Tool Chains
Tools that work best together. Each chain is a copy-paste pipeline you can run right now.
Subdomain Discovery to Vulnerability Scan
Find subdomains, probe for live hosts, then scan for vulnerabilities. The most common bug bounty pipeline.
$ subfinder -d target.com -silent | httpx -silent | nuclei -asPort Scan to Service Exploitation
Discover open ports and services, then search for matching exploits. Classic pentest workflow.
$ nmap -sV -oX scan.xml target && searchsploit --nmap scan.xmlWeb Crawl to Parameter Discovery
Crawl a web app, extract parameters from archived URLs, then fuzz them for hidden endpoints.
$ katana -u https://target.com -jc -d 3 | sort -u | tee urls.txt && cat urls.txt | grep '=' | ffuf -w - -u FUZZAD Recon to Domain Admin
Map Active Directory attack paths, extract Kerberos tickets, then move laterally to domain admin.
$ SharpHound.exe -c All && Rubeus.exe kerberoast /outfile:hashes.txtEmail to Full OSINT Profile
Start with an email address and build a complete profile: registered accounts, phone, social media, and data breaches.
$ holehe target@email.com && theharvester -d email.com -b all && sherlock usernameContainer Scan to Escape
Scan container images for vulnerabilities, check runtime config, then test for escape paths.
$ trivy image target:latest && cdk evaluateWiFi Handshake Capture to Crack
Capture WPA handshakes from nearby networks, then crack them offline with GPU acceleration.
$ airodump-ng wlan0mon && aircrack-ng -w wordlist.txt capture.capWallet Address to Transaction Graph
Index blockchain data locally, then trace fund flows and cluster related addresses.
$ cryo transactions --blocks 18M:18.1M && chifra export 0xaddress --fmt jsonAPK Decompile to Secret Extraction
Decompile an Android APK, search for hardcoded secrets, then hook the app at runtime to bypass protections.
$ apkleaks -f app.apk && jadx -d output/ app.apk && frida -U -l hook.js com.target.appCloud Asset Discovery to Exploitation
Enumerate cloud resources, find exposed storage buckets and misconfigured IAM, then simulate attacks.
$ cloudfox aws all-checks && s3scanner --bucket-file buckets.txtLog Analysis to Forensic Timeline
Parse Windows event logs for suspicious activity, then build a visual timeline for the investigation.
$ hayabusa csv-timeline -d logs/ -o timeline.csv && log2timeline.py plaso.dump logs/Domain Typosquat Detection to Analysis
Generate domain permutations, check which are registered, then capture screenshots for evidence.
$ dnstwist -r -w domain.com | tee results.csv && eyewitness --web -f urls.txt