This script automates reconnaissance for bug bounty hunting. It performs subdomain enumeration, URL gathering, and basic vulnerability scanning for a specified domain. Built with several popular CLI tools, this script simplifies the initial stages of web application security testing.
- Subdomain Enumeration: Gathers subdomains using various tools and APIs.
- URL Gathering: Extracts interesting URLs from the target domain.
- Filtering: Identifies responsive subdomains and categorizes them based on HTTP response codes.
- Title Extraction: Retrieves page titles from active URLs for better insight.
- Screenshots: Generates screenshots of live subdomains with Aquatone (if configured).
Before running the script, ensure you have the following tools installed:
You can install the tools using your package manager or from the respective repositories.
git clone https://github.com/tom-who/BPP-tools.git
cd BPP-tools
chmod +x recon; chmod +x ns
./recon example.com
./ns example.com (no subdomain gathering)
The script generates the following outputs:
Alive Subdomains: Located in ./<domain>/alive.txt
Filtered domains to their status codes respectively: Located in ./<domain>/403.txt
Gathered URLs: Located in ./<domain>/urls/main.txt
Aquatone Screenshots: Located in ./<domain>/aquatone
Feel free to modify the script to add or remove features based on your needs. You can incorporate additional tools or improve existing functions. Contributing
Contributions are welcome! If you have suggestions for improvements or new features, please open an issue or submit a pull request.
Thanks to the developers of the tools integrated into this script. Inspired by various bug bounty methodologies and tools.