Pentest Notes
Ctrlk
  • ๐Ÿ /home/x3m1Sec/.pt-notes
  • ๐Ÿ“Pentest Notes
    • ๐Ÿ”Information Gathering
    • ๐Ÿ“œProtocols and Services
    • ๐Ÿ•ธ๏ธWeb Applications
    • ๐ŸชŸActive Directory Pentesting
    • ๐ŸงLinux Privilege Escalation
    • ๐ŸชŸWindows Privilege Escalation
    • ๐Ÿ›Bug Bounty Hunting
      • Bug Bounty Tools
    • ๐Ÿ‘พUtilities, Scripts and Payloads
  • ๐ŸŽฎCTFs
  • ๐ŸŽ“Road to certification
  • ๐Ÿ“šResources
Powered by GitBook
On this page
  • Before you move on
  • Auto Tools
  • Subdomain & VHost Discovery
  • Information Gathering
  • Scanning for Vulnerabilities
  1. ๐Ÿ“Pentest Notes
  2. ๐Ÿ›Bug Bounty Hunting

Bug Bounty Tools

Before you move on

Before moving on, refer to the information gathering page to try to use leverage Google Dorks, OSINT and information gathering techniques against your target.

Remember to use rate-limiting and user-headers according to the specific program's guideline.


Auto Tools

Notice - This page is Incomplete - more tools will be added

Subdomain & VHost Discovery

https://github.com/edoardottt/scilla

https://pentest-tools.com/information-gathering/find-subdomains-of-domain

https://pentest-tools.com/information-gathering/find-virtual-hosts


Information Gathering

https://github.com/edoardottt/cariddi

https://github.com/j3ssie/metabigor

https://github.com/BullsEye0/dorks-eye

https://pentest-tools.com/information-gathering/google-hacking

Scanning for Vulnerabilities

https://github.com/six2dez/reconftw

https://pentest-tools.com/website-vulnerability-scanning/website-scanner

https://pentest-tools.com/cms-vulnerability-scanning/wordpress-scanner-online-wpscan

PreviousBug Bounty HuntingNextUtilities, Scripts and Payloads

Last updated 6 months ago