Advanced Bug Bounty & Reconnaissance Framework
Forged by OnlyBugs05
Warning: This tool is for educational purposes and authorized security testing only. Misuse may be illegal.
Vuln-Vortex is a high-speed, automated reconnaissance and vulnerability scanning suite designed for modern bug bounty hunters. It combines multi-threaded enumeration, smart fuzzing, and vulnerability detection into a single "God Mode" tool.
-
⚡ Turbo Recon:
- Subdomain enumeration via Certificate Transparency (crt.sh).
- Multi-threaded IP resolution and DNS analysis.
-
🛡️ WAF & Tech Detection:
- Identifies Cloudflare, AWS WAF, Akamai, etc.
- Fingerprints CMS (WordPress, Joomla, Drupal) and Server headers.
-
🔍 Smart Scanning:
- Port Scanner: 100-threaded scanner for top 1000 ports.
- Fuzzer: 50-threaded sensitive file discovery (
.env,.git,backup.zip).
-
🔓 Advanced Vulnerability Engine:
- Open Redirects: Features 2-Step Verification to follow redirects and confirm destination (reduces false positives).
- CORS Misconfiguration: Detects reflected Origins and Credential leakage.
- Subdomain Takeover: Checks for dangling CNAME records (S3, GitHub Pages, Heroku).
-
📊 Cyberpunk Dashboard:
- Auto-generates a stunning, interactive HTML report (
report.html) with dark mode UI.
- Auto-generates a stunning, interactive HTML report (
Works on Kali Linux, Parrot OS, Ubuntu, and Debian.
# Clone the repository
git clone https://github.com/OnlyBugs05-hackerone/vuln-vortex.git
# Navigate to directory
cd vuln-vortex
# Run the installer (sets up venv & dependencies)
chmod +x install.sh
./install.shJust run the tool without arguments to use the menu system:
./vortexFor quick scans or scripting:
./vortex <target.com>./vortex -t example.com --mode full # Complete Audit (Recon + Scan + Fuzz + Vuln)
./vortex -t example.com --mode recon # Only Reconnaissance
./vortex -t example.com --mode scan # Port & Header Scan
./vortex -t example.com --mode fuzz # Sensitive File Fuzzing
./vortex -t example.com --mode vuln # Vulnerability ChecksAfter every scan, a report.html file is generated in the current directory. Open it in your browser to view the results:
xdg-open report.htmlContributions, issues, and feature requests are welcome! Feel free to check the issues page.
Distrubuted under the MIT License. See LICENSE for more information.
Made with ❤️ by OnlyBugs05