HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It allows you to customize the tools list and automate reconnaissance, scanning, exploitation, and post-exploitation analysis.
✅ Automated Bug Bounty Process – Scans, exploits, and gathers information with just one command.
✅ Concurrent Execution – Runs multiple tools in parallel to save time.
✅ Customizable Tools List – Modify tools-list.txt
or provide your own list.
✅ Automatic Tool Detection – Skips missing tools instead of terminating.
✅ Supports Multiple Cybersecurity Tools – Nmap, Nikto, SQLMap, and more.
✅ Help and Version Options – Easily check usage details and version info.
- Runs bug bounty tools based on the tools list.
- Accepts domain input and custom tools file.
- Checks for missing tools and skips them.
- Executes commands concurrently.
- Contains a list of security tools and their commands.
- Can be modified to add or remove tools.
- Installs all required bug bounty tools.
- Supports package managers like
apt
,go
, andpip
.
git clone https://github.com/YogSec/HACKING_BOT.git
cd HACKING-BOT
pip install termcolor
chmod +x install_tools.sh
./install_tools.sh
python main.py -d example.com
python main.py -d <domain>
Example:
python main.py -d google.com
Option | Description |
---|---|
-h |
Show help menu |
-v |
Show version info |
-d <domain> |
Specify the target domain |
-c <file> |
Use a custom tools list file |
Example using a custom tools file:
python main.py -d example.com -c advanced-tools.txt
✅ Reconnaissance – Discover subdomains, live hosts, and information about the target.
✅ Port Scanning – Identify open ports and services running on them.
✅ Web Scanning – Detect security vulnerabilities in web applications.
✅ Directory & File Enumeration – Find hidden files and directories.
✅ Vulnerability Scanning – Identify SQLi, XSS, and other vulnerabilities.
✅ Exploitation & Post-Exploitation – Run attacks and gather historical data.
# Reconnaissance
subfinder -d (domain here) -o subdomains.txt
amass enum -d (domain here) -o amass_output.txt
cat subdomains.txt | httprobe > live_hosts.txt
# Port Scanning
nmap -p- -T4 -A -v (domain here) -oN nmap_scan.txt
Modify this file to add more tools!
Hello, Hacker! 👋 We'd love to stay connected with you. Reach out to us on any of these platforms and let's build something amazing together:
🌐 Website: https://yogsec.github.io/yogsec/
📜 Linktree: https://linktr.ee/yogsec
🔗 GitHub: https://github.com/yogsec
💼 LinkedIn (Company): https://www.linkedin.com/company/yogsec/
📷 Instagram: https://www.instagram.com/yogsec.io/
🐦 Twitter (X): https://x.com/yogsec
👨💼 Personal LinkedIn: https://www.linkedin.com/in/bug-bounty-hunter/
📧 Email: abhinavsingwal@gmail.com
If you find our work helpful and would like to support us, consider buying us a coffee. Your support keeps us motivated and helps us create more awesome content. ❤️
☕ Support Us Here: https://buymeacoffee.com/yogsec
Thank you for your support! 🚀
Feel free to contribute by submitting pull requests or reporting issues! 😊
This tool is for educational and legal penetration testing purposes only. The author is not responsible for misuse.
💻 Developed by YogSec | 🚀 Stay Secure!