blaxkmiradev/opencode-bug-bounty
GitHub: blaxkmiradev/opencode-bug-bounty
一款面向漏洞赏金猎人及安全人员的自动化全流程安全测试框架,解决从侦察到报告的一站式高效协作问题。
Stars: 0 | Forks: 0
# 🐛 Bug Hunter Toolkit
## 专业漏洞赏金与安全测试框架
**Created by:** [rikixz](https://github.com/blaxkmiradev) | [blaxkmiradev](https://github.com/blaxkmiradev)
**Version:** 2.0.0
**License:** MIT
## 目录
1. [Introduction](#introduction)
2. [Setup](#setup)
3. [How to Use](#how-to-use)
4. [Skills](#skills)
5. [Tools](#tools)
6. [Vulnerability Levels](#vulnerability-levels)
7. [CVE Finding & Writing](#cve-finding--writing)
8. [Report Writing](#report-writing)
9. [Adding New Skills](#adding-new-skills)
10. [Commands Reference](#commands-reference)
11. [Credits](#credits)
## 介绍
Bug Hunter Toolkit 是一个全面的安全测试框架,适用于漏洞赏金猎人、渗透测试人员和安全专业人员。它包含:
- **9 种专业技能**,覆盖不同的安全领域
- **40+ 个 Python 工具**,用于漏洞扫描
- **15+ 个 PowerShell 工具**,用于 Windows 自动化
- **完整的工作流程**,从侦察到报告
## 设置
### 要求
#### Python(必需)
```
# 安装 Python 依赖
pip install -r requirements.txt
# 或单独安装
pip install requests urllib3 dnspython colorama
```
#### Go(可选 - 适用于高级工具)
```
# 安装 Go 工具
go install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install github.com/projectdiscovery/httpx/cmd/httpx@latest
go install github.com/projectdiscovery/nuclei/cmd/nuclei@latest
go install github.com/projectdiscovery/katana/cmd/katana@latest
go install github.com/dw1zard/dalfox/v2/cmd/dalfox@latest
go install github.com/ffuf/ffuf@latest
```
#### PowerShell(Windows)
```
# 运行设置
.\tools\bug-hunter\setup.ps1 -All
# 或使用单独的工具
.\run.ps1 setup
```
### 快速设置
```
# 克隆或下载工具包
git clone https://github.com/blaxkmiradev/bug-hunter.git
# 安装依赖
cd bug-hunter
pip install -r scripts/requirements.txt
# 测试安装
python tools/python/fast_scanner.py example.com
```
## 如何使用
### 主启动器(PowerShell)
```
# 显示帮助
.\run.ps1
# 侦察
.\run.ps1 recon example.com
# 扫描漏洞
.\run.ps1 scan example.com -type xss
# 测试特定漏洞
.\run.ps1 test xss https://example.com/search?q=test
.\run.ps1 test ssrf https://example.com/webhook
.\run.ps1 test idor https://api.example.com
.\run.ps1 test oauth https://example.com/oauth/authorize
# 网络枚举
.\run.ps1 test network 192.168.1.1
# 移动测试
.\run.ps1 test mobile app.apk
# 生成报告
.\run.ps1 report example.com IDOR /api/users "read all user data"
```
### 主启动器(Python)
```
# 显示帮助
python scripts/run.py
# 快速扫描
python scripts/run.py fast example.com
# 子域名枚举
python scripts/run.py subdomain example.com
# 端口扫描
python scripts/run.py port target.com
# 目录扫描
python scripts/run.py dirs https://example.com
# 漏洞扫描
python scripts/run.py xss https://example.com/search?q=test
python scripts/run.py sqli https://example.com/product?id=1
python scripts/run.py ssrf https://example.com/webhook
# 头部分析
python scripts/run.py header https://example.com
# CORS 扫描器
python scripts/run.py cors https://api.example.com
# JWT 分析器
python scripts/run.py jwt eyJhbGciOi...
# 运行所有工具
python tools/python/ALL.py scan example.com
```
### 单独工具
```
# 侦察
python tools/python/fast_scanner.py target.com
python tools/python/subdomain_enum.py target.com
python tools/python/parameter_scanner.py https://example.com
python tools/python/fingerprint.py https://example.com
python tools/python/nmap_scan.py target.com
# 漏洞扫描
python tools/python/xss_scanner.py "https://example.com/search?q=test"
python tools/python/sqli_scanner.py "https://example.com/product?id=1"
python tools/python/ssrf_scanner.py https://example.com/urlfetch
python tools/python/lfi_scanner.py "https://example.com/view?page="
python tools/python/cmdi_scanner.py "https://example.com/ping?ip="
python tools/python/open_redirect.py "https://example.com/redirect?url="
# 分析
python tools/python/header_analyzer.py https://example.com
python tools/python/cors_scanner.py https://example.com/api
python tools/python/secret_scanner.py https://example.com
python tools/python/jwt_analyzer.py eyJhbGciOi...
python tools/python/graphql_scanner.py https://example.com/graphql
# 特殊
python tools/python/race_tester.py https://example.com/redeem -c 20
python tools/python/bruteforce.py https://example.com /login users.txt passwords.txt
python tools/python/generate_csv.py --vuln XSS --target example.com --endpoint /search
python tools/python/cvss.py
```
## 技能
### 技能结构
每个技能都是一个 `skills/` 目录,包含:
- `SKILL.md` - 主要技能内容
- `skills.yaml` - 技能元数据
### 可用技能
| Skill | Description | Trigger |
|-------|------------|---------|
| **bug-bounty** | 主要漏洞赏金工作流程 | bug bounty, recon, 漏洞赏金 |
| **web-audit** | Web 应用安全审计 | web audit, code review, API |
| **mobile-security** | Android/iOS 安全 | mobile security, Android, Frida |
| **cloud-security** | AWS/GCP/Azure/K8s | cloud security, S3, K8s |
| **network-security** | 网络渗透测试 | network, port scan, SMB |
| **api-security** | REST/GraphQL 测试 | API, REST, GraphQL |
| **red-team** | 红队操作 | red team, C2, AD |
| **report-writing** | 报告模板与 CVSS | report, cvss, 漏洞报告 |
| **osint** | OSINT 侦察 | OSINT, Google hacking |
### 激活技能
技能会根据提示中的关键词自动激活:
```
# 与漏洞赏金相关
漏洞赏金, 安全测试, 渗透测试, bug bounty, recon, pentest
IDOR, SSRF, XSS, SQLi, vulnerability hunting
# Web 审计
web audit, code review, source audit, API security
# 移动
mobile security, Android, iOS, APK analysis, Frida
# 云
cloud security, AWS, S3 bucket, Kubernetes, K8s
# 报告
report writing, cvss, severity, triage response
```
## 工具
### Python 工具(40+)
#### 侦察工具
| Tool | Description | Usage |
|------|------------|--------|
| `fast_scanner.py` | 快速全场景扫描 | `python fast_scanner.py target.com` |
| `subdomain_enum.py` | 子域名枚举 | `python subdomain_enum.py target.com` |
| `nmap_scan.py` | 端口扫描器 | `python nmap_scan.py target.com` |
| `fingerprint.py` | 技术识别 | `python fingerprint.py https://target.com` |
| `parameter_scanner.py` | 参数发现 | `python parameter_scanner.py https://target.com` |
| `dir_scanner.py` | 目录扫描 | `python dir_scanner.py https://target.com` |
#### 漏洞扫描器
| Tool | Description | Usage |
|------|------------|--------|
| `xss_scanner.py` | XSS 检测 | `python xss_scanner.py https://target.com/search?q=test` |
| `sqli_scanner.py` | SQL 注入 | `python sqli_scanner.py https://target.com/product?id=1` |
| `ssrf_scanner.py` | SSRF 检测 | `python ssrf_scanner.py https://target.com/urlfetch` |
| `lfi_scanner.py` | LFI/RFI 检测 | `python lfi_scanner.py https://target.com/view?page=` |
| `cmdi_scanner.py` | 命令注入 | `python cmdi_scanner.py https://target.com/ping?ip=` |
| `ssti_scanner.py` | SSTI 检测 | `python ssti_scanner.py https://target.com/template` |
| `xml_injection.py` | XXE 检测 | `python xml_injection.py https://target.com/upload` |
| `open_redirect.py` | 开放重定向 | `python open_redirect.py https://target.com/redirect?url=` |
| `proto_pollution.py` | 协议污染 | `python proto_pollution.py https://target.com/api` |
| `race_tester.py` | 竞争条件 | `python race_tester.py https://target.com/redeem -c 20` |
| `upload_tester.py` | 文件上传 | `python upload_tester.py https://target.com/upload` |
#### 分析工具
| Tool | Description | Usage |
|------|------------|--------|
| `header_analyzer.py` | 安全头分析 | `python header_analyzer.py https://target.com` |
| `cors_scanner.py` | CORS 配置错误 | `python cors_scanner.py https://target.com/api` |
| `csp_bypass.py` | CSP 绕过 | `python csp_bypass.py https://target.com` |
| `jwt_analyzer.py` | JWT 攻击 | `python jwt_analyzer.py eyJ...` |
| `secret_scanner.py` | 查找密钥 | `python secret_scanner.py https://target.com` |
| `graphql_scanner.py` | GraphQL 测试 | `python graphql_scanner.py https://target.com/graphql` |
| `oauth_scanner.py` | OAuth 测试 | `python oauth_scanner.py https://target.com/oauth` |
| `web_scanner.py` | Web 漏洞 | `python web_scanner.py https://target.com` |
#### 特殊工具
| Tool | Description | Usage |
|------|------------|--------|
| `s3_scanner.py` | S3 存储桶 | `python s3_scanner.py bucket-name` |
| `bruteforce.py` | HTTP 暴力破解 | `python bruteforce.py target /login users.txt passwords.txt` |
| `heartbleed.py` | Heartbleed 漏洞 | `python heartbleed.py target.com 443` |
| `shellshock.py` | Shellshock 漏洞 | `python shellshock.py https://target.com/cgi-bin/test` |
| `subdomain_takeover.py` | 子域名接管 | `python subdomain_takeover.py subs.txt` |
| `enum_users.py` | 用户枚举 | `python enum_users.py target.com` |
| `fuzz.py` | 模糊测试 | `python fuzz.py https://target.com/api?param=FUZZ` |
| `cvss_calculator.py` | CVSS 计算 | `python cvss_calculator.py` |
#### 报告工具
| Tool | Description | Usage |
|------|------------|--------|
| `generate_csv.py` | 生成报告 | `python generate_csv.py --vuln XSS --target example.com` |
| `cvss_calculator.py` | CVSS 评分 | `python cvss_calculator.py` |
#### CVE 工具
| Tool | Description | Usage |
|------|------------|--------|
| `cve_finder.py` | 搜索 CVE | `python cve_finder.py nginx` |
| `cve_writer.py | 生成 CVE 报告 | `python cve_writer.py --product nginx --impact "RCE"` |
| `vuln_level.py` | 漏洞严重性扫描 | `python vuln_level.py target.com` |
#### 漏洞级别扫描器
| Tool | Description | Usage |
|------|------------|--------|
| `vuln_level.py` | 基于级别的漏洞扫描 | `python vuln_level.py target.com` |
### PowerShell 工具
```
# 侦察
.\tools\bug-hunter\recon.ps1 -Target example.com
# 扫描
.\tools\bug-hunter\scan.ps1 -Target example.com -Type all
.\tools\bug-hunter\scan.ps1 -Target example.com -Type xss
# 测试漏洞
.\tools\bug-hunter\test-idor.ps1 -Target https://api.example.com
