BOOK THIS SPACE FOR AD
ARTICLE ADTired of wasting time sorting through endless subdomains, status codes, and vhosts? In bug bounty hunting, time is money, and automation is your best weapon. Instead of spending hours manually filtering data, let these scripts do the heavy lifting for you. This guide covers smart automation techniques to enhance your workflow and boost efficiency in bug bounty recon. 🚀
When dealing with large lists of subdomains, it’s useful to categorize them based on response details. You can use httpx for scanning and awk for organizing results.
Step 1: Scan Subdomains with httpx
cat domains.txt | httpx -server -vhost -sc > httpx-output.txt✅ Why this matters: This command extracts status codes, server types, and vhost info in one go.
Step 2: Categorize Results with awk
Use the following awk script to sort results into different files:
awk '{gsub(/\x1b\[[0-9;]*m/, "");
status=$2; gsub(/[\[\]]/, "", status);
server=$3; gsub(/[\[\]]/, "", server);
safe_server=server; gsub(/[^a-zA-Z0-9_-]/, "_", safe_server);
main_server=server; sub(/\/.*/, "", main_server);
gsub(/[^a-zA-Z0-9_-]/, "_", main_server);
vhost=$4; gsub(/[\[\]]/, "", vhost);
if (server=="") print > "server-not-specified.txt";
else {
print > (safe_server ".txt");
print > (main_server ".txt");
}
if (vhost=="vhost") print > "vhost.txt";
}' httpx-output.txt
✅ Why this matters:
Server-based sorting — Results are saved in files named after detected servers.Vhost detection — Identifies potential virtual hosts.Status code tracking — Helps filter for live or vulnerable endpoints.1. Automate Subdomain Enumeration
Instead of running multiple tools manually, combine them: