├── README.md └── Tests └── tests.py /README.md: -------------------------------------------------------------------------------- 1 | 2 | # Awesome Bughunting Oneliners 3 | 4 | ### A list of bughunting one liners 5 | 6 | 7 | 8 | ## Content Discovery/Recon : 9 | 10 | 11 | 12 | ### 1 . Using dns.bufferover.run 13 | 14 | ``` 15 | curl -s https://dns.bufferover.run/dns?q=.example.com |jq -r .FDNS_A[]|cut -d',' -f2|sort -u 16 | ``` 17 | 18 | ### 2 . Using Crt.sh 19 | 20 | ``` 21 | curl -s https://dns.bufferover.run/dns?q=.hackerone.com |jq -r .FDNS_A[]|cut -d',' -f2|sort -u 22 | ``` 23 | 24 | 25 | ### 3 . Using Certspotter 26 | 27 | ``` 28 | curl https://certspotter.com/api/v0/certs\?domain\=example.com | jq '.[].dns_names[]' | sed 's/\"//g' | sed 's/\*\.//g' | uniq 29 | ``` 30 | 31 | 32 | ### 4 . Using Certspotter (With port scanning) 33 | 34 | ``` 35 | curl https://certspotter.com/api/v0/certs\?domain\=example.com | jq '.[].dns_names[]' | sed 's/\"//g' | sed 's/\*\.//g' | uniq | dig +short -f - | uniq | nmap -T5 -Pn -sS -i - -p 80,443,21,22,8080,8081,8443 --open -n -oG - 36 | ``` 37 | 38 | ### 5 . Sublist3r One Liner 39 | 40 | ``` 41 | . <(cat domains | xargs -n1 -i{} python sublist3r.py -d {} -o {}.txt) 42 | ``` 43 | 44 | ### 6 . Grab Titles of webpages 45 | 46 | ``` 47 | for i in $(cat Webservers.txt ); do echo "$i | $(curl --connect-timeout 0.5 $i -so - | grep -iPo '(?<=)(.*)(?=)')"; done 48 | ``` 49 | 50 | ### 7 . Enumerate hosts from SSL Certificate 51 | 52 | ``` 53 | echo | openssl s_client -connect https://targetdomain.com:443 | openssl x509 -noout -text | grep DNS 54 | ``` 55 | 56 | ### 8 . Google DNS via HTTPS 57 | 58 | ``` 59 | echo "targetdomain.com" | xargs -I domain proxychains curl -s "https://dns.google.com/resolve?name=domain&type=A" | jq . 60 | ``` 61 | 62 | ### 9 . CommonCrawl to find endpoints on a site 63 | 64 | ``` 65 | echo "targetdomain.com" | xargs -I domain curl -s "http://index.commoncrawl.org/CC-MAIN-2018-22-index?url=*.domain&output=json" | jq -r .url | sort -u 66 | ``` 67 | 68 | ### 10 . Using WebArchive 69 | 70 | ``` 71 | curl -s "http://web.archive.org/cdx/search/cdx?url=*.hackerone.com/*&output=text&fl=original&collapse=urlkey" |sort| sed -e 's_https*://__' -e "s/\/.*//" -e 's/:.*//' -e 's/^www\.//' | uniq 72 | ``` 73 | 74 | ### 11 . Using ThreatCrowd 75 | 76 | ``` 77 | curl https://www.threatcrowd.org/searchApi/v2/domain/report/?domain=hackerone.com |jq .subdomains |grep -o '\w.*hackerone.com' 78 | ``` 79 | 80 | ### 12 . Using Hackertarget 81 | 82 | ``` 83 | curl https://api.hackertarget.com/hostsearch/?q=hackerone.com | grep -o '\w.*hackerone.com' 84 | ``` 85 | 86 | ### 13 . Bruteforce Subdomains 87 | 88 | ``` 89 | while read sub; do if host "$sub.example.com" &> /dev/null; then echo "$sub.example.com"; fi; done < wordslist.txt 90 | ``` 91 | 92 | ### 14 . Assetfinder 93 | 94 | ``` 95 | assetfinder http://hackerone.com > recon.txt; for d in $(