.\tools\bug-hunter\test-ssrf.ps1 -Target https://example.com/webhook
.\tools\bug-hunter\test-xss.ps1 -Target https://example.com -Param q
# 特殊
.\tools\bug-hunter\test-api.ps1 -Target https://api.example.com -All
.\tools\bug-hunter\test-oauth.ps1 -Target https://example.com/oauth/authorize
.\tools\bug-hunter\test-mobile.ps1 -Target app.apk
# 报告
.\tools\bug-hunter\report.ps1 -Target example.com -VulnClass IDOR -Impact "data breach"
```
## 漏洞级别
### 严重性分类
| Level | Score | Description | Example |
|-------|-------|------------|---------|
| **CRITICAL** | 9.0-10.0 | 完全系统妥协 | 身份验证绕过 → 管理员,RCE |
| **HIGH** | 7.0-8.9 | 重大影响 | IDOR 写入,SQLi 数据泄露 |
| **MEDIUM** | 4.0-6.9 | 有限影响 | IDOR 读取 PII,存储型 XSS |
| **LOW** | 0.1-3.9 | 最小影响 | 自 XSS,信息泄露 |
| **INFO** | 0.0 | 无漏洞 | 横幅信息泄露 |
### 快速 CVSS 参考
| Vulnerability | Typical CVSS | Severity |
|-------------|-------------|----------|
| IDOR (read PII) | 6.5 | Medium |
| IDOR (write/delete) | 7.5 | High |
| Auth bypass → admin | 9.8 | Critical |
| Stored XSS | 5.4-8.8 | Medium-High |
| SQLi (data exfil) | 8.6 | High |
| SSRF (cloud metadata) | 9.1 | Critical |
| Race condition | 7.5 | High |
| GraphQL auth bypass | 8.7 | High |
| JWT none algorithm | 9.1 | Critical |
| Open redirect alone | 3.5 | Low |
| Self-XSS | 3.5 | Low |
### 严重性升级
同一漏洞在串联时可能升级为更高严重级别:
```
Open redirect + OAuth = Account Takeover (High)
Self-XSS + Login CSRF = Stored XSS (Medium)
SSRF (DNS only) + Internal proof = Internal access (Medium)
CORS wildcard + Credentials = Data theft (Medium)
Clickjacking + Sensitive action = Account action (Medium)
```
## CVE 查找与编写
### 查找 CVE
1. **Version Detection**
# 查找版本
python tools/python/fingerprint.py target.com
# 检查已知 CVE
curl -s "https://services.nvd.nist.gov/rest/json/cves/2.0?keywordSearch=TARGET_SOFTWARE"
2. **Common CVE Vectors**
- 过时的软件版本
- 已知易受攻击的参数
- 公开利用数据库
- 变更日志和安全公告
3. **发现新的 CVE**
- 零日研究
- 新型攻击向量
- 业务逻辑漏洞
- 配置问题
### CVE 编写格式
```
# CVE 提交格式
CVE ID: CVE-YYYY-XXXXX
## 描述
[Software name] [version] and earlier contains a [vulnerability type]
in [component] that allows [attacker] to [impact].
## 受影响版本
[Software name] [start version] through [end version]
## 参考
https://example.com/advisory
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-YYYY-XXXXX
## 致谢
Discovered by: [Your Name]
Date: [Discovery Date]
## 概念验证
[HTTP Request]
GET /vulnerable?param=PAYLOAD HTTP/1.1
Host: target.com
[Response]
HTTP/1.1 200 OK
[Payload executed]
## 时间线
Discovery Date: YYYY-MM-DD
Vendor Notified: YYYY-MM-DD
Patch Released: YYYY-MM-DD
CVE Assigned: YYYY-MM-DD
```
### CVE 资源
- [MITRE CVE](https://cve.mitre.org)
- [NVD](https://nvd.nist.gov)
- [Exploit-DB](https://exploit-db.com)
- [PacketStorm](https://packetstormsecurity.com)
- [Google Project Zero](https://bugs.chromium.org)
## 报告编写
### 报告模板
#### HackerOne 格式
```
# 标题
[ vuln class ] in [ endpoint/feature ] allows [ attacker ] to [ impact ]
## 摘要
[ 2-3 sentences: what it is, where it is, what attacker can do ]
## 复现步骤
1. [Step with exact HTTP request]
2. [Step]
3. [Step]
## 支持材料
[ Screenshot / video / PoC request ]
## 影响
An attacker can [ specific action ] resulting in [ specific harm ].
## 严重性评估
CVSS 3.1 Score: X.X ( severity )
Attack Vector: Network | Complexity: Low | Privileges: None | User Interaction: None
```
#### 快速报告生成器
```
python tools/python/generate_csv.py \
--vuln XSS \
--target example.com \
--endpoint /search?q= \
--poc "GET /search?q=" \
--severity Medium \
--impact "Execute JavaScript in user context"
```
### 影响陈述公式
### 人性化语气规则
✓ 以影响开头,而不是漏洞名称
✓ 像向开发者解释一样撰写
✓ 使用 "我发现..." 而不是 "发现了一个漏洞..."
✓ 一个具体的例子胜过三个抽象的句子
✓ 避免使用 "comprehensive/leverage/seamless/ensure"
✓ 句子中不使用破折号
### 60 秒提交前检查清单
- [ ] 标题符合公式:[Class] in [endpoint] allows [actor] to [impact]
- [ ] 第一句用纯英文说明确切的影响
- [ ] 重现步骤包含确切的 HTTP 请求
- [ ] 包含显示漏洞的响应
- [ ] 使用了两个测试账号
- [ ] 包含已计算的 CVSS 分数
- [ ] 推荐修复是一句话
- [ ] 端点路径没有拼写错误
- [ ] 报告少于 600 个词
- [ ] 严重性与描述的影响匹配
## 添加新技能
### 技能结构
```
skills/
├── skill-name/
│ ├── SKILL.md # Main content
│ ├── skills.yaml # Metadata
│ └── agent.yaml # (optional) Agent config
```
### SKILL.md 格式
```
name: skill-name
description: Skill description
trigger:
- trigger_word1
- trigger_word2
- trigger_word3
---
# 技能内容
## 第 1 节
Content here...
## 第 2 节
More content...
```
### skills.yaml 格式
```
name: skill-name
description: Skill description
trigger:
- trigger_word
- another_trigger
author: rikixz
version: 1.0.0
```
### 添加新工具
1. 在 `tools/python/` 中创建 Python 工具:
#!/usr/bin/env python3
"""
Tool Name
Usage: python tool.py
"""
import sys
import requests
def main():
if len(sys.argv) < 2:
print("Usage: python tool.py ")
sys.exit(1)
target = sys.argv[1]
# Tool logic here
print(f"[*] Testing {target}...")
if __name__ == "__main__":
main()
2. 添加到 `scripts/run.py` 以用于主启动器
## 命令参考
### 快速参考
```
# 快速扫描
python tools/python/fast_scanner.py target.com
# 完整侦察
python scripts/run.py recon target.com
# 扫描漏洞
python scripts/run.py xss "https://target.com/search?q=test"
python scripts/run.py sqli "https://target.com/product?id=1"
python scripts/run.py ssrf "https://target.com/urlfetch"
# 分析
python scripts/run.py header https://target.com
python scripts/run.py cors https://api.target.com
python scripts/run.py jwt eyJhbGciOi...
# 报告
python scripts/run.py report target.com IDOR /api/users "read data"
python tools/python/generate_csv.py --vuln XSS --target target.com
python tools/python/cvss_calculator.py
```
## 🚀 OpenCode 设置与用法
### 如何向 OpenCode 添加技能
OpenCode 会自动从 `skills/` 目录加载技能。以下是使用方法:
#### 1. Skill 目录结构
```
skills/
├── skill-name/
│ ├── SKILL.md # Required - Main skill content
│ ├── skills.yaml # Required - Skill metadata
│ └── agent.yaml # Optional - Agent configuration
```
#### 2. SKILL.md 格式(必需)
```
name: skill-name
description: Your skill description
trigger:
- trigger_word1
- trigger_word2
- 中文触发词
---
# 技能内容
## 第 1 节
Content here...
```
#### 3. skills.yaml 格式(必需)
```
name: skill-name
description: Skill description
trigger:
- trigger_word
- another_trigger
author: rikixz
version: 1.0.0
```
### 如何请求 OpenCode 使用工具
#### 🐛 基础漏洞赏金问题
```
"do recon on example.com"
"scan for XSS vulnerabilities"
"test for SQL injection in https://example.com/product?id=1"
"find subdomains"
"check security headers"
```
#### 🎯 特定漏洞测试
```
"test for IDOR in https://api.example.com/users"
"test for SSRF in https://example.com/webhook"
"test for XSS in https://example.com/search?q="
"check for open redirect in https://example.com/redirect"
"analyze JWT tokens"
```
#### 🔍 侦察问题
```
"what technologies does example.com use?"
"find all endpoints in https://api.example.com"
"enumerate subdomains"
"scan ports on target.com"
"directory scan"
```
#### 📊 分析问题
```
"analyze HTTP security headers"
"check CORS configuration"
"find secrets in JavaScript files"
"test GraphQL for vulnerabilities"
```
#### 💻 运行工具的指令
```
"run fast_scanner on example.com"
"run xss_scanner on https://example.com/search?q=test"
"run subdomain enumeration on target.com"
"run port scan on target.com"
```
### 自动使用技能
技能会根据关键词自动激活——只需自然提问:
```
# 与漏洞赏金相关
"我需要做漏洞赏金测试" → Activates bug-bounty skill
"do a security audit" → Activates web-audit skill
"test mobile app security" → Activates mobile-security skill
"check cloud security" → Activates cloud-security skill
# 特定漏洞
"test for IDOR" → IDOR testing tools
"find XSS" → XSS scanner
"check for SQLi" → SQLi scanner
```
### OpenCode AI 指令
#### 快速操作
```
"run recon on [target]" → Full recon
"quick scan [target]" → Fast scanner
"vuln scan [target]" → All vulns
"subdomain enum [target]" → Find subdomains
# 特定测试
"test XSS [url]"
"test SQLi [url]"
"test SSRF [url]"
"test IDOR [url]"
"test auth [url]"
# 分析
"scan headers [target]"
"check CORS [target]"
"analyze JWT [token]"
"fingerprint [target]"
```
### 按用户类型划分的工具类别
#### 👀 初级用户
```
# 只需询问!
"scan example.com"
"find vulnerabilities"
"check security"
# 或使用快速扫描器
python tools/python/fast_scanner.py target.com
```
#### 🔧 中级用户
```
# 特定漏洞测试
python tools/python/xss_scanner.py "https://target.com/search?q=test"
python tools/python/sqli_scanner.py "https://target.com/product?id=1"
python tools/python/header_analyzer.py https://target.com
# 使用主启动器
python scripts/run.py fast example.com
python scripts/run.py xss "https://target.com/search"
```
#### 🚀 高级用户
```
# 完整扫描套件
python tools/python/ALL.py scan target.com
python tools/python/ALL.py vuln target.com
# 使用特定焦点运行所有工具
python tools/python/ALL.py xss target.com
python tools/python/ALL.py sqli target.com
# 自定义工具组合
python tools/python/fast_scanner.py target.com && \
python tools/python/xss_scanner.py target.com && \
python tools/python/sqli_scanner.py target.com
```
### OpenCode CLI 参考
```
# PowerShell(Windows)
.\run.ps1 recon example.com
.\run.ps1 scan example.com -type xss
.\run.ps1 test xss https://example.com/search?q=test
# Python
python scripts/run.py fast example.com
python scripts/run.py xss "https://example.com/search?q=test"
# 直接工具
python tools/python/fast_scanner.py example.com
```
### 如何获取帮助
```
# 显示可用命令
python scripts/run.py
# 显示工具帮助
python tools/python/fast_scanner.py
# 显示 CVSS 参考
python tools/python/cvss_calculator.py
# 查找 CVE
python tools/python/cve_finder.py --help
```
### 快速命令速查表
| Action | Command |
|--------|---------|
| Quick Scan | `python ALL.py quick target.com` |
| Full Scan | `python ALL.py scan target.com` |
| Recon | `python fast_scanner.py target.com` |
| XSS Test | `python xss_scanner.py URL` |
| SQLi Test | `python sqli_scanner.py URL` |
| Headers | `python header_analyzer.py URL` |
| CORS | `python cors_scanner.py URL` |
| JWT | `python jwt_analyzer.py TOKEN` |
| CVE Search | `python cve_finder.py PRODUCT` |
| CVSS | `python cvss_calculator.py` |
| Report | `python generate_csv.py --vuln XSS --target domain` |
### 用户场景与提问方式
#### 📌 “我想扫描一个目标”
```
Just say: "scan example.com"
→ Runs fast_scanner.py
```
#### 📌 “我发现一个漏洞,需要编写报告”
```
Say: "generate report for XSS in /search on example.com"
→ Uses generate_csv.py
```
#### 📌 “这个漏洞的严重性是什么?”
```
Ask: "what CVSS score for IDOR?"
