Here's a sample README.md content that outlines all the necessary steps for setting up and running the script:
# Automated Bug Bounty Script
This repository contains a Python-based script for automating bug bounty tasks, focusing on subdomain enumeration, alive subdomain checks, and vulnerability scanning using popular tools such as **Subfinder**, **httpx**, and **WPScan**.
## Requirements
Before running the script, make sure to install the following tools and dependencies:
### 1. **Python** (>= 3.6)
Ensure Python is installed on your system. You can verify by running:
```bash
python --version
If Python is not installed, download and install it from here.
The script uses several Python libraries for interacting with external tools and performing HTTP requests. Install the dependencies using pip
:
pip install -r requirements.txt
Make sure to have requirements.txt
file in the repository with the following content:
requests
subprocess
-
Subfinder is a tool for discovering subdomains. Install it by following the instructions from its GitHub page: Subfinder Installation.
Example:
wget https://github.com/projectdiscovery/subfinder/releases/download/v2.4.3/subfinder-linux-amd64.tar.gz tar -xvzf subfinder-linux-amd64.tar.gz mv subfinder /usr/local/bin/
-
httpx is used to find alive subdomains and identify services and technologies. Install it by following the instructions from its GitHub page: httpx Installation.
Example:
wget https://github.com/projectdiscovery/httpx/releases/download/v1.0.0/httpx-linux-amd64-v1.0.0.tar.gz tar -xvzf httpx-linux-amd64-v1.0.0.tar.gz mv httpx /usr/local/bin/
-
WPScan is used for vulnerability scanning on WordPress-based sites. Install it by following the instructions from its GitHub page: WPScan Installation.
Example:
sudo apt-get install wpscan
-
Get WPScan API Token (Required for WPScan): You can obtain an API token by signing up on the WPScan website: WPScan API.
Make sure you have Git installed for version control and to clone this repository:
git --version
If not installed, you can install it from here.
For WPScan to function properly, you need to set your API token. Open a terminal and run:
echo 'export WPSCAN_API_TOKEN="your_api_token"' >> ~/.bashrc # for bash users
source ~/.bashrc
Or, for zsh users:
echo 'export WPSCAN_API_TOKEN="your_api_token"' >> ~/.zshrc
source ~/.zshrc
Make sure to replace "your_api_token"
with your actual WPScan API token.
-
Clone the repository:
git clone https://github.com/Karanmaurya003/BugBounty.git cd BugBounty
-
Run the script:
The script takes a file with a list of domains to scan. Make sure the file is in the same directory or provide the full path.
python3 bug_bounty_automation.py --input domains.txt
Replace
domains.txt
with the filename containing the list of domains.
- Subdomain Enumeration using Subfinder
- Alive Subdomain Checking and service/technology detection using httpx
- Vulnerability Scanning using WPScan for WordPress-based subdomains
The script will output:
- Subdomains based on the technologies detected (e.g., WordPress, PHP, SQL, etc.)
- Vulnerabilities for WordPress sites (if applicable)
- All results will be saved in separate files based on technology (e.g.,
wordpress_subdomains.txt
)
- Ensure you have the necessary permissions to run these tools.
- Some tools may need elevated privileges (e.g., WPScan).
This project is licensed under the MIT License - see the LICENSE file for details.
Feel free to open an issue if you encounter any problems or have questions about how to use the script!
---