Skip to content

SnailHunter is a fully automated bug bounty hunting platform that combines traditional security tools with AI-powered analysis.

Notifications You must be signed in to change notification settings

SnailSploit/SnailHunter

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Python AI License Bug Bounty

   _____ _   _          _____ _      _    _ _    _ _   _ _______ ______ _____
  / ____| \ | |   /\   |_   _| |    | |  | | |  | | \ | |__   __|  ____|  __ \
 | (___ |  \| |  /  \    | | | |    | |__| | |  | |  \| |  | |  | |__  | |__) |
  \___ \| . ` | / /\ \   | | | |    |  __  | |  | | . ` |  | |  |  __| |  _  /
  ____) | |\  |/ ____ \ _| |_| |____| |  | | |__| | |\  |  | |  | |____| | \ \
 |_____/|_| \_/_/    \_\_____|______|_|  |_|\____/|_| \_|  |_|  |______|_|  \_\

🐌 Hunt Smarter, Not Harder 🎯

AI-Powered Bug Bounty Hunting Automation Platform
Let AI do the heavy lifting while you collect the bounties.

Features β€’ Quick Start β€’ Usage β€’ Architecture β€’ Tools


πŸ”₯ What is SnailHunter?

SnailHunter is a fully automated bug bounty hunting platform that combines traditional security tools with AI-powered analysis. It orchestrates reconnaissance, discovery, vulnerability scanning, false positive filtering, and generates submission-ready reports.

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                                                                            β”‚
β”‚   TARGET  ──►  RECON  ──►  DISCOVERY  ──►  SCAN  ──►  VALIDATE  ──►  πŸ“   β”‚
β”‚                                                                            β”‚
β”‚   example.com   πŸ”         πŸ—ΊοΈ              🎯         πŸ€–           REPORT  β”‚
β”‚                                                                            β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Why SnailHunter?

Problem SnailHunter Solution
πŸ”„ Manual tool orchestration Automated 6-stage pipeline
🚨 False positive overload AI-powered FP filtering with confidence scores
πŸ“ Report writing takes forever Auto-generated submission-ready reports
πŸ”— Missing vulnerability chains AI detects SSRFβ†’RCE, XSSβ†’ATO patterns
⏰ Wasted time on duplicates Smart deduplication and chain detection

✨ Features

🎯 Full Pipeline Automation

# One command. Full scan. Reports generated.
snailhunter scan example.com -p "HackerOne Program"

πŸ€– AI-Powered Analysis

  • False Positive Filtering - Confidence scoring (0-100%)
  • Vulnerability Chaining - Detects exploitable chains automatically
  • CVSS v3.1 Calculation - With full justification
  • Report Enhancement - Business impact framing

πŸ”§ Tool Integration

Orchestrates best-in-class security tools:

Tool Purpose Status
Nuclei Template-based scanning βœ… Integrated
SQLMap SQL injection βœ… Integrated
Dalfox XSS scanning βœ… Integrated
ffuf Content discovery βœ… Integrated
httpx HTTP probing βœ… Integrated
subfinder Subdomain enum βœ… Integrated

πŸ“Š Beautiful CLI Output

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ 🎯 Hunt Results                                                 β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ πŸ“Š Statistics                                                   β”‚
β”‚    β”œβ”€β”€ Duration: 142.3s                                         β”‚
β”‚    β”œβ”€β”€ Targets scanned: 47                                      β”‚
β”‚    └── Total findings: 12                                       β”‚
β”‚                                                                 β”‚
β”‚ πŸ”₯ Severity Breakdown                                           β”‚
β”‚    β”œβ”€β”€ Critical: 2                                              β”‚
β”‚    β”œβ”€β”€ High: 4                                                  β”‚
β”‚    └── Medium: 6                                                β”‚
β”‚                                                                 β”‚
β”‚ ⛓️  Vulnerability Chains                                        β”‚
β”‚    └── Cloud Takeover Chain (critical)                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ πŸŽ‰ NICE! High-value findings detected!                          β”‚
β”‚ Review the reports and prepare your submissions.                 β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸš€ Quick Start

Installation

# Clone the repository
git clone https://github.com/SnailSploit/TheMothership.git
cd TheMothership

# Install SnailHunter
pip install -e .

# Set up your API key (for AI features)
cp .env.example .env
# Edit .env and add your ANTHROPIC_API_KEY or OPENAI_API_KEY

# Check tool status
snailhunter tools

Install External Tools

# Go-based tools (requires Go 1.21+)
go install github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest
go install github.com/projectdiscovery/httpx/cmd/httpx@latest
go install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install github.com/ffuf/ffuf/v2@latest
go install github.com/hahwul/dalfox/v2@latest