→ Shows cvss_calculator.py with typical scores
```
#### 📌 “检查目标是否易受 [v] 攻击”
```
Say: "check example.com for XSS"
→ Runs xss_scanner.py
```
#### 📌 “查找有关此软件的信息”
```
Ask: "search CVE for nginx"
→ Uses cve_finder.py
```
#### 📌 “审计此 Web 应用程序”
```
Say: "audit web application security"
→ Uses web_scanner.py + header_analyzer.py
```
### 技能触发关键词
| Trigger | Skills Activated |
|---------|----------------|
| 漏洞赏金 / bug bounty / recon | bug-bounty |
| web audit / code review / API | web-audit |
| mobile / Android / iOS | mobile-security |
| cloud / AWS / S3 / K8s | cloud-security |
| network / port / SMB | network-security |
| API / REST / GraphQL | api-security |
| red team / C2 / AD | red-team |
| report / CVSS / severity | report-writing |
| OSINT / Google hacking / email | osint |
### 与 AI 的示例对话
```
User: "I want to test this URL for SQL injection"
AI: "I'll run sql_injection scanner on that URL. Found 3 potential issues..."
User: "What's the severity of stored XSS in admin panel?"
AI: "Stored XSS with admin access typically scores 7.5-8.8 (High). CVSS..."
User: "Generate a bug bounty report for this IDOR"
AI: "I'll create a report with CVSS score 6.5 (Medium) using the template..."
User: "Search for known CVEs in WordPress"
AI: "Searching NVD database... Found CVE-2024-XXXX for WordPress..."
```
### 设置 OpenCode 集成
1. Clone or copy the bug-hunter directory:
```
git clone https://github.com/blaxkmiradev/bug-hunter.git
cd bug-hunter
```
2. Ensure Python dependencies are installed:
```
pip install -r scripts/requirements.txt
```
3. Add to your PATH or use absolute paths:
```
# 选项 1:添加到 PATH
export PATH="$PATH:/path/to/bug-hunter/tools/python"
# 选项 2:始终使用完整路径
python /path/to/bug-hunter/tools/python/fast_scanner.py target.com
```
4. For Windows PowerShell, use:
```
# 添加到 PATH
$env:PATH += ";C:\path\to\bug-hunter\tools\python"
# 或直接运行
& "C:\path\to\bug-hunter\run.ps1" recon target.com
```
## 致谢
### 创建者
**[rikixz](https://github.com/blaxkmiradev)** - [blaxkmiradev](https://github.com/blaxkmiradev)
GitHub: [github.com/blaxkmiradev](https://github.com/blaxkmiradev)
### 灵感来源
- Bug Bounty methodology from top hunters
- OWASP testing guide
- PortSwigger Web Security Academy
- Security community tools
### 使用的工具与资源
- ProjectDiscovery tools (nuclei, httpx, subfinder, katana)
- OWASP
- PortSwigger labs
- HackerOne disclosed reports
## 免责声明
This toolkit is for **authorized security testing only**. Always get proper
authorization before testing any system you don't own.
Using this toolkit against systems without authorization is illegal and
may result in legal action.
## 许可证
MIT License - Use at your own risk.
## 支持
- Issues: https://github.com/blaxkmiradev/bug-hunter/issues
- Stars: ⭐⭐⭐⭐⭐ (If you find it useful!)
**Made with 🔥 by [rikixz](https://github.com/blaxkmiradev)** | [blaxkmiradev](https://github.com/blaxkmiradev)
Happy Hunting! 🐛🔍
标签:AI合规, Bug Hunter, Conpot, Go开发, HTTP探测, PowerShell安全工具, Python安全工具, Python开发, Windows安全, 子域名枚举, 安全专业, 安全工作流, 安全工具包, 安全报告, 安全测试, 开源安全工具, 攻击性安全, 日志审计, 系统安全, 网络安全, 逆向工具, 逆向工程平台, 隐私保护