information
Cheat sheets for deployments (and Django) before I lose access to the learning platform