Cyber security

BugBlaze : Your All-In-One Cybersecurity Toolkit

In the world of cybersecurity, staying ahead of potential threats is essential.

BugBlaze is a powerful toolkit that simplifies the process of subdomain enumeration, DNS resolution, port scanning, and vulnerability scanning.

In this article, we’ll explore how BugBlaze can enhance your security efforts and provide a comprehensive overview of its features and usage.

Continuous Reconnaissance And Vulnerability Scanning For Bug Bounties

Requirements

Installation

https://github.com/0xPugazh/BugBlaze
cd BugBlaze
chmod +x setup.sh bugblaze.sh
./bugblaze.sh

Usage

./bugblaze.sh domain.com

Tools Included

  • Subdomain enumeration (Subfinder, Amass, Shuffledns)
  • DNS resolving ( PureDNS)
  • Port scanning (Naabu)
  • Vulnerability Scanning (Nuclei)
  • Resolvers (trickest)
  • Wordlists (n0kovo_subdomains)

Note

  • Confifure you api tokens in subfinder and amass config file for more subdomains
  • Add your telergam/discord/slack token in notify config file for notifications
  • If you want to use custom wordlists and resovers, change variable path in bugblaze.sh (line 32,33,34)
Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 week ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 weeks ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

3 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

3 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

3 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 weeks ago