• Stars
    star
    288
  • Rank 143,818 (Top 3 %)
  • Language
    Shell
  • Created almost 4 years ago
  • Updated almost 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices

Docker Pulls Mastodon

Introduction

The Bug Bounty Reconnaissance Framework (BBRF) is intended to facilitate the workflows of security researchers across multiple devices. This repository contains the source files to deploy a BBRF server.

For more information about BBRF, read the blog post on https://honoki.net/2020/10/08/introducing-bbrf-yet-another-bug-bounty-reconnaissance-framework/

Once you have deployed a BBRF server, move on to install the BBRF client here

Installation

Start by cloning this repository:

git clone https://github.com/honoki/bbrf-server/
cd bbrf-server

Next, make the required changes to the docker-compose.yml by which I mean CHANGE THE DEFAULT PASSWORDS FOR THE LOVE OF GOD!

And finally, run

sudo docker-compose up -d

Note that this will expose port 443 (https) on your BBRF server to the internet. Docker Compose generates a self-signed certificate for the reverse proxy which it persists to the volume ./keys/. You can replace them with a valid certificate if you want to avoid certificate warnings, see the instructions below.

Verify your installation by browsing to https://127.0.0.1/_utils/#database/bbrf/_all_docs

Generate certificate with Letsencrypt

To configure your BBRF server with a valid certificate, it suffices to generate the cert files with certbot and place them in the keys directory. The keys will be picked up when you next start the containers.

The following steps should get you up and running:

  1. Ensure you have a domain name pointed to your BBRF server;
  2. If you are still in docker-compose, stop the containers with ctrl+C;
  3. Install certbot: sudo apt install certbot
  4. If necessary, allow HTTP traffic e.g: ufw allow 80/tcp
  5. Run certbot -d yourdomain.com certonly and follow the steps;
  6. Copy the generated certificate files to the keys volume: cp /etc/letsencrypt/live/yourdomain.com/{fullchain.pem,privkey.pem} ./proxy/keys/
  7. Restart your containers: sudo docker-compose up -d

Browse to https://yourdomain.com/_utils/#database/bbrf/_all_docs to validate the setup.

More Repositories

1

bbrf-client

The Bug Bounty Reconnaissance Framework (BBRF) can help you coordinate your reconnaissance workflows across multiple devices
Python
607
star
2

bugbounty-openvpn-socks

Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.
Shell
101
star
3

burp-digitalocean-droplet-proxy

Deploy a SOCKS5 proxy in DigitalOcean and autoconfigure the Burp proxy settings to route all traffic through the droplet
Java
51
star
4

wilson-cloud-respwnder

WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropriately respond to client-issued requests.
Python
51
star
5

burp-digitalocean-openvpn-socks

A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it
Java
45
star
6

tools

A collection of simple tools and poc-builders
HTML
39
star
7

bbrf-dashboard

Vue
36
star
8

burp-copy-regex-matches

Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.
Java
33
star
9

burp-pac-server

Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.
Java
33
star
10

bbrf-burp-plugin

A BurpSuite plugin for BBRF
Java
23
star
11

bbrf-agents

A collection of BBRF agents that can be deployed to AWS lambda
Python
22
star
12

punycoder

A script to automatically list visually indistinguishable permutations of domain names using IDN and punycode.
Python
21
star
13

CSRFBlock

A PHP adaptation of OWASP's CSRFGuard that starts from a whitelist approach to protect websites against CSRF attacks.
PHP
1
star