Beginner BUG BOUNTY Tools part-3




Here is our third part. I’ve got good response for bug bounty tools for part 1&2 . So, I’ve managed to write this third blog To find a bug in a website we should know how the website is build and how the technology is build .To resolve this i have some automated tools and ill drop their link below


wappalyzer — Identify technology on websites.

webanalyze — Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning.

python-builtwith — BuiltWith API client

whatweb — Next generation web scanner

retire.js — scanner detecting the use of JavaScript libraries with known vulnerabilities

httpx — httpx is a fast and multi-purpose HTTP toolkit allows to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.

fingerprintx — fingerprintx is a standalone utility for service discovery on open ports that works well with other popular bug bounty command line tools.

CONTENT DISCOVERY


content discovery is important in bug bounty because it shows hidden directory and so on.even it is vulnerable to exploit our databases


gobuster — Directory/File, DNS and VHost busting tool written in Go

recursebuster — rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments

feroxbuster — A fast, simple, recursive content discovery tool written in Rust.

dirsearch — Web path scanner

dirsearch — A Go implementation of dirsearch.

filebuster — An extremely fast and flexible web fuzzer

dirstalk — Modern alternative to dirbuster/dirb

dirbuster-ng — dirbuster-ng is C CLI implementation of the Java dirbuster tool

gospider — Gospider — Fast web spider written in Go

hakrawler — Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application



crawley — fast, feature-rich unix-way web scraper/crawler written in Golang.

Comments

Popular posts from this blog

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

PlayItSafe google cyber security professional course 2 (COURSERA)

BITFLIPING

AUTOMATED SCRIPT FOR FINDING XSS

BEGINNER BUG BOUNTY TOOLS PART-1

The article explores the technique of remote server control through reverse shells employed by hackers, emphasizing their ability to gain unauthorized access and control over servers.

Things should do after sublister(sublist3r)

BEGINNER BUG BOUNTY TOOLS PART 2

how hackers do a phishing page in 8 lines of code using html