返回顶部
b

bounty-hunter-pro

Autonomous bug bounty hunting with scope safety. Scans targets for subdomains, secrets, vulnerabilities. Uses Certificate Transparency logs, JS analysis, entropy-based secret detection. LLM-powered vulnerability analysis. ALWAYS respects authorized targets only.

作者: admin | 来源: ClawHub
源自
ClawHub
版本
V 1.0.0
安全检测
已通过
406
下载量
0
收藏
概述
安装方式
版本历史

bounty-hunter-pro

# Bounty Hunter Pro ## Purpose Autonomous vulnerability scanning for authorized bug bounty programs. ## ⚠️ CRITICAL: Scope Safety **NEVER scan targets outside [AUTHORIZED_TARGETS]** Before any scan: 1. Verify target is in authorized list 2. Log the scope check 3. Only proceed if authorized ## Components ### 1. nightwatch.py — Scanner - Certificate Transparency (crt.sh) for subdomains - JS file analysis for secrets - Multi-threaded (10 workers default) - Outputs to `findings_incremental.json` ### 2. analyze_daemon.py — Analyzer - Watches `findings_incremental.json` - Entropy filtering to reduce false positives - Two-stage LLM analysis: - Fast: qwen2.5-coder:1.5b - Deep: glm-5:cloud - Outputs to `live_analysis.md` ### 3. watchdog.py — Alerter - Monitors for CRITICAL findings - Sends alerts via OpenClaw message bus ## Setup ```bash # Install tools cd ~/workspace/bounty_hunting/tools unzip subfinder.zip unzip httpx.zip unzip nuclei.zip # Configure authorized targets echo "example.com" > ~/workspace/bounty_hunting/authorized_targets.txt echo "*.example.com" >> ~/workspace/bounty_hunting/authorized_targets.txt ``` ## Usage Prompt ``` Run bounty hunt on [TARGET]. Target must be in authorized list. 1. Verify [TARGET] is authorized 2. Run subdomain enumeration 3. Scan each subdomain for: - Exposed secrets in JS - Misconfigurations - Known vulnerabilities 4. Analyze findings with LLM 5. Generate report to ~/workspace/reports/security/[TARGET]/ ``` ## Directory Structure ``` ~/workspace/bounty_hunting/ ├── authorized_targets.txt # ONLY these can be scanned ├── nightwatch.py # Main scanner ├── analyze_daemon.py # LLM analyzer ├── watchdog.py # Alert system ├── findings_incremental.json # Raw findings ├── live_analysis.md # Analyzed results └── tools/ ├── subfinder ├── httpx └── nuclei ``` ## Output Format Reports saved to: `~/workspace/reports/security/[TARGET]/YYYY-MM-DD.md` ```markdown # Security Scan — [TARGET] — [DATE] ## Scope - Authorized: [TARGET] - Subdomains found: X - Endpoints scanned: Y ## 🔴 CRITICAL 1. Finding — Severity — Location — Recommendation ## 🟠 HIGH 1. Finding — Severity — Location — Recommendation ## 🟡 MEDIUM 1. Finding — Severity — Location — Recommendation ## 🟢 INFO 1. Finding — Severity — Location — Recommendation ## Next Steps 1. [Recommended action] ``` ## Safety Guards ```python # ALWAYS check before scanning def is_authorized(target): with open("authorized_targets.txt") as f: authorized = [line.strip() for line in f] return any(target.endswith(auth) or target == auth for auth in authorized) # FAIL SAFE if not is_authorized(target): raise ValueError(f"UNAUTHORIZED: {target} not in authorized_targets.txt") ``` ## Cron Schedule ```bash # Daily scan at 2am (low-traffic time) 0 2 * * * cd ~/workspace/bounty_hunting && python nightwatch.py ``` ## Known Limitations - CPU-only (no CUDA) - Rate limiting may slow scans - Some false positives in entropy detection

标签

skill ai

通过对话安装

该技能支持在以下平台通过对话安装:

OpenClaw WorkBuddy QClaw Kimi Claude

方式一:安装 SkillHub 和技能

帮我安装 SkillHub 和 bounty-hunter-pro-1776234843 技能

方式二:设置 SkillHub 为优先技能安装源

设置 SkillHub 为我的优先技能安装源,然后帮我安装 bounty-hunter-pro-1776234843 技能

通过命令行安装

skillhub install bounty-hunter-pro-1776234843

下载 Zip 包

⬇ 下载 bounty-hunter-pro v1.0.0

文件大小: 2.21 KB | 发布时间: 2026-4-15 23:58

v1.0.0 最新 2026-4-15 23:58
- Initial release of Bounty Hunter Pro, an autonomous bug bounty hunting tool with strict scope safety.
- Scans authorized targets for subdomains, exposed secrets in JavaScript, misconfigurations, and known vulnerabilities.
- Uses Certificate Transparency logs, entropy-based secret detection, and LLM-powered two-stage vulnerability analysis for results filtering and prioritization.
- Includes automated alerting for critical findings and structured report generation.
- Enforces authorization checks before scanning any target to ensure compliance with program scope.

Archiver·手机版·闲社网·闲社论坛·羊毛社区· 多链控股集团有限公司 · 苏ICP备2025199260号-1

Powered by Discuz! X5.0   © 2024-2025 闲社网·线报更新论坛·羊毛分享社区·http://xianshe.com

p2p_official_large
返回顶部