Awesome
<h1 align="center"> <a href="https://github.com/M4xSec"><img src="https://user-images.githubusercontent.com/57313495/121189007-e74fa100-c826-11eb-9806-3490d447cf53.png" alt="BugDog"></a> <h4 align="center">BUG HUNTING BEAST xXx</h4> <br> </h1>ScreenShotsπ¨πΌβπ»
PRIV8 TOOL!! TO PREVENT MISUSE ;( CONTACT US FOR PASSWORD (CLICK ON IMAGEππ)-
<h1> <a href="https://corruptsec.net/"><img src="https://user-images.githubusercontent.com/57313495/121188698-98097080-c826-11eb-972c-119c82f8f073.png" alt="* corruptsec.net"></a> </h1> <h1> * predator0x300@gmail.com </h1>INSTALLATION [ KALI ]π₯π₯π₯
=========
NOTE: BugDog is made with python and requires python2 to run perfectly.
pip2 install dnspython keyboard
python Bugdog.py
Usage ππ»ββοΈ
-
python Bugdog.py
{+} BugDog Features
-
!!! ALSO SUPPORTS BURP Collaborator FOR ADVANCE BUG HUNTING ;) !!!
-
Bugs Hunting
- ~ Sql Blind Time-Bassed [GET]
- ~ Sql Blind Time-Bassed Via Header
- ~ Cross site Scripting [XSS]
- ~ PHP CODE INNJECTION & OS COMAND INNJECTION
- ~ Server Side Template Injection [SSTI]
- ~ Open Redirection
- ~ RFI & Local File Inclusion
- ~ Host Header Injection
- ~ Cross-origin resource sharing (CORS)
- ~ Server-side request forgery (SSRF)
-
Enumeration
- ~ Subdomain Active Scanning
- ~ Subdomain Passive
- ~ Nmap Scan Ports
-
Fuzzing and Discovery
- ~ Response Validator
- ~ SubDomain TakeOver
- ~ Web Crawlers
- ~ Hidden Parameter Discovery
You have Custom Payloads?
- cool! you can add them easily by adding them into the script under the pre-defined payloads sections!
TESTED ON FOLLOWING:ππ»-
- Kali Linux - 2020.1a (version)ππ»
- Parrot OS - Rolling Edition (version)
- Ubuntu
- Arch Linux
LANGUAGE
- Python
Contact For Contribute & Issues π²
EMAIL FOR ISSUES AND CONTRIBUTE : predator0x300@gmail.com
DISCLAIMER π‘π‘π‘
TO BE USED FOR EDUCATIONAL PURPOSES ONLY
The use of the "BugDog" is COMPLETE RESPONSIBILITY of the END-USER. Developers assume NO liability and are NOT responsible for any misuse or damage caused by this program.