Hacksys Bug Bounty
Hacksys Bug Bounty
_________________________________________________________________________
_________________________________________________________________________
___________________________________________
##subdomain ennumiration tools ..... A subdomain enumeration tool that
helps identify potential entry points for attacks.
@#These tools help you find subdomains, which are like little corners
of a website you might overlook.
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------
##Active subdomains..... A active dommains tool that helps to identify
active domains bypass FP and errors
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------
##url ennumiration.......its help to find all urls of each sundomain
@#these tools helps you to find all endpoints and urls for
xss,sqli,lfi,rce,js,pdf,woff,woff2,css,html,php,jpg,gpeg
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------
##screenshoting.... this tool helps you to save your westing time to
cheack each and every subdomain testing
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------
##portscaning......check every subdomain, which services running on
portss
@#In addition to finding URLs and subdomains, you’ll need to figure out
what ports are available and what applications a server is running
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------
##RECONNAISSANCE......
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------
##sql injection......
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------##WEB PROXIES
-------------------------------------------------------------------------
-------------------------------------------------------------------------
-------------------------------------------
##HACKING TOOLS.....
Conclusion:
In this Bug Bounty series, I’ll dive deeper into each tool and strategy.
Stay tuned for our next video on youtub, where I’ll explain methodologies
and documentation in more detail. Don’t hesitate to share your thoughts
or questions in the comments or on social media. Let’s work together to
make the internet a safer place.!