Bug Bounty Recon Scanner
Pricing
from $0.20 / 1,000 results
Bug Bounty Recon Scanner
Find exposed admin panels, missing/weak security headers, sensitive file leaks, and HTTPS misconfigurations across target domains. Export prioritised risk scores and JSON reports. Run via API, schedule scans, or integrate with bug bounty tools.
Pricing
from $0.20 / 1,000 results
Rating
0.0
(0)
Developer

Isaac Muendo
Actor stats
0
Bookmarked
5
Total users
2
Monthly active users
17 days ago
Last modified
Categories
Share
Production-ready attack surface mapper for bug bounty hunters, red teams, and DevSecOps. Discovers exposed admin panels, missing security headers, sensitive files, and HTTPS issues across domains. Built in with robust error handling, SSL bypass, and dataset export.
π― What It Does
The Bug Bounty Recon Scanner crawls your target domains and automatically flags high-impact vulnerabilities:
- Exposed Admin Panels (
/admin,/wp-admin,/login,/dashboard) - no auth required - Missing Security Headers (HSTS, CSP, X-Frame-Options, Referrer-Policy, X-Content-Type-Options)
- Sensitive File Exposure (
.env,config.json,backup.sql,.git/HEAD) - HTTPS Issues (expired certs, HTTP fallback, weak configs)
- Page Analysis (admin detection, sensitive content regex, form detection)
Perfect for: HackerOne, Bugcrowd, Intigriti hunters needing fast recon on new invites.
π Key Features
| Feature | Status | Bounty Impact |
|---|---|---|
| 22+ Admin Paths | β Live | A1:2025 Broken Access Control |
| 6 Security Headers | β Scored 0-30 | A5:2025 Security Misconfiguration |
| Risk Scoring | β 0-100 per URL | Prioritization |
| SSL Bypass | β
ignoreHTTPSErrors | Expired cert scanning |
| Error Resilience | β Network failures β dataset | 100% completion |
| Dataset Views | β High-risk filtering | Apify Console |
βοΈ Technical Specs
β PlaywrightCrawler (Crawlee 3.15.3)β maxConcurrency: 2 (stable)β maxRequestRetries: 1 (fast fail)β 45 req/min rate limitβ 25s navigation timeoutβ 2GB RAM / 1 CPU (production)β Python analyzer (pandas)
πͺ Quick Start
Apify Console (Recommended)
- Deployed Actor
- Input β Run β View Dataset
π Input Configuration
| Parameter | Type | Description | Default |
|---|---|---|---|
startUrls | array[{url:string}] | Required [{"url": "https://target.com"}] | [] |
adminPaths | array[string] | ["/admin", "/.env", "/config"] | 22 paths |
maxDepth | integer | Link crawling (0=disable) | 2 |
maxRequests | integer | Total limit | 500 |
checkXSS | boolean | Form reflection test | true |
proxyConfiguration | object | Apify Proxy (RESIDENTIAL) | {} |
Example Input:
{"startUrls": [{"url": "https://example.com"},{"url": "https://google-gruyere.appspot.com"}],"maxRequests": 100,"adminPaths": ["/admin", "/.env", "/config", "/login"]}
π Sample Output
{"url": "https://im.com/admin","status": 200,"type": "page","isHttps": true,"riskScore": 30,"riskTags": ["sensitive_leak", "missing_headers"],"headerFindings": {"strict-transport-security": {"status": "missing", "score": 0}},"pageFindings": {"isSensitive": true},"timestamp": "2025-12-12T17:00:00Z"}
Dataset Views (Apify Console):
- High Risk (
riskScore >= 70) - Exposed Admins (
exposed_admintag) - Network Errors (SSL failures, timeouts)
π₯ Who Benefits
| Role | Use Case |
|---|---|
| Bug Bounty Hunters | Map attack surface for HackerOne/Bugcrowd invites |
| Red Teamers | Engagement scoping + initial foothold discovery |
| DevSecOps | Pre-prod hardening audits across staging/prod |
| Pen Testers | Quick vuln discovery before Nuclei/ZAP deep scans |
| SREs | Monitor 3rd-party vendors for security drift |
βοΈ Legal & Ethical Use
β Authorized targets only:
- Domains you own
- Bug bounty program scopes
- Authorized pentest engagements
- Your staging/prod environments
β Never scan:
- Random websites
- Competitor domains
- Without explicit permission
Rate limited to 45 req/min with 3 concurrent browsers to respect targets.
π Integrations (Upcoming)
Dataset β Burp Suite (JSON import)β Nuclei templates (endpoint discovery)β Slack/Zapier (high-risk webhook)β Google Sheets (team sharing)β GitHub Issues (vuln tracking)
π οΈ File Structure
bug_bounty_recon_scanner/βββ .actor/β βββ actor.json # Actor metadataβ βββ input_schema.json # Input form schemaβ βββ output_schema.json # Output validationβ βββ dataset_schema.json # Dataset viewsβββ src/β βββ main.js # Crawlee + Playwright coreβββ Dockerfile # Node + Playwright + Pythonβββ package.json # Dependenciesβββ README.md # This file
π Troubleshooting
| Issue | Solution |
|---|---|
| SSL Errors | Auto-bypassed (ignoreHTTPSErrors: true) |
| Network Timeouts | Dataset entry with network_error |
| Memory | 2GB allocated |
| No Proxy | apify login β RESIDENTIAL |
π Dataset Views
- High Risk (
riskScore >= 70) - Exposed Admins (
riskTags contains "exposed_admin") - Missing Headers (
missing_headerstag) - Dataset Export β JSON/CSV/Excel
π€ Support
- Issues: Apify Console β Issues tab
- Telegram β
t.me/Iamuendo - Custom requests: Contact via Apify messaging
π Changelog
| Version | Date | Changes |
|---|---|---|
0.1.7 | 2025-12-12 | Initial release |
0.2 | Soonβ’ | WAF bypass + more paths |
Built with β€οΈ for the bug bounty community. Happy hunting!
Respect robots.txt | Stay legal | Report responsibly