-
-
Notifications
You must be signed in to change notification settings - Fork 3
Home
HACKING BOT is an advanced automated bug bounty tool designed to streamline and accelerate security testing processes. It automates reconnaissance, vulnerability scanning, exploitation, and post-exploitation tasks by executing multiple cybersecurity tools in parallel. HACKING BOT allows security researchers to customize their toolset and automate extensive security assessments with a single command.
Conducting a comprehensive security assessment or bug bounty hunting process manually is time-consuming, complex, and error-prone. Security researchers often face the following issues:
- Inefficiency: Running multiple security tools manually for each stage, such as reconnaissance, scanning, and exploitation, slows down the process.
- Tool Dependencies: Different tools require separate installations and configurations, leading to compatibility issues.
- Human Errors: Skipping steps or misconfigurations can lead to overlooking vulnerabilities.
- Parallel Execution: Running tasks sequentially limits productivity and increases time consumption.
- Tool Unavailability: Some tools may be missing or outdated, causing disruption during an assessment.
Security professionals and bug bounty hunters require a solution that:
- Automates and orchestrates security tools efficiently.
- Detects and skips missing tools automatically.
- Supports parallel execution to reduce assessment time.
- Provides a customizable and extensible framework for integrating various tools.
HACKING BOT addresses the above challenges by automating the bug bounty process and integrating multiple security tools into a single workflow. It is designed to:
- Automate the execution of reconnaissance, scanning, exploitation, and post-exploitation tools.
- Execute security tools concurrently for faster assessments.
- Provide a customizable tools-list.txt for adding or modifying security tools.
- Detect and skip missing tools without terminating the process.
- Offer easy-to-use command-line options for different testing needs.
- Automated Bug Bounty Process: Scan, exploit, and gather information with a single command.
- Concurrent Execution: Runs multiple tools in parallel for efficiency.
-
Customizable Tools List: Edit
tools-list.txt
or provide a custom tools file. - Automatic Tool Detection: Skips missing tools instead of interrupting the scan.
- Extensive Tool Support: Integrates popular tools like Nmap, Nikto, SQLMap, Subfinder, Amass, and more.
- Help & Version Options: Access usage details and version information quickly.
- Runs bug bounty tools based on the
tools-list.txt
. - Accepts domain input and allows custom tools file.
- Validates tools and skips any that are missing.
- Executes commands concurrently for faster testing.
- Lists security tools and their corresponding commands.
- Easily modifiable to suit individual requirements.
- Installs all essential tools via package managers (apt, pip, go).
- Ensures dependencies are properly configured.
git clone https://github.com/YogSec/HACKING-BOT.git
cd HACKING-BOT
pip install termcolor
chmod +x install_tools.sh
./install_tools.sh
python main.py -d example.com
python main.py -d <domain>
Example:
python main.py -d google.com
Option | Description |
---|---|
-h | Show help menu |
-v | Show version info |
-d | Specify target domain |
-c | Use custom tools list file |
If you appreciate our work, consider buying us a coffee: https://buymeacoffee.com/yogsec
Submit pull requests or report issues to help improve HACKING BOT!
HACKING BOT is intended for legal penetration testing and educational purposes only. The developers are not responsible for misuse.
# HACKING BOT | Designed by YogSec 🚀HACKING BOT is an advanced automated bug bounty tool designed to streamline and accelerate security testing processes. It automates reconnaissance, vulnerability scanning, exploitation, and post-exploitation tasks by executing multiple cybersecurity tools in parallel. HACKING BOT allows security researchers to customize their toolset and automate extensive security assessments with a single command.
Conducting a comprehensive security assessment or bug bounty hunting process manually is time-consuming, complex, and error-prone. Security researchers often face the following issues:
- Inefficiency: Running multiple security tools manually for each stage, such as reconnaissance, scanning, and exploitation, slows down the process.
- Tool Dependencies: Different tools require separate installations and configurations, leading to compatibility issues.
- Human Errors: Skipping steps or misconfigurations can lead to overlooking vulnerabilities.
- Parallel Execution: Running tasks sequentially limits productivity and increases time consumption.
- Tool Unavailability: Some tools may be missing or outdated, causing disruption during an assessment.
Security professionals and bug bounty hunters require a solution that:
- Automates and orchestrates security tools efficiently.
- Detects and skips missing tools automatically.
- Supports parallel execution to reduce assessment time.
- Provides a customizable and extensible framework for integrating various tools.
HACKING BOT addresses the above challenges by automating the bug bounty process and integrating multiple security tools into a single workflow. It is designed to:
- Automate the execution of reconnaissance, scanning, exploitation, and post-exploitation tools.
- Execute security tools concurrently for faster assessments.
- Provide a customizable tools-list.txt for adding or modifying security tools.
- Detect and skip missing tools without terminating the process.
- Offer easy-to-use command-line options for different testing needs.
- Automated Bug Bounty Process: Scan, exploit, and gather information with a single command.
- Concurrent Execution: Runs multiple tools in parallel for efficiency.
-
Customizable Tools List: Edit
tools-list.txt
or provide a custom tools file. - Automatic Tool Detection: Skips missing tools instead of interrupting the scan.
- Extensive Tool Support: Integrates popular tools like Nmap, Nikto, SQLMap, Subfinder, Amass, and more.
- Help & Version Options: Access usage details and version information quickly.
- Runs bug bounty tools based on the
tools-list.txt
. - Accepts domain input and allows custom tools file.
- Validates tools and skips any that are missing.
- Executes commands concurrently for faster testing.
- Lists security tools and their corresponding commands.
- Easily modifiable to suit individual requirements.
- Installs all essential tools via package managers (apt, pip, go).
- Ensures dependencies are properly configured.
git clone https://github.com/YogSec/HACKING-BOT.git
cd HACKING-BOT
pip install termcolor
chmod +x install_tools.sh
./install_tools.sh
python main.py -d example.com
python main.py -d <domain>
Example:
python main.py -d google.com
Option | Description |
---|---|
-h | Show help menu |
-v | Show version info |
-d | Specify target domain |
-c | Use custom tools list file |
Example with a custom tools file:
python main.py -d example.com -c advanced-tools.txt
- Reconnaissance: Subdomain enumeration, live hosts, and domain data gathering.
- Port Scanning: Open port detection and service enumeration.
- Web Scanning: Application vulnerability scanning.
- Directory Enumeration: Discovering hidden directories and files.
- Vulnerability Analysis: SQLi, XSS detection, and other exploit checks.
- Exploitation & Post-Exploitation: Attacks and information gathering.
# Reconnaissance
subfinder -d (domain here) -o subdomains.txt
amass enum -d (domain here) -o amass_output.txt
cat subdomains.txt | httprobe > live_hosts.txt
# Port Scanning
nmap -p- -T4 -A -v (domain here) -oN nmap_scan.txt
Modify this file to integrate additional tools.
Platform | Link |
---|---|
Website | https://yogsec.github.io/yogsec/ |
Linktree | https://linktr.ee/yogsec |
GitHub | https://github.com/yogsec |
LinkedIn (Company) | https://www.linkedin.com/company/yogsec/ |
https://www.instagram.com/yogsec.io/ | |
Twitter (X) | https://x.com/yogsec |
Personal LinkedIn | https://www.linkedin.com/in/cybersecurity-pentester/ |
abhinavsingwal@gmail.com |
If you appreciate our work, consider buying us a coffee: https://buymeacoffee.com/yogsec
Submit pull requests or report issues to help improve HACKING BOT!
HACKING BOT is intended for legal penetration testing and educational purposes only. The developers are not responsible for misuse.