Loading...
Loading...
$$$$$$$\ $$\ $$\ $$\
$$ __$$\ $$ | $$ | $$ |
$$ | $$ | $$ | $$ |$$\ $$\ $$$$$$$\ $$$$$$\ $$$$$$\ $$$$$$\ $$$$$$$\
$$$$$$$\ |$$$$$$\ $$$$$$$$ |$$ | $$ |$$ __$$\\_$$ _| $$ __$$\ $$ __$$\ $$ _____|
$$ __$$\ \______|$$ __$$ |$$ | $$ |$$ | $$ | $$ | $$$$$$$$ |$$ | \__|\$$$$$$\
$$ | $$ | $$ | $$ |$$ | $$ |$$ | $$ | $$ |$$\ $$ ____|$$ | \____$$\
$$$$$$$ | $$ | $$ |\$$$$$$ |$$ | $$ | \$$$$ |\$$$$$$$\ $$ | $$$$$$$ |
\_______/ \__| \__| \______/ \__| \__| \____/ \_______|\__| \_______/
0xBormaa - 2024
B-Hunters is a bug bounty framework built on the Karton framework. It leverages Docker to execute multiple tools and tasks across different machines, providing a powerful, modular, and scalable approach to reconnaissance and vulnerability scanning.
B-Hunters automates the entire recon process by utilizing multiprocessing and microservices to ensure efficiency, flexibility, and ease of integration.
Results can be integrated with discord webhooks to be sent once tool running finish or using the command line
B-Hunters currently includes the following tools:
Subfinder A fast passive subdomain enumeration tool that uses a wide range of sources.
Vita A tool for vulnerability and information gathering during reconnaissance.
Findomain A subdomain enumeration tool that integrates API keys for faster and more extensive discovery.
Sublist3r A tool designed to enumerate subdomains using multiple search engines.
Assetfinder Quickly finds domains and subdomains related to a target using various sources.
Chaos Fetches subdomains from ProjectDiscovery's Chaos dataset.
Gospider A fast web spider written in Go, designed for gathering URLs and data.
Dirsearch A simple command-line tool designed to brute force directories and files in webservers.
GetJS Scrapes JavaScript files from web pages for further analysis.
Gowitness A tool for taking screenshots of websites, collecting headers, and identifying technologies.
Katana A fast and lightweight web crawler built for information gathering.
ParamSpider Finds parameters from web pages for use in parameter-based vulnerability testing.
Waymore Fetches URLs from various online services, including Wayback Machine and others.
Waybackurls Retrieves URLs for a domain from the Wayback Machine and similar services.
GAU (GetAllURLs) Fetches known URLs from AlienVault's Open Threat Exchange, Wayback Machine, and more.
Wappalyzer-CLI Identifies technologies used on websites via the command line.
DalFox A fast and powerful open-source tool for detecting and exploiting XSS vulnerabilities.
SSTImap Detects and maps Server-Side Template Injection (SSTI) vulnerabilities.
SQLMap An automated SQL injection and database takeover tool.
Nuclei A fast tool for vulnerability scanning based on templates.
SecretFinder Finds sensitive data in JavaScript files.
NipeJS A JavaScript analysis tool for identifying vulnerabilities.
B-Hunters uses a microservices architecture to provide these features:
git clone https://github.com/B-Hunters/B-Hunters.git
cd B-Hunters
pip install .
pip install b-hunters
You have first to update b-hunters.example.ini file with your IP and other configs if you want to edit. Remember when you update settings when running tools use the same config file Config file by default should be in /etc/b-hunters/b-hunters.ini" if you want insomething else use -c flag when calling command
The tool provides two main commands: scan and report. These commands allow you to perform scans on domains and generate reports. Below is a detailed explanation of each command and its options.
| Option | Description | Default |
|--------------------|--------------------------------------------------|---------------------------------------|
| --config, -c | Optional path to the configuration file. | /etc/b-hunters/b-hunters.ini |
Run a scan operation on a specified domain.
| Option | Description | Required |
|------------------------|--------------------------------------------------|--------------|
| --domain, -d | Target domain for scanning. | Yes |
| --scantype, -t | Type of scan: single or multi. | Yes |
| --description | Optional description for the scan. | No |
|
b-hunters [-c <config_path>] scan --domain <target_domain> --scantype <single or multi> [--description <description>]
For example to scan all subdomains in example.com
b-hunters scan -d example.com -t multi
Generate a scan report for a specified domain.
| Option | Description | Required |
|------------------------|--------------------------------------------------|--------------|
| --domain, -d | Specify the domain for the report. | Yes |
| --output, -o | Optional path to save the report output. | No |
|
b-hunters report --domain <target_domain> [--output <output_path>]
Example to get report of domain example.com
b-hunters report -d example.com -o /tmp/example.com
Here are the planned features and improvements for the tool:
Create Web Interface Develop a user-friendly web interface to manage scans and reports.
Integrate Discord Bot Integrate a Discord bot to scan or get full report.
Add More Tools Continuously expand the toolset by adding more scanning and vulnerability scanning tools.