# Python tools
pip install sqlmap

First Hunt

# Full automated scan
snailhunter scan bugcrowd-target.com -p "Target Program"

# View results
ls ./output/

πŸ“– Usage

Full Pipeline Scan

# Basic scan
snailhunter scan example.com

# With program name (for report metadata)
snailhunter scan example.com -p "HackerOne - Example"

# Focus on critical/high severity
snailhunter scan example.com --severity critical,high

# With specific Nuclei tags
snailhunter scan example.com --tags cve,rce,sqli

# Passive only (no active scanning)
snailhunter scan example.com --passive-only

# Skip reconnaissance (direct scanning)
snailhunter scan https://api.example.com --skip-recon

# JSON output for scripting
snailhunter scan example.com --json

Individual Stages

# Reconnaissance only
snailhunter recon example.com
snailhunter recon example.com --passive -o recon.json

# Content discovery
snailhunter discover https://example.com
snailhunter discover https://example.com -i thorough

# Validate findings file
snailhunter validate findings.json --threshold 0.7

# Generate report for a finding
snailhunter report FINDING_ID -f hackerone -o report.md

Management Commands

# View configuration
snailhunter config

# Check installed tools
snailhunter tools

# View scan history
snailhunter history -n 20

πŸ—οΈ Architecture

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                              SNAILHUNTER                                    β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚                                                                             β”‚
β”‚  β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”  β”‚
β”‚  β”‚  SCOPE  │──►│  RECON  │──►│ DISCOVERY │──►│ SCANNING│──►│ VALIDATION β”‚  β”‚
β”‚  β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜  β”‚
β”‚       β”‚             β”‚              β”‚              β”‚              β”‚          β”‚
β”‚       β–Ό             β–Ό              β–Ό              β–Ό              β–Ό          β”‚
β”‚   Parse scope   Subdomains    Directories    Nuclei        AI FP Filter    β”‚
β”‚   HackerOne     Live hosts    Parameters     SQLMap        Chain detect    β”‚
β”‚   Bugcrowd      Tech stack    API endpoints  Dalfox        CVSS scoring    β”‚
β”‚                                                                    β”‚        β”‚
β”‚                                                                    β–Ό        β”‚
β”‚                                                            β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”   β”‚
β”‚                                                            β”‚ REPORTING  β”‚   β”‚
β”‚                                                            β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜   β”‚
β”‚                                                                    β”‚        β”‚
β”‚                                                                    β–Ό        β”‚
β”‚                                                            Markdown/JSON    β”‚
β”‚                                                            HackerOne fmt    β”‚
β”‚                                                            Bugcrowd fmt     β”‚
β”‚                                                                             β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  TOOLS         β”‚  AI PROVIDERS    β”‚  STORAGE       β”‚  OUTPUT               β”‚
β”‚  ───────────   β”‚  ─────────────   β”‚  ───────       β”‚  ──────               β”‚
β”‚  Nuclei        β”‚  Anthropic       β”‚  SQLite        β”‚  Markdown reports     β”‚
β”‚  SQLMap        β”‚  OpenAI          β”‚  JSON files    β”‚  JSON exports         β”‚
β”‚  Dalfox        β”‚  Ollama          β”‚                β”‚  Platform formats     β”‚
β”‚  ffuf          β”‚                  β”‚                β”‚                       β”‚
β”‚  httpx         β”‚                  β”‚                β”‚                       β”‚
β”‚  subfinder     β”‚                  β”‚                β”‚                       β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Pipeline Stages

Stage Description Tools Used
1. Scope Parse program rules, extract targets Custom parser
2. Recon Subdomain enum, live host detection, tech fingerprinting subfinder, httpx
3. Discovery Content discovery, parameter mining, API detection ffuf, custom
4. Scanning Vulnerability scanning with multiple tools nuclei, sqlmap, dalfox
5. Validation AI-powered FP filtering, chain detection, CVSS Claude/GPT
6. Reporting Generate submission-ready reports AI-enhanced

πŸ”§ Configuration

Environment Variables

# LLM Provider (anthropic, openai, ollama)
SNAILHUNTER_LLM_PROVIDER=anthropic

# API Keys
SNAILHUNTER_ANTHROPIC_API_KEY=sk-ant-...
SNAILHUNTER_OPENAI_API_KEY=sk-...

# Model selection
SNAILHUNTER_LLM_MODEL=claude-sonnet-4-20250514

# Rate limiting (requests per second)
SNAILHUNTER_RATE_LIMIT_REQUESTS_PER_SECOND=10

# Database path
SNAILHUNTER_DB_PATH=./data/snailhunter.db

# Logging
SNAILHUNTER_LOG_LEVEL=INFO

Using with Ollama (Local AI)

# Start Ollama
ollama serve

# Pull a model
ollama pull llama3

# Configure SnailHunter
export SNAILHUNTER_LLM_PROVIDER=ollama
export SNAILHUNTER_LLM_MODEL=llama3
export SNAILHUNTER_OLLAMA_BASE_URL=http://localhost:11434

