Skip to content
YogSec edited this page Mar 2, 2025 · 2 revisions

HACKING BOT | Designed by YogSec 🚀

Overview

HACKING BOT is an advanced automated bug bounty tool designed to streamline and accelerate security testing processes. It automates reconnaissance, vulnerability scanning, exploitation, and post-exploitation tasks by executing multiple cybersecurity tools in parallel. HACKING BOT allows security researchers to customize their toolset and automate extensive security assessments with a single command.

Problem Statement

The Challenge

Conducting a comprehensive security assessment or bug bounty hunting process manually is time-consuming, complex, and error-prone. Security researchers often face the following issues:

  • Inefficiency: Running multiple security tools manually for each stage, such as reconnaissance, scanning, and exploitation, slows down the process.
  • Tool Dependencies: Different tools require separate installations and configurations, leading to compatibility issues.
  • Human Errors: Skipping steps or misconfigurations can lead to overlooking vulnerabilities.
  • Parallel Execution: Running tasks sequentially limits productivity and increases time consumption.
  • Tool Unavailability: Some tools may be missing or outdated, causing disruption during an assessment.

The Need

Security professionals and bug bounty hunters require a solution that:

  • Automates and orchestrates security tools efficiently.
  • Detects and skips missing tools automatically.
  • Supports parallel execution to reduce assessment time.
  • Provides a customizable and extensible framework for integrating various tools.

Solution

HACKING BOT as the Answer

HACKING BOT addresses the above challenges by automating the bug bounty process and integrating multiple security tools into a single workflow. It is designed to:

  • Automate the execution of reconnaissance, scanning, exploitation, and post-exploitation tools.
  • Execute security tools concurrently for faster assessments.
  • Provide a customizable tools-list.txt for adding or modifying security tools.
  • Detect and skip missing tools without terminating the process.
  • Offer easy-to-use command-line options for different testing needs.

🎯 Features

  • Automated Bug Bounty Process: Scan, exploit, and gather information with a single command.
  • Concurrent Execution: Runs multiple tools in parallel for efficiency.
  • Customizable Tools List: Edit tools-list.txt or provide a custom tools file.
  • Automatic Tool Detection: Skips missing tools instead of interrupting the scan.
  • Extensive Tool Support: Integrates popular tools like Nmap, Nikto, SQLMap, Subfinder, Amass, and more.
  • Help & Version Options: Access usage details and version information quickly.

📂 Files Description

bug_bounty.py (Main Script)

  • Runs bug bounty tools based on the tools-list.txt.
  • Accepts domain input and allows custom tools file.
  • Validates tools and skips any that are missing.
  • Executes commands concurrently for faster testing.

tools-list.txt (Default Tools Configuration)

  • Lists security tools and their corresponding commands.
  • Easily modifiable to suit individual requirements.

install_tools.sh (Installation Script)

  • Installs all essential tools via package managers (apt, pip, go).
  • Ensures dependencies are properly configured.

🛠 Installation

Step 1: Clone the Repository

git clone https://github.com/YogSec/HACKING-BOT.git
cd HACKING-BOT

Step 2: Install Dependencies

pip install termcolor
chmod +x install_tools.sh
./install_tools.sh

Step 3: Run the Tool

python main.py -d example.com

⚙️ Usage

Basic Usage

python main.py -d <domain>

Example:

python main.py -d google.com

Advanced Options

Option Description
-h Show help menu
-v Show version info
-d Specify target domain
-c Use custom tools list file

☕ Support Us

If you appreciate our work, consider buying us a coffee: https://buymeacoffee.com/yogsec

🚀 Contribution & Support

Submit pull requests or report issues to help improve HACKING BOT!

⚠️ Disclaimer

HACKING BOT is intended for legal penetration testing and educational purposes only. The developers are not responsible for misuse.

💻 Developed by YogSec | Stay Secure! 🚀

# HACKING BOT | Designed by YogSec 🚀

Overview

HACKING BOT is an advanced automated bug bounty tool designed to streamline and accelerate security testing processes. It automates reconnaissance, vulnerability scanning, exploitation, and post-exploitation tasks by executing multiple cybersecurity tools in parallel. HACKING BOT allows security researchers to customize their toolset and automate extensive security assessments with a single command.

