samet-g / bugradar

Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool


Logo

bugradar

advanced external automation bug bounty tool
Explore the docs »

monitor all programs · View Demo · remediate vulnerabilities


Table of Contents
  1. What is bugradar?
  2. Features
  3. Built With
  4. Features
  5. License
  6. Contact

What is bugradar?

bugradar is automates the entire process of reconnaisance, find business-critical security vulnerabilities, strengthen your web app security with application scanning with designed to delegate time consuming tasks to the cloud by distributing the input data to multiple serverless functions and running the tasks in parallel resulting in huge performance boost. Normalizing and correlating the data can also be a tremendous undertaking in addition to keeping up-to-date with API changes over time. However, automated bugradar tool gather the new subdomain information organizations need for accurate attack surface monitoring, allowing users to focus their energy on be first attacker.

bugradar monitoring over

  • 4000+ public hackerone scope
  • 460+ private hackerone scope
  • 135+ bugcrowd program
  • 51+ self-hosted program
  • 50+ intigriti program and checking 6 platform

bugradar streamlines both the processes of data collection and continuous monitoring, automatically triggering notifications via telegram when program’s new subdomain is detected. Taking the automation a step further, this help security operations run more efficiently through integration with vulnerability scanners to support incident response and overall information security risk management.

Features

  • distribute a scan of a large set of targets across 300-1000 instances within minutes and get results extremely quickly.
  • continuous monitoring with change notifications by Telegram
  • updating every day to new exploits
  • SQLite back-end for custom querying
  • find S3 buckets and dump their buckets
  • automate the procedure of all the possible techniques to bypass 403 response
  • excellent and zeroday fingerprints for subdomain takeover
  • safely continuous querying CNAME records for subdomain takeover with manually
  • highly configurable
  • actively developed
  • your time should be focused on creating something amazing.
  • you shouldn't be doing the same tasks over and over like parse scopes, save active domains, scan vulnerabilities and more..
  • you should implement DRY principles to the rest of your life ♥‿♥

Built With

Rewards

License

It is perfect setup for bug hunters but it is for personal use so it is private, sorry for that ಥ_ಥ

Project by: samet-g / samogod

(back to top)

Contact

Twitter - @imsamet0

Linkedin - samet-g-897856228

Email - gozetsamet@gmail.com

(back to top)

About

Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.