A collection of customizable scripts designed to automate initial information gathering and asset discovery for beginner bug bounty hunters.
Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull requests are welcome!)
This tool is intended for bug bounty hunters, especially beginners, to streamline and automate the early stages of reconnaissance and asset discovery. It provides scripts that install essential tools, set up anonymity via TOR, and run recon workflows based on proven methodologies from top bug hunters.
The tool is currently under construction and may receive updates; users should ensure they have sudo privileges for some scripts. It is recommended to review and customize scripts to fit specific bug bounty targets and workflows. TOR gateway setup requires nipe and proper configuration. All binaries and wordlists are stored under /opt/ directory, so ensure appropriate permissions.
git clone https://github.com/sam5epi0l/Beginner-Bug-Bounty-Automation
cd Beginner-Bug-Bounty-Automation
Optionally install ohmyzsh: sudo apt install zsh
Run ohmyzsh install script: sh -c "$(curl -fsSL https://raw.githubusercontent.com/ohmyzsh/ohmyzsh/master/tools/install.sh)"
chmod +x tor-gateway.sh
Make the TOR gateway script executable
./tor-gateway.sh
Run the TOR gateway script to set nipe as default gateway
nipe start
Start the nipe TOR gateway service
nipe status
Check the status of the nipe TOR gateway
nipe stop
Stop the nipe TOR gateway service
nipe restart
Restart the nipe TOR gateway service
chmod +x toptomnomnom.sh
Make the script for installing Tom Hudson's tools executable
./toptomnomnom.sh
Install top useful bug bounty tools from Tom Hudson's GitHub repo
chmod +x bug-bounty-essentials.sh
Make the bug bounty essentials installation script executable
./bug-bounty-essentials.sh
Install essential tools required for bug hunting reconnaissance
chmod +x init.sh
Make the recon initiation script executable
./init.sh
Start the reconnaissance process on hosts listed in wildcards.txt