SkillAgentSearch skills...

BugHunterArsenal

Multi-Tool Security Scanning Platform for Bug Bounty Hunters

Install / Use

/learn @bigzooooz/BugHunterArsenal
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

<a href="https://paypal.me/b4zb0z"><img src="https://shields.io/badge/paypal-Support_on_Paypal-blue?logo=paypal&style=for-the-badge" /></a> <a href="https://ko-fi.com/s/cb4c85e80b"><img src="https://shields.io/badge/KoFi-Buy_Me_a_coffee-blue?logo=ko-fi&style=for-the-badge" /></a>


<div align="center"> <img src="web/logo.png" alt="BugHunter Arsenal Logo" width="200"> <h1>BugHunter Arsenal</h1> <p><strong>Multi-Tool Security Scanning Platform for Bug Bounty Hunters</strong></p> <p>Current Version: <strong>v1.2.2</strong> · <a href="docs/CHANGELOG.md">Changelog</a></p> </div>

📖 Overview

BugHunter Arsenal is a comprehensive, unified security scanning platform designed for bug bounty hunters and security researchers. It provides a single interface to run multiple specialized security tools simultaneously, making vulnerability discovery more efficient and organized.

Unlike standalone security tools, BugHunter Arsenal orchestrates multiple scanners through a unified web dashboard and command-line interface, allowing you to discover vulnerabilities across different attack vectors in parallel.


🛠️ Available Tools

BugHunter Arsenal currently includes four specialized security scanning tools:

🔑 KeyHunter

API Key Detection & Validation - Scans domains, subdomains, and URLs for exposed API keys and secrets from 50+ providers with real-time validation. Automatically categorizes findings as Valid ✓, Invalid ✗, or Manual Review ?.

🎯 XSSHunter

Reflected Cross-Site Scripting (XSS) Vulnerability Scanner - Detects XSS vulnerabilities in URL parameters by testing all GET parameters simultaneously with 911+ customizable payloads. Checks for payload reflection in response content.

🔄 ORHunter

Open Redirect Vulnerability Scanner - Identifies open redirect vulnerabilities in web applications by testing URL parameters for redirect behavior. Useful for SSRF chains and social engineering attacks.

🎯 DTOHunter

Subdomain Takeover Detection Scanner - Detects vulnerable subdomains that can be taken over using fingerprinting from can-i-take-over-xyz. Checks CNAME records, NXDOMAIN responses, and service fingerprints.


✨ Key Features

🎛️ Unified Web Dashboard

  • Interactive GUI: Manage all scans from a single web interface
  • Real-time Monitoring: Live scan output streaming with Server-Sent Events (SSE)
  • Findings Management: Full CRUD operations for organizing vulnerabilities
  • Multi-Tool Support: Run multiple tools simultaneously on the same targets
  • Rescan Capabilities: Reuse collected URLs with new parameters (rescan, recrawl, rediscover)

🗄️ Database-Backed Storage

  • SQLite Database: All scan results stored in organized databases
  • Per-Domain Databases: Separate database files for each target (optional)
  • Findings Tracking: Severity levels, verification status, false positive flagging
  • Scan History: Complete audit trail of all scanning activities
  • Checkpoint System: Resume interrupted scans from the last checkpoint

⚙️ Advanced Configuration

  • Database-Backed Configs: Manage API patterns, excluded extensions, and payloads through the web UI
  • Settings Management: Add, edit, delete, and restore configuration items
  • YAML Sync: Automatic synchronization from YAML config files to database
  • Soft Deletes: Preserve user customizations when syncing from YAML
  • Custom Patterns: Easy addition of new detection patterns and payloads

🔄 Flexible Scanning Options

  • Resume Support: Automatically resumes incomplete scans by default
  • Force Restart: Option to start fresh scans when needed
  • URL Reuse: Reuse collected URLs for different tool scans without re-crawling
  • Subdomain Enumeration: Optional subdomain discovery using subfinder
  • Multiple Input Formats: Scan domains, files of domains, or direct URL lists

🔐 Authentication & Headers

  • Cookie Support: Authenticate with protected endpoints
  • Custom Headers: Add X-Request-For and other custom headers for bug bounty programs
  • Random User-Agents: Automatically rotates user agents to avoid detection

📦 Installation

Prerequisites

  • Python 3.7+
  • Go (for installing external tools)
  • External tools: subfinder, waybackurls, katana, httpx

Step-by-Step Installation

  1. Clone the Repository:

    git clone https://github.com/bigzooooz/BugHunterArsenal.git
    cd BugHunterArsenal
    
  2. Install Python Dependencies:

    pip install -r requirements.txt
    
  3. Install External Tools:

    Option A: Automatic Installation (recommended, requires sudo):

    sudo python3 BugHunterArsenal.py --install
    

    Option B: Manual Installation:

    go install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
    go install github.com/tomnomnom/waybackurls@latest
    go install github.com/projectdiscovery/httpx/cmd/httpx@latest
    go install github.com/projectdiscovery/katana/cmd/katana@latest
    

    Make sure the Go binaries are in your PATH.