Problem Statement

The Challenge

Conducting a comprehensive security assessment or bug bounty hunting process manually is time-consuming, complex, and error-prone. Security researchers often face the following issues:

  • Inefficiency: Running multiple security tools manually for each stage, such as reconnaissance, scanning, and exploitation, slows down the process.
  • Tool Dependencies: Different tools require separate installations and configurations, leading to compatibility issues.
  • Human Errors: Skipping steps or misconfigurations can lead to overlooking vulnerabilities.
  • Parallel Execution: Running tasks sequentially limits productivity and increases time consumption.
  • Tool Unavailability: Some tools may be missing or outdated, causing disruption during an assessment.

The Need

Security professionals and bug bounty hunters require a solution that:

  • Automates and orchestrates security tools efficiently.
  • Detects and skips missing tools automatically.
  • Supports parallel execution to reduce assessment time.
  • Provides a customizable and extensible framework for integrating various tools.

Solution

HACKING BOT as the Answer

HACKING BOT addresses the above challenges by automating the bug bounty process and integrating multiple security tools into a single workflow. It is designed to:

  • Automate the execution of reconnaissance, scanning, exploitation, and post-exploitation tools.
  • Execute security tools concurrently for faster assessments.
  • Provide a customizable tools-list.txt for adding or modifying security tools.
  • Detect and skip missing tools without terminating the process.
  • Offer easy-to-use command-line options for different testing needs.

🎯 Features

  • Automated Bug Bounty Process: Scan, exploit, and gather information with a single command.
  • Concurrent Execution: Runs multiple tools in parallel for efficiency.
  • Customizable Tools List: Edit tools-list.txt or provide a custom tools file.
  • Automatic Tool Detection: Skips missing tools instead of interrupting the scan.
  • Extensive Tool Support: Integrates popular tools like Nmap, Nikto, SQLMap, Subfinder, Amass, and more.
  • Help & Version Options: Access usage details and version information quickly.

📂 Files Description

bug_bounty.py (Main Script)

  • Runs bug bounty tools based on the tools-list.txt.
  • Accepts domain input and allows custom tools file.
  • Validates tools and skips any that are missing.
  • Executes commands concurrently for faster testing.

tools-list.txt (Default Tools Configuration)

  • Lists security tools and their corresponding commands.
  • Easily modifiable to suit individual requirements.

install_tools.sh (Installation Script)

  • Installs all essential tools via package managers (apt, pip, go).
  • Ensures dependencies are properly configured.

🛠 Installation

Step 1: Clone the Repository

git clone https://github.com/YogSec/HACKING-BOT.git
cd HACKING-BOT

Step 2: Install Dependencies

pip install termcolor
chmod +x install_tools.sh
./install_tools.sh

Step 3: Run the Tool

python main.py -d example.com

⚙️ Usage

Basic Usage

python main.py -d <domain>

Example:

python main.py -d google.com

Advanced Options

Option Description
-h Show help menu
-v Show version info
-d Specify target domain
-c Use custom tools list file

Example with a custom tools file:

python main.py -d example.com -c advanced-tools.txt

🔍 Capabilities

  • Reconnaissance: Subdomain enumeration, live hosts, and domain data gathering.
  • Port Scanning: Open port detection and service enumeration.
  • Web Scanning: Application vulnerability scanning.
  • Directory Enumeration: Discovering hidden directories and files.
  • Vulnerability Analysis: SQLi, XSS detection, and other exploit checks.
  • Exploitation & Post-Exploitation: Attacks and information gathering.

📌 Sample Tools List (tools-list.txt)

# Reconnaissance
subfinder -d (domain here) -o subdomains.txt
amass enum -d (domain here) -o amass_output.txt
cat subdomains.txt | httprobe > live_hosts.txt

# Port Scanning
nmap -p- -T4 -A -v (domain here) -oN nmap_scan.txt

Modify this file to integrate additional tools.

🌟 Connect with Us

Platform Link
Website https://yogsec.github.io/yogsec/
Linktree https://linktr.ee/yogsec
GitHub https://github.com/yogsec
LinkedIn (Company) https://www.linkedin.com/company/yogsec/
Instagram https://www.instagram.com/yogsec.io/
Twitter (X) https://x.com/yogsec
Personal LinkedIn https://www.linkedin.com/in/cybersecurity-pentester/
Email abhinavsingwal@gmail.com

☕ Support Us

If you appreciate our work, consider buying us a coffee: https://buymeacoffee.com/yogsec

🚀 Contribution & Support

Submit pull requests or report issues to help improve HACKING BOT!

⚠️ Disclaimer

HACKING BOT is intended for legal penetration testing and educational purposes only. The developers are not responsible for misuse.

💻 Developed by YogSec | Stay Secure! 🚀