Simple Script for Finding Cross
Site Scripting (XSS) vulns
#!/bin/bash
subfinder -d $1 -o domains_subfinder_$1
amass enum --passive -d $1 -o domains_$1
cat domains_subfinder_$1 | tee -a domain_$1
cat domains_$1 | filter-resolved | tee -a domains_$1.txt
cat domains_$1.txt | httprobe -p http:81 -p http:8080 -p https:8443 | waybackurls | kxss | tee xss.txt
https://github.com/projectdiscovery/subfinder
https://github.com/OWASP/Amass
https://github.com/tomnomnom/hacks/tree/master/filter-resolved
https://github.com/tomnomnom/httprobe
https://github.com/tomnomnom/waybackurls
https://github.com/tomnomnom/hacks/tree/master/kxss
#bugbounty #bugbountytips #xss #subfinder #httprobe #waybackurls #kxss #amass
#bugbounty #bugbountytips #xss #subfinder #httprobe #waybackurls #kxss #AMASS
SQL Injection Hunting
subfinder -d site.com -all -silent | waybackurls | sort -u | gf sqli > gf_sqli.txt; sqlmap -m gf_sqli.txt --batch --risk 3 --random-agent | tee -a sqli.txt
https://github.com/projectdiscovery/subfinder
https://github.com/1ndianl33t/Gf-Patterns
https://github.com/tomnomnom/waybackurls
#bugbounty #bugbountytips #subfinder #sqlinjection #waybackurls #sqli
#bugbounty #bugbountytips #subfinder #sqlinjection #waybackurls #sqli