• Stars
    star
    700
  • Rank 64,671 (Top 2 %)
  • Language
    Shell
  • License
    MIT License
  • Created over 2 years ago
  • Updated over 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Asset inventory on public bug bounty programs.

Inventory Tweet

Attack Surface Management of public bug bounty programs.

The data we collect here includes DNS and Web Server data of public bug bounty programs.

Our aim with this project is to:

  • Monitor over 800 companies for new assets
  • help bug bounty hunters get up and running on new programs as quickly as possible.
  • give security teams better visibility into their assets.
  • reduce the load and noise that some programs face from automated tools (we run them on schedule, and give the results to everyone)

How it works

The setup consists of two workflows

  • Inventory 3.0 - Targets
  • Inventory 3.0

Inventory 3.0 - Targets

This workflow streamlines the consolidation of bug bounty program data from various sources, ensuring a comprehensive and organized view. Let's break it down:

  1. Data collection: The workflow fetches data from two important sources:

  2. Data transformation: The collected data undergoes transformation using Python scripts. The scripts convert the data into a specific format, ensuring consistency and ease of analysis. You can find the detailed data format in the targets.json file.

  3. Program merging: To avoid duplication, the workflow merges programs with the same URL together. This consolidation eliminates redundancies and presents a unified view of bug bounty programs.

  4. Community program inclusion: The workflow incorporates an additional set of programs from the community.json file. These programs are merged with the existing dataset, enhancing its coverage and diversity.

  5. Final output: The workflow generates a final consolidated JSON file, targets.json, which encompasses all the merged bug bounty program data. This file serves as a valuable resource for bug bounty researchers, providing a centralized and comprehensive view of programs.

Trickest Targets

Note: The screenshot above provides a visual representation of the workflow.

Inventory 3.0

  1. Gathering the tagets: Get the list of domains from targets.json, and extract program names.

  2. Making workflow run in parallel: Extracted program names are connected file-splitter node to make the whole workflow distributed per program

Trickest Parsing Targets

  1. Passive Enumeration:

Trickest Passive Enumeration

  1. Active Enumeration
    • Use passive enumeration data and create a new bruteforce wordlist
    • Use dsieve to get environments per subdomain level
    • Generate new potential subdomains with mksub and custom wordlist, with additional level2.txt wordlist
    • Resolve again with puredns

Trickest Active Enumeration

  1. Permutations
    • Merge active and passive results from previous steps
    • Extract environments per subdomain level again
    • Use alterx to generate permutations and resolve with puredns

Trickest Permutations

  1. Collecting previous results
    • Use python script that will get all of the previous hostnames.txt per program
    • Use anew to get the new hostnames found
    • zip active, passive, permutations per program to be pushed to repository

Trickest Previous Results

  1. Reporting
    • Use dnsx to resolve found hostnames and python script for dns-report.csv; mark newly found domains coming from anew with [x]
    • Use httpx to gather web servers and python script for `server-report.csv
    • Push to the repository

Trickest Reporting

Final workflow

Trickest Inventory 3.0 Workflow

Note: As described, almost everything in this repository is generated automatically. We carefully designed the workflows (and continue to develop them) to ensure the results are as accurate as possible.

Contribution

All contributions/ideas/suggestions are welcome! If you want to add/edit a target/workflow, feel free to send us a PR with new targets through community.json, tweet at us @trick3st, or join the conversation on Discord.

Build your own workflows!

We believe in the value of tinkering. Sign up for a demo on trickest.com to customize this workflow to your use case, get access to many more workflows, or build your own from scratch!

More Repositories

1

cve

Gather and update all available and newest CVEs with their PoC.
HTML
5,099
star
2

wordlists

Real-world infosec wordlists, updated regularly
804
star
3

resolvers

The most exhaustive list of reliable DNS resolvers.
420
star
4

zip

Monitoring the internet for new .zip domains
205
star
5

mksub

Generate tens of thousands of subdomain combinations in a matter of seconds
Go
191
star
6

dsieve

Filter and enrich a list of subdomains by level
Go
145
star
7

mkpath

Make URL path combinations using a wordlist
Go
140
star
8

find-gh-poc

Find CVE PoCs on GitHub
Go
110
star
9

log4j

Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.
104
star
10

insiders

Archive of Potential Insider Threats
101
star
11

containers

Automated privilege escalation of the world's most popular Docker images.
Shell
62
star
12

enumerepo

List all public repositories for (valid) GitHub usernames
Go
52
star
13

safe-harbour

security.txt collection of most popular world-wide domains
50
star
14

trickest-cli

Execute Trickest workflows right from your terminal
Go
45
star
15

recon-and-vulnerability-scanner-template

Create your own recon & vulnerability scanner with Trickest and GitHub
40
star
16

cloud

Monitoring the Cloud Landscape
26
star
17

mgwls

Combine words from two wordlist files and concatenate them with an optional delimiter
Go
23
star
18

scripts

Handy scripts and one-liners to make life easier
22
star
19

elasticsearch_index

Manage attack surface data on Elasticsearch
Python
17
star
20

packages

Automated compromise detection of the world's most popular packages
13
star
21

action

Github Action for Trickest Workflows
Shell
6
star