Skip to content

KaanBicaklar/AssetMiner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ•΅οΈ Bug Bounty Recon Scanner

Bug Bounty Recon Scanner is an automated reconnaissance and vulnerability scanning pipeline tailored for bug bounty hunters, penetration testers, and red team operators. It combines multiple reconnaissance techniques and security tools into a streamlined process β€” allowing you to discover attack surfaces quickly and effectively.


βš™οΈ Features

  • πŸ” Subdomain Enumeration (passive & active)
  • 🌐 HTTP Probing – Identify live web services
  • πŸ“š Wayback URL Collection – Archive-based URL gathering
  • πŸ•·οΈ Web Crawling using Katana
  • πŸ“ Directory Bruteforcing via Gobuster
  • 🎯 GF Pattern Matching – Search for vulnerability indicators
  • πŸ’₯ Nuclei Scanning – Fast and template-driven vulnerability scanning
  • πŸ§ͺ Burp Suite Proxy Integration – Optional traffic routing
  • πŸ” Force Rescan – Ignore cached results and re-run all stages
  • πŸ“„ Supports both single domain and domain lists

πŸš€ Usage

Usage: assetminer.sh [options] (-d <domain> | -l <domain_list>) <proxy>

 β–„β–„β–„        β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ   β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆ β–“β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–„β–„β–„β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–“ β–ˆβ–ˆβ–ˆβ–„ β–„β–ˆβ–ˆβ–ˆβ–“ β–ˆβ–ˆβ–“ β–ˆβ–ˆβ–ˆβ–„    β–ˆ β–“β–ˆβ–ˆβ–ˆβ–ˆβ–ˆ  β–ˆβ–ˆβ–€β–ˆβ–ˆβ–ˆ  
β–’β–ˆβ–ˆβ–ˆβ–ˆβ–„    β–’β–ˆβ–ˆ    β–’ β–’β–ˆβ–ˆ    β–’ β–“β–ˆ   β–€β–“  β–ˆβ–ˆβ–’ β–“β–’β–“β–ˆβ–ˆβ–’β–€β–ˆβ–€ β–ˆβ–ˆβ–’β–“β–ˆβ–ˆβ–’ β–ˆβ–ˆ β–€β–ˆ   β–ˆ β–“β–ˆ   β–€ β–“β–ˆβ–ˆ β–’ β–ˆβ–ˆβ–’
β–’β–ˆβ–ˆ  β–€β–ˆβ–„  β–‘ β–“β–ˆβ–ˆβ–„   β–‘ β–“β–ˆβ–ˆβ–„   β–’β–ˆβ–ˆβ–ˆ  β–’ β–“β–ˆβ–ˆβ–‘ β–’β–‘β–“β–ˆβ–ˆ    β–“β–ˆβ–ˆβ–‘β–’β–ˆβ–ˆβ–’β–“β–ˆβ–ˆ  β–€β–ˆ β–ˆβ–ˆβ–’β–’β–ˆβ–ˆβ–ˆ   β–“β–ˆβ–ˆ β–‘β–„β–ˆ β–’
β–‘β–ˆβ–ˆβ–„β–„β–„β–„β–ˆβ–ˆ   β–’   β–ˆβ–ˆβ–’  β–’   β–ˆβ–ˆβ–’β–’β–“β–ˆ  β–„β–‘ β–“β–ˆβ–ˆβ–“ β–‘ β–’β–ˆβ–ˆ    β–’β–ˆβ–ˆ β–‘β–ˆβ–ˆβ–‘β–“β–ˆβ–ˆβ–’  β–β–Œβ–ˆβ–ˆβ–’β–’β–“β–ˆ  β–„ β–’β–ˆβ–ˆβ–€β–€β–ˆβ–„  
 β–“β–ˆ   β–“β–ˆβ–ˆβ–’β–’β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–’β–’β–’β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–’β–’β–‘β–’β–ˆβ–ˆβ–ˆβ–ˆβ–’ β–’β–ˆβ–ˆβ–’ β–‘ β–’β–ˆβ–ˆβ–’   β–‘β–ˆβ–ˆβ–’β–‘β–ˆβ–ˆβ–‘β–’β–ˆβ–ˆβ–‘   β–“β–ˆβ–ˆβ–‘β–‘β–’β–ˆβ–ˆβ–ˆβ–ˆβ–’β–‘β–ˆβ–ˆβ–“ β–’β–ˆβ–ˆβ–’
 β–’β–’   β–“β–’β–ˆβ–‘β–’ β–’β–“β–’ β–’ β–‘β–’ β–’β–“β–’ β–’ β–‘β–‘β–‘ β–’β–‘ β–‘ β–’ β–‘β–‘   β–‘ β–’β–‘   β–‘  β–‘β–‘β–“  β–‘ β–’β–‘   β–’ β–’ β–‘β–‘ β–’β–‘ β–‘β–‘ β–’β–“ β–‘β–’β–“β–‘
  β–’   β–’β–’ β–‘β–‘ β–‘β–’  β–‘ β–‘β–‘ β–‘β–’  β–‘ β–‘ β–‘ β–‘  β–‘   β–‘    β–‘  β–‘      β–‘ β–’ β–‘β–‘ β–‘β–‘   β–‘ β–’β–‘ β–‘ β–‘  β–‘  β–‘β–’ β–‘ β–’β–‘
  β–‘   β–’   β–‘  β–‘  β–‘  β–‘  β–‘  β–‘     β–‘    β–‘      β–‘      β–‘    β–’ β–‘   β–‘   β–‘ β–‘    β–‘     β–‘β–‘   β–‘ 
      β–‘  β–‘      β–‘        β–‘     β–‘  β–‘               β–‘    β–‘           β–‘    β–‘  β–‘   β–‘     
                                                                                     

Required arguments:
  -d <domain>           Single domain to scan
  -l <domain_list>      File containing list of domains (one per line)
  <proxy>               Burp Suite proxy URL (http://host:port)

Options:
  -h, --help            Show this help message
  --skip-subdomain      Skip subdomain enumeration phase
  --skip-http           Skip HTTP probe phase
  --skip-wayback        Skip Wayback URL collection
  --skip-crawl          Skip crawling with katana
  --skip-dirb           Skip directory bruteforcing with Gobuster
  --skip-gf             Skip GF pattern matching
  --skip-nuclei         Skip Nuclei scanning
  --with-burp           Send traffic to Burp Suite proxy
  --force-rescan        Force a full rescan ignoring previous results

Examples:
  Single domain:     ./recon.py -d example.com
  Domain list:       ./recon.py -l domains.txt
  With options:      ./recon.py -l domains.txt http://127.0.0.1:8080 --with-burp --force-rescan

πŸ“„ Disclaimer

This project is developed for educational purposes only and to assist security professionals in performing authorized security assessments. Do not use this tool for illegal activities. Engaging in unauthorized scanning or exploitation may violate local, national, or international laws.

The author assumes no responsibility for any misuse or damage caused by this software. By using this tool, you agree that you are solely responsible for your actions and compliance with applicable laws and regulations.

About

Automated Domain reconnaissance & vulnerability scan pipeline with subdomain enum, HTTP probing, wayback URLs, crawling, dir scanning, Nuclei scanning and optional Burp Suite proxy support.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages