bug_bounty_workflow
Automate bug bounty reconnaissance by discovering subdomains, scanning ports, probing HTTP services, crawling websites, and detecting vulnerabilities in a unified workflow.
Instructions
Execute complete bug bounty reconnaissance workflow: subdomain discovery, DNS resolution, port scanning, HTTP probing, crawling, and vulnerability scanning
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| domain | Yes | Target domain for bug bounty reconnaissance | |
| portScan | No | Include port scanning (default: true) | |
| crawl | No | Include web crawling (default: true) | |
| vulnerabilityScan | No | Include vulnerability scanning (default: true) | |
| severityFilter | No | Nuclei severity filter (critical, high, medium, low) | |
| maxCrawlUrls | No | Maximum URLs to crawl (default: 10) | |
| maxScanUrls | No | Maximum URLs to scan with Nuclei (default: 20) | |
| maxTopPorts | No | Maximum top ports for Naabu (default: 100) | |
| batchSize | No | Batch size for DNS/HTTP requests (default: 50) | |
| delayBetweenBatches | No | Delay in milliseconds between batches (default: 1000) | |
| crawlDepth | No | Crawl depth for Katana (default: 2) |