Generate an attack briefing for an authorized bug bounty program
When to use: You're starting work on a new bug bounty target and want a strategic overview.
Prerequisites
- HackerOne API token — Generate at hackerone.com/settings/api_token
- h1-brain installed and databases populated — Clone, install, run fetch_rewarded_reports to populate personal DB
Flow
-
Generate the briefinghack('target-company') — Generate a full attack briefing for this program.✓ Copied→ Comprehensive briefing with scope, known weakness patterns, untouched assets, and suggested attack vectors
-
Cross-reference with disclosuresSearch disclosed reports for this company. What vulnerability types have been found before?✓ Copied→ List of disclosed vulnerabilities with types and bounty amounts
Outcome: A strategic attack plan based on historical data and current scope.
Pitfalls
- Stale scope data — The tool fetches fresh scope from HackerOne API, but verify on the program page