githubEdit

Automation & Scripting

Templates and patterns for automating penetration testing tasks.

Bash Scripting

Reconnaissance Automation

#!/bin/bash
# recon.sh - Basic recon automation

TARGET=$1
OUTPUT_DIR="./recon/$TARGET"

if [ -z "$TARGET" ]; then
    echo "Usage: $0 <domain>"
    exit 1
fi

mkdir -p "$OUTPUT_DIR"

echo "[*] Starting recon for $TARGET"

# Subdomain enumeration
echo "[*] Subdomain enumeration..."
subfinder -d "$TARGET" -silent | tee "$OUTPUT_DIR/subdomains.txt"
amass enum -passive -d "$TARGET" >> "$OUTPUT_DIR/subdomains.txt"
sort -u "$OUTPUT_DIR/subdomains.txt" -o "$OUTPUT_DIR/subdomains.txt"

# Resolve subdomains
echo "[*] Resolving subdomains..."
cat "$OUTPUT_DIR/subdomains.txt" | httpx -silent | tee "$OUTPUT_DIR/alive.txt"

# Port scanning
echo "[*] Port scanning..."
naabu -l "$OUTPUT_DIR/subdomains.txt" -silent | tee "$OUTPUT_DIR/ports.txt"

# Screenshot
echo "[*] Taking screenshots..."
cat "$OUTPUT_DIR/alive.txt" | gowitness file -f - -P "$OUTPUT_DIR/screenshots"

echo "[*] Recon complete. Results in $OUTPUT_DIR"

Parallel Processing

Bruteforce Helper

Python Scripts

HTTP Request Template

SQLi Checker

Subdomain Takeover Checker

Tool Chaining

Recon Pipeline

Web Attack Pipeline

One-Liners Collection

Subdomain Enumeration

HTTP Analysis

Quick Vulnerability Checks

Credential Hunting

Workflow Examples

Bug Bounty Automation

Last updated

Was this helpful?