# Run without cloud AI
snailhunter scan example.com

πŸ“ Project Structure

TheMothership/
β”œβ”€β”€ src/snailhunter/
β”‚   β”œβ”€β”€ cli.py              # πŸ–₯️  CLI with rich output
β”‚   β”œβ”€β”€ core/
β”‚   β”‚   β”œβ”€β”€ pipeline.py     # πŸ”„ Main orchestrator
β”‚   β”‚   β”œβ”€β”€ config.py       # βš™οΈ  Settings management
β”‚   β”‚   └── state.py        # πŸ’Ύ SQLite persistence
β”‚   β”œβ”€β”€ stages/
β”‚   β”‚   β”œβ”€β”€ scope.py        # πŸ“‹ Scope parsing
β”‚   β”‚   β”œβ”€β”€ recon.py        # πŸ” Reconnaissance
β”‚   β”‚   β”œβ”€β”€ discovery.py    # πŸ—ΊοΈ  Content discovery
β”‚   β”‚   β”œβ”€β”€ scanning.py     # 🎯 Vulnerability scanning
β”‚   β”‚   β”œβ”€β”€ validation.py   # πŸ€– AI validation
β”‚   β”‚   └── reporting.py    # πŸ“ Report generation
β”‚   β”œβ”€β”€ tools/
β”‚   β”‚   β”œβ”€β”€ nuclei.py       # Nuclei wrapper
β”‚   β”‚   β”œβ”€β”€ sqlmap.py       # SQLMap wrapper
β”‚   β”‚   β”œβ”€β”€ dalfox.py       # Dalfox wrapper
β”‚   β”‚   β”œβ”€β”€ ffuf.py         # ffuf wrapper
β”‚   β”‚   β”œβ”€β”€ httpx_tool.py   # httpx wrapper
β”‚   β”‚   └── subfinder.py    # subfinder wrapper
β”‚   β”œβ”€β”€ ai/
β”‚   β”‚   β”œβ”€β”€ llm.py          # 🧠 LLM abstraction
β”‚   β”‚   └── prompts/        # πŸ“œ AI prompt templates
β”‚   └── models/
β”‚       β”œβ”€β”€ finding.py      # Finding dataclass
β”‚       └── target.py       # Target dataclass
β”œβ”€β”€ tests/                  # πŸ§ͺ Test suite
β”œβ”€β”€ pyproject.toml          # πŸ“¦ Package config
β”œβ”€β”€ .env.example            # πŸ” Environment template
└── CLAUDE.md               # πŸ€– AI assistant guide

🎯 Vulnerability Coverage

Web Application

  • SQL Injection (Boolean, Error, Union, Time-based, Stacked)
  • Cross-Site Scripting (Reflected, Stored, DOM-based)
  • Server-Side Request Forgery (SSRF)
  • XML External Entity (XXE)
  • Remote Code Execution (RCE)
  • Local/Remote File Inclusion (LFI/RFI)
  • Insecure Direct Object Reference (IDOR)
  • Open Redirect
  • CORS Misconfiguration
  • Security Misconfigurations

Cloud

  • AWS Metadata SSRF (169.254.169.254)
  • S3 Bucket Misconfigurations
  • Azure Blob Storage Exposure
  • GCP Service Account Leaks

Vulnerability Chains Detected

Chain Pattern
Cloud Takeover SSRF β†’ Metadata β†’ IAM Keys β†’ Full Access
Account Takeover XSS β†’ Cookie Theft β†’ Session Hijack
Privilege Escalation IDOR β†’ Admin Access β†’ User Data
OAuth Bypass Open Redirect β†’ OAuth Flow β†’ Token Theft

πŸ§ͺ Development

# Install dev dependencies
pip install -e ".[dev]"

# Run tests
pytest

# Run with coverage
pytest --cov=src/snailhunter --cov-report=html

# Type checking
mypy src/

# Linting
ruff check src/
ruff format src/

⚠️ Legal & Ethics

SnailHunter is for authorized security testing only.

  • βœ… Only test targets you have explicit permission to test
  • βœ… Respect program scope and exclusions
  • βœ… Follow responsible disclosure practices
  • βœ… Use rate limiting to avoid service disruption
  • ❌ Never test without authorization
  • ❌ Never exceed program scope
  • ❌ Never use for malicious purposes

🀝 Contributing

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing)
  3. Make your changes
  4. Run tests (pytest)
  5. Commit (git commit -m 'Add amazing feature')
  6. Push (git push origin feature/amazing)
  7. Open a Pull Request

πŸ“œ License

MIT License - See LICENSE for details.


Built with 🐌 by SnailSploit
Hunt slow, strike fast.

About

SnailHunter is a fully automated bug bounty hunting platform that combines traditional security tools with AI-powered analysis.

HTTPS://SNAILSPLOIT.COM/TOOLS

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages