Offensive security harness for bug bounty, pentesting, and red teaming.
Runs recon, maps the app, tests for vulns, validates findings, writes reports.
Huntbot is a force multiplier, not a replacement for expertise. With the current state of frontier LLMs, expect huntbot to do ~80% of the work — recon, mapping, initial testing, report drafting. The remaining 20% is on you: You just need to ask the right logical questions
Vulnerabilities found by using huntbot, reported by @mrecho.
| CVE | Target | Vulnerability | Severity |
|---|---|---|---|
| CVE-2026-33728 | Datadog dd-trace-java |
Unsafe deserialization in RMI instrumentation — remote code execution | Critical (CVSS 9.3) |
| CVE-2026-1035 | Red Hat Keycloak | Refresh token reuse bypass via TOCTOU race condition | Low (CVSS 3.1) |
Most security tools find things. Huntbot understands things.
- Accumulates context — Run 5 knows everything Runs 1-4 discovered. 211KB+ of knowledge per target.
- Knows when to stop — Efficiency tracking (bytes/sec) detects when a stage is exhausted vs productive.
- Tests like a human — Registers accounts, fills forms, clicks through SPAs with a real browser.
- Validates before reporting — 4-gate triage kills false positives so you don't waste program time.
- Writes the report — Submission-ready markdown with title, severity, steps to reproduce, impact.
- You can steer it —
huntbot chatredirects agents mid-run. "Focus on the payment API."
curl -fsSL https://matador.indiesecurity.com/huntbot/install.sh | sh
huntbot setupView the install script source before running.
Requires: Claude Code with Claude Max subscription. Huntbot uses Claude as its reasoning engine — each run consumes ~50K-150K tokens.
Alternative install methods
Direct download:
Download the binary for your platform from Releases, make it executable, and move to your PATH.
Custom location:
curl -fsSL https://matador.indiesecurity.com/huntbot/install.sh | HUNTBOT_INSTALL_DIR=/usr/local/bin shInstall the plugin, then talk:
/plugin marketplace add Matador-og/huntbot
/plugin install huntbot@huntbot
> Set up PayPal's bug bounty and start hunting
> Run recon on *.staging.company.com
> What findings do we have?
> Focus on the payment API
> Write up finding-001 for submission
# Create target
huntbot init paypal --scope "PayPal bug bounty"
vim ~/.huntbot/programs/paypal/scope.md
# Hunt
huntbot auto paypal --max-runs 5 --timeout 7200 -v
# Monitor
huntbot monitor
# Steer mid-run
huntbot chat paypal "focus on IDOR in /api/users/{id}"
# Check results
cat ~/.huntbot/programs/paypal/findings.mdS0 Recon Runs subfinder, httpx, katana, gau. Crawls JS bundles.
Maps the full attack surface. 18-44 b/s efficiency.
S1 App Mapping Registers accounts, logs in, clicks through every feature
with a real browser. Captures all HTTP traffic. Feeds
everything into the attack surface graph.
S2 Attack Testing Queries the graph for IDOR candidates, auth gaps, hidden
endpoints. Tests each one. Every finding passes 4-gate
validation before being written.
S3 Triage Re-validates every finding. Reproduces 3/3 times. Kills
false positives. Writes submission-ready reports.
S4 Final Review Senior reviewer. Destroys anything that doesn't hold up.
Last gate before you submit.
Each stage runs multiple passes. Each pass reads what previous passes found and looks for what they missed. When a pass finds nothing new, the stage advances automatically.
huntbot monitorProgram Stage Runs ctx find rpt eff status signal
───────────────────────────────────────────────────────────────────────────────────
target-1 S2 8 145K 12K 3 24.5b/s IDLE PRODUCTIVE
target-2 S1 3 67K 0K 0 8.2b/s RUNNING OK
target-3 S2 5 89K 4K 1 1.1b/s STALE LOW EFF
Auto-detects diminishing returns and stops wasting compute.
| Tool | What it does |
|---|---|
huntbot crawl |
Playwright browser — navigate, click, fill forms, capture traffic, execute JS |
huntbot ingestor |
Neo4j attack surface graph — IDOR detection, auth-gap analysis, endpoint classification |
huntbot matador |
Android testing — ADB, Frida SSL bypass, mitmproxy capture |
Plus recon tools: subfinder, httpx, katana, gau (installed by huntbot setup).
| Command | Description |
|---|---|
huntbot init <slug> |
Create target workspace |
huntbot auto <slug> |
Run full pipeline (S0-S4) |
huntbot run <slug> --stage N |
Run one stage |
huntbot monitor [slug] |
Health dashboard |
huntbot chat <slug> "msg" |
Steer agents mid-run |
huntbot status <slug> |
Target info |
huntbot update |
Self-update |
huntbot setup |
Install dependencies |
| Flag | Default | Recommended |
|---|---|---|
--max-runs |
3 | 5+ for complex apps |
--timeout |
1800 | 7200 (2 hours) |
-v |
off | Always on |
--max-stage |
4 | 1 for recon-only |
- Workspace structure — what lives in
~/.huntbot/programs/ - Configuration — config, flags, environment variables
- Tools reference — crawl, ingestor, matador full command list
- Monitor & signals — dashboard, health signals, efficiency tracking
- Skills — auto-loaded methodology per target type
Mohamed Amine Ait Ouchebou (@mrecho)
IndieSecurity · GitHub · LinkedIn
BSD 3-Clause. See LICENSE.