  4. Verify Installation:

    python3 BugHunterArsenal.py --version
    

🚀 Usage

Command Line Interface

Basic Scanning

Scan a single domain with KeyHunter (default tool):

python3 BugHunterArsenal.py -d example.com

Scan with a specific tool:

python3 BugHunterArsenal.py -d example.com --tool xsshunter

Scan multiple domains from a file:

python3 BugHunterArsenal.py -f domains.txt --tool keyhunter

Scan URLs directly (skip subdomain enumeration):

python3 BugHunterArsenal.py -l urls.txt --tool xsshunter

Run multiple tools simultaneously:

python3 BugHunterArsenal.py -d example.com --tool keyhunter,xsshunter,orhunter

Advanced Options

Disable subdomain enumeration:

python3 BugHunterArsenal.py -d example.com --no-subs --tool keyhunter

Use custom output directory:

python3 BugHunterArsenal.py -d example.com -o my_results --tool xsshunter

Add authentication cookie:

python3 BugHunterArsenal.py -d example.com --cookie "session=abc123" --tool keyhunter

Add custom header (for bug bounty programs):

python3 BugHunterArsenal.py -d example.com --x-request-for "HackerOne" --tool xsshunter

Force restart (delete existing scan and start fresh):

python3 BugHunterArsenal.py -d example.com --restart --tool keyhunter

Enable verbose output:

python3 BugHunterArsenal.py -d example.com -v --tool keyhunter

Web GUI Dashboard

Start the web dashboard:

python3 BugHunterArsenal.py --gui

Then open http://127.0.0.1:5000 in your browser.

Dashboard Features

  • Target Management: Add, view, and manage scanning targets
  • Scan Wizard: Interactive interface for configuring and starting scans
  • Live Monitoring: Real-time output from running scans
  • Findings Management: View, edit, verify, and organize discovered vulnerabilities
  • Settings Page: Manage API patterns, excluded extensions, and XSS payloads
  • Statistics Dashboard: Overview of scans, findings, and subdomains
  • Export Functionality: Export findings in various formats

Rescan Options

From the target details page, you can:

  • 🔍 Re-scan URLs: Reuse existing URLs with new tool parameters (skip subdomain enum and URL collection)
  • 🕷️ Re-crawl URLs: Keep subdomains, re-collect URLs from existing subdomains
  • 🌐 Re-discover: Fresh start with same parameters (re-enumerate subdomains and crawl)

📖 Documentation

Detailed documentation for each tool is available in the docs/ directory:

For tool-specific features, usage examples, configuration options, and best practices, see the individual tool documentation files.


🛠️ Command-Line Options

Tool Selection

  • --tool TOOL_NAME - Specify tool(s) to run (comma-separated). Options: keyhunter, xsshunter, xss, orhunter, openredirect, redirect, dtohunter, takeover. Default: keyhunter

Scanning Options

  • -d, --domain DOMAIN - Target domain to scan
  • -f, --file FILE - File containing list of domains to scan
  • -l, --urls-file FILE - File containing list of URLs to scan directly (skips subdomain enumeration)
  • -ns, --no-subs - Disable subdomain enumeration
  • -o, --output DIR - Custom output directory name (default: output)

Authentication & Headers

  • --cookie COOKIE - Cookie string for authenticated requests
  • --x-request-for HEADER - Custom X-Request-For header value

Scan Control

  • --restart - Force restart: delete existing scan and start fresh (default: resumes from checkpoint)
  • -v, --verbose - Enable verbose output

System Options

  • --gui - Start the web dashboard GUI server
  • --install, --setup - Install missing dependencies automatically (requires sudo)
  • --update - Update BugHunter Arsenal to the latest version
  • --version - Display version information

⚙️ Configuration

Settings Management (Web UI)

Access the Settings page from the dashboard to manage:

  1. API Patterns: Add, edit, or delete API key detection pattern
View on GitHub
GitHub Stars4
CategoryDevelopment
Updated1mo ago
Forks0

Languages

Python

Security Score

75/100

Audited on Feb 22, 2026

No findings