An intelligent reconnaissance framework for bug bounty hunters, leveraging AI and advanced heuristics to identify and prioritize targets effectively.
Traditional recon tools generate vast amounts of data. Smart-BugBounty-Recon aims to:
- π― Prioritize: AI-powered scoring helps hunters focus on the most promising assets
- π Contextualize: Provides deeper insights beyond simple enumeration
- π€ Automate Intelligently: Goes beyond basic scripting with smarter decision-making
- π Uncover Hidden Gems: Identifies attack surface that might be missed by standard tools
- Subdomain Enumeration - Certificate transparency (crt.sh), DNS brute-forcing, wildcard detection
- Technology Detection - HTTP headers, cookies, HTML patterns, JS libraries, CMS fingerprinting
- Port Scanning - Nmap integration with socket fallback, service detection, banner grabbing
- JavaScript Analysis - Extract API endpoints, detect hardcoded secrets/tokens, find sensitive paths
- Endpoint Discovery - robots.txt, sitemap.xml, common path brute-forcing
- Risk scoring based on technology, ports, secrets, and endpoints
- Weighted prioritization algorithm
- Actionable recommendations for hunters
- Attack surface summary
- Colored console output with rich formatting
- JSON export for integration
- HTML reports with dark theme
- Markdown summaries
- Python 3.8 or higher
- (Optional) Nmap for enhanced port scanning
# Clone the repository
git clone https://github.com/raghu-007/Smart-BugBounty-Recon.git
cd Smart-BugBounty-Recon
# Create virtual environment (recommended)
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# Copy and configure settings
cp config.example.ini config.ini
# Edit config.ini with your API keys (optional)
# Run a scan
python smart_recon.py -d example.compython smart_recon.py -d target.compython smart_recon.py -d target.com -o report.json -f json -v| Option | Description |
|---|---|
-d, --domain |
Target domain (required) |
-o, --output |
Output file path |
-f, --format |
Output format: console, json, html, markdown, all |
-m, --modules |
Comma-separated modules: subdomain,techdetect,portscan,jsanalyzer,endpoints |
-c, --config |
Path to config file (default: config.ini) |
-v, --verbose |
Enable verbose output |
--no-ai |
Disable AI prioritization |
-t, --threads |
Number of concurrent threads (default: 10) |
--timeout |
Request timeout in seconds (default: 10) |
# Run specific modules only
python smart_recon.py -d target.com -m subdomain,techdetect
# Generate HTML report
python smart_recon.py -d target.com -o report.html -f html
# Verbose mode with all outputs
python smart_recon.py -d target.com -o results -f all -v
# Fast scan without AI
python smart_recon.py -d target.com --no-ai -t 20Smart-BugBounty-Recon/
βββ smart_recon.py # Main CLI entry point
βββ config.example.ini # Configuration template
βββ requirements.txt # Python dependencies
βββ src/
β βββ core/ # Core utilities
β β βββ config.py # Configuration loader
β β βββ scanner.py # Base scanner class
β β βββ utils.py # Utility functions
β βββ modules/ # Recon modules
β β βββ subdomain.py # Subdomain enumeration
β β βββ techdetect.py # Technology detection
β β βββ portscan.py # Port scanning
β β βββ jsanalyzer.py # JavaScript analysis
β β βββ endpoints.py # Endpoint discovery
β βββ ai/ # AI prioritization
β β βββ scorer.py # Risk scoring
β β βββ prioritizer.py # Prioritization engine
β βββ output/ # Reporting
β βββ reporter.py # Report generation
β βββ formatter.py # Output formatting
βββ tests/ # Unit tests
Copy config.example.ini to config.ini and configure:
[general]
threads = 10
timeout = 10
verbose = false
[api_keys]
shodan = your_shodan_key
virustotal = your_vt_key
[scanning]
intensity = normal
enable_portscan = true
enable_js_analysis = true
[ai_prioritization]
enabled = true
min_score = 20# Install test dependencies
pip install pytest pytest-asyncio
# Run all tests
python -m pytest tests/ -v
# Run with coverage
pip install pytest-cov
python -m pytest tests/ -v --cov=srcContributions are welcome! Please read CONTRIBUTING.md for guidelines.
- Create a new file in
src/modules/ - Inherit from
BaseScanner - Implement the
scan()method - Register in
src/modules/__init__.py - Add tests in
tests/
This project is licensed under the Apache 2.0 License - see the LICENSE file.
This tool is intended for educational purposes and for use in authorized bug bounty hunting or penetration testing engagements ONLY.
- Only scan targets you have explicit permission to test
- Unauthorized scanning of systems is illegal
- The developers assume no liability for misuse or damage caused by this program
- Always follow responsible disclosure practices
- Built with Python and async/await for performance
- Uses certificate transparency logs via crt.sh
- Nmap integration for advanced port scanning
- Rich library for beautiful console output
Happy Hunting! π―