Bug Bounty Recon Scanner is an automated reconnaissance and vulnerability scanning pipeline tailored for bug bounty hunters, penetration testers, and red team operators. It combines multiple reconnaissance techniques and security tools into a streamlined process β allowing you to discover attack surfaces quickly and effectively.
- π Subdomain Enumeration (passive & active)
- π HTTP Probing β Identify live web services
- π Wayback URL Collection β Archive-based URL gathering
- π·οΈ Web Crawling using Katana
- π Directory Bruteforcing via Gobuster
- π― GF Pattern Matching β Search for vulnerability indicators
- π₯ Nuclei Scanning β Fast and template-driven vulnerability scanning
- π§ͺ Burp Suite Proxy Integration β Optional traffic routing
- π Force Rescan β Ignore cached results and re-run all stages
- π Supports both single domain and domain lists
Usage: assetminer.sh [options] (-d <domain> | -l <domain_list>) <proxy>
βββ ββββββ ββββββ βββββββββββββββ ββββ βββββ βββ ββββ β ββββββ ββββββ
ββββββ βββ β βββ β ββ ββ βββ βββββββββ βββββββ ββ ββ β ββ β βββ β βββ
βββ βββ β ββββ β ββββ ββββ β ββββ βββββ βββββββββββ ββ βββββββ βββ βββ β
βββββββββ β βββ β ββββββ ββ ββββ β βββ βββ ββββββββ ββββββββ β βββββββ
ββ βββββββββββββββββββββββββββββ ββββ β ββββ ββββββββββββ βββββββββββββββ ββββ
ββ βββββ βββ β ββ βββ β βββ ββ β β ββ β ββ β βββ β ββ β β ββ ββ ββ ββ ββββ
β ββ ββ ββ β ββ ββ β β β β β β β β β β ββ ββ β ββ β β β ββ β ββ
β β β β β β β β β β β β β β β β β β ββ β
β β β β β β β β β β β β
Required arguments:
-d <domain> Single domain to scan
-l <domain_list> File containing list of domains (one per line)
<proxy> Burp Suite proxy URL (http://host:port)
Options:
-h, --help Show this help message
--skip-subdomain Skip subdomain enumeration phase
--skip-http Skip HTTP probe phase
--skip-wayback Skip Wayback URL collection
--skip-crawl Skip crawling with katana
--skip-dirb Skip directory bruteforcing with Gobuster
--skip-gf Skip GF pattern matching
--skip-nuclei Skip Nuclei scanning
--with-burp Send traffic to Burp Suite proxy
--force-rescan Force a full rescan ignoring previous results
Examples:
Single domain: ./recon.py -d example.com
Domain list: ./recon.py -l domains.txt
With options: ./recon.py -l domains.txt http://127.0.0.1:8080 --with-burp --force-rescanThis project is developed for educational purposes only and to assist security professionals in performing authorized security assessments. Do not use this tool for illegal activities. Engaging in unauthorized scanning or exploitation may violate local, national, or international laws.
The author assumes no responsibility for any misuse or damage caused by this software. By using this tool, you agree that you are solely responsible for your actions and compliance with applicable laws and regulations.