Skip to content

RobinHood - Bug Hunting Recon Automation Script

License

Notifications You must be signed in to change notification settings

dracula74644/RobinHoodMine

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

RobinHood

Bug Hunting Recon Automation Script

This script performs automated recon on a target domain (large scope) by running the best set of tools to perform scanning and massive reconnaissance.

Required Tools (you need to install those by yourself)

EXAMPLES OF API AND TOOLS LOCATIONS

If you don't set those variables the related tools will not run!

FINGERPRINTS="" # Subjack fingerprints location

CLOUDFLAIR="" # CloudFlair tool location

CENSYS_API_ID="" # Censys api id for CloudFlair

CENSYS_API_SECRET="" # Censys api secret for CloudFlair

VULSCAN_NMAP_NSE="" # Vulscan NSE script for Nmap

JSUBFINDER_SIGN="" # Signature location for jsubfinder tool

LINKFINDER="" # Path for LinkFinder tool

VHOSTS_SIEVE="" # Path for VHosts Sieve tool

CLOUD_ENUM="" # Path for cloud_enum, Multi-cloud OSINT

SUBLIST3R="" # Path for sublist3r tool

ALTDNS_WORDS="" # Path to altdns words permutations file

DNSREAPER="" # Path to dnsrepaer tool

ORALYZER="" # Oralyzer path url tool (EDIT THIS)

ORALYZER_PAYLOADS="" # Oralyzer payloads file

SMUGGLER="" # Smuggler tool

PARAMS="" # List of params for bruteforcing GET/POST hidden params

SQLMAP="" # SQLMAP Tool

Features

  • Searching for subdomains
  • Search for subdomains takeover (subjack, dnsreaper)
  • Search for live urls using gau
  • Get screenshots of subdomains
  • Powered by GF-Patterns
  • Search for secrets, token and APIs
  • Search hidden endpoints in JS urls
  • Scan live hosts with Nmap and Vulscan NSE Script
  • Run Nuclei on all live subdomains
  • Search for XSS with Dalfox
  • Search for SQL injections with sqlmap
  • Search for virtual hosts
  • Search for public resources in AWS, Azure, and Google Cloud
  • Try to get origin of IPs using CloudFlair
  • Get interesting URLs for XSS, SSRF, SQLi, LFI, OPEN REDIRECT
  • Extend searching subdomains with words permutations using altdns
  • Scan for Open Redirect with Oralyzer
  • Fuzzing for CRLF
  • Client-side Prototype Pollution to XSS
  • Search for hidden params on php endpoints

Usage

$ git clone https://github.com/CalfCrusher/RobinHood/

$ cd RobinHood && chmod +x RobinHood.sh

Run in background:

$ nohup ./RobinHood.sh LARGE_SCOPE_DOMAIN 2>&1 &

You can also give the out-of-scope domains list separated by commas:

$ nohup ./RobinHood.sh example.com vpn.example.com,test.example.com 2>&1 &

To see progress output

$ tail -f nohup.out

Disclaimer

Be free to edit the various settings of tools related to your VPS power/bandwith. You can run this script also on your Raspberry or your DigitalOcean droplet or just where you want. It takes very long time also in base of which domain you run against to.

About

RobinHood - Bug Hunting Recon Automation Script

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 100.0%