ENNAENNA
Recipes

Tool Chains

Tools that work best together. Each chain is a copy-paste pipeline you can run right now.

Subdomain Discovery to Vulnerability Scan

Find subdomains, probe for live hosts, then scan for vulnerabilities. The most common bug bounty pipeline.

$ subfinder -d target.com -silent | httpx -silent | nuclei -as
reconbug-bountyautomation

Port Scan to Service Exploitation

Discover open ports and services, then search for matching exploits. Classic pentest workflow.

$ nmap -sV -oX scan.xml target && searchsploit --nmap scan.xml
pentestexploitationrecon

Web Crawl to Parameter Discovery

Crawl a web app, extract parameters from archived URLs, then fuzz them for hidden endpoints.

$ katana -u https://target.com -jc -d 3 | sort -u | tee urls.txt && cat urls.txt | grep '=' | ffuf -w - -u FUZZ
webfuzzingparameters

AD Recon to Domain Admin

Map Active Directory attack paths, extract Kerberos tickets, then move laterally to domain admin.

$ SharpHound.exe -c All && Rubeus.exe kerberoast /outfile:hashes.txt
active-directoryred-teamkerberos

Email to Full OSINT Profile

Start with an email address and build a complete profile: registered accounts, phone, social media, and data breaches.

$ holehe target@email.com && theharvester -d email.com -b all && sherlock username
osintemailsocial-media

Container Scan to Escape

Scan container images for vulnerabilities, check runtime config, then test for escape paths.

$ trivy image target:latest && cdk evaluate
containersdockerkubernetes

WiFi Handshake Capture to Crack

Capture WPA handshakes from nearby networks, then crack them offline with GPU acceleration.

$ airodump-ng wlan0mon && aircrack-ng -w wordlist.txt capture.cap
wirelesscrackingwpa

Wallet Address to Transaction Graph

Index blockchain data locally, then trace fund flows and cluster related addresses.

$ cryo transactions --blocks 18M:18.1M && chifra export 0xaddress --fmt json
blockchaintracingforensics

APK Decompile to Secret Extraction

Decompile an Android APK, search for hardcoded secrets, then hook the app at runtime to bypass protections.

$ apkleaks -f app.apk && jadx -d output/ app.apk && frida -U -l hook.js com.target.app
mobileandroidsecrets

Cloud Asset Discovery to Exploitation

Enumerate cloud resources, find exposed storage buckets and misconfigured IAM, then simulate attacks.

$ cloudfox aws all-checks && s3scanner --bucket-file buckets.txt
cloudawsiam

Log Analysis to Forensic Timeline

Parse Windows event logs for suspicious activity, then build a visual timeline for the investigation.

$ hayabusa csv-timeline -d logs/ -o timeline.csv && log2timeline.py plaso.dump logs/
dfirlogstimeline

Domain Typosquat Detection to Analysis

Generate domain permutations, check which are registered, then capture screenshots for evidence.

$ dnstwist -r -w domain.com | tee results.csv && eyewitness --web -f urls.txt
phishingbrand-protectiondetection