Kunsh
Workflows by Kunsh
Monitor new CVEs for bug bounty hunting with Gemini AI and Slack alerts
## How it works Automatically monitors NIST's CVE database every hour for new vulnerabilities and uses AI to assess their relevance for bug bounty hunting, delivering actionable intelligence directly to Slack. ## Set up steps - Get Google Gemini API key from AI Studio (free tier available) - Create Slack bot with chat:write permissions - Configure your target Slack channel - AI filters and scores each CVE for exploitation potential ## What you'll get Real-time CVE intelligence with: - Bug bounty relevance scoring (HIGH/MEDIUM/LOW/NONE) - Actionable testing strategies for each vulnerability - Slack-formatted reports with CVSS severity scores - Focus on web-testable vulnerabilities only Part of "The Warden" project - perfect for security researchers who want AI-filtered, actionable CVE intelligence without the noise. 
Automatically collect bug bounty tips from Twitter to Google Sheets
## How it works Automatically monitors Twitter for bug bounty tips and educational content every 4 hours, then saves valuable insights to Google Sheets for easy reference and organization. ## Set up steps - Get your API key from https://twitterapi.io/ (free tier available) - Configure Google Sheets credentials in n8n - Create a Google Sheet with the required columns - Update the Sheet ID in the final node ## What you'll get A continuously updated database of bug bounty tips, techniques, and insights from the security community, perfectly organized in Google Sheets with: - Tweet content and URLs - Engagement metrics (likes, retweets, replies) - Formatted timestamps for easy sorting - Automatic duplicate prevention Perfect for security researchers, bug bounty hunters, and cybersecurity professionals who want to stay updated with the latest tips and techniques from Twitter's security community. 
Extract actionable security insights from HackerOne reports with Google Gemini
A streamlined AI-powered tool that extracts actionable technical insights from HackerOne security reports for advanced bug bounty hunters. ## How It Works Send any HackerOne report URL (e.g., https://hackerone.com/reports/123456) to the chat interface. The AI agent will: 1. Fetch the report JSON automatically 2. Analyze for unique techniques, payloads, and root causes 3. Extract reusable insights in a structured format Summarize with practical pentesting value ## Setup Requirements 1. Google Gemini API credentials configured 2. Chat interface deployed and accessible 3. HackerOne report URLs ## Output Format 1. Summary: One-liner impact statement 2. Techniques: Payloads, code snippets, exploitation steps 3. Pro Tips: Reusable insights for future hunts Perfect for rapid triage and building your personal exploit knowledge base.