Skip to main content
K

Kunsh

3
Workflows

Workflows by Kunsh

Workflow preview: Monitor new CVEs for bug bounty hunting with Gemini AI and Slack alerts
Free intermediate

Monitor new CVEs for bug bounty hunting with Gemini AI and Slack alerts

## How it works Automatically monitors NIST's CVE database every hour for new vulnerabilities and uses AI to assess their relevance for bug bounty hunting, delivering actionable intelligence directly to Slack. ## Set up steps - Get Google Gemini API key from AI Studio (free tier available) - Create Slack bot with chat:write permissions - Configure your target Slack channel - AI filters and scores each CVE for exploitation potential ## What you'll get Real-time CVE intelligence with: - Bug bounty relevance scoring (HIGH/MEDIUM/LOW/NONE) - Actionable testing strategies for each vulnerability - Slack-formatted reports with CVSS severity scores - Focus on web-testable vulnerabilities only Part of "The Warden" project - perfect for security researchers who want AI-filtered, actionable CVE intelligence without the noise. ![image.png](fileId:2313)

K
Kunsh
SecOps
5 Sep 2025
851
0
Workflow preview: Automatically collect bug bounty tips from Twitter to Google Sheets
Free intermediate

Automatically collect bug bounty tips from Twitter to Google Sheets

## How it works Automatically monitors Twitter for bug bounty tips and educational content every 4 hours, then saves valuable insights to Google Sheets for easy reference and organization. ## Set up steps - Get your API key from https://twitterapi.io/ (free tier available) - Configure Google Sheets credentials in n8n - Create a Google Sheet with the required columns - Update the Sheet ID in the final node ## What you'll get A continuously updated database of bug bounty tips, techniques, and insights from the security community, perfectly organized in Google Sheets with: - Tweet content and URLs - Engagement metrics (likes, retweets, replies) - Formatted timestamps for easy sorting - Automatic duplicate prevention Perfect for security researchers, bug bounty hunters, and cybersecurity professionals who want to stay updated with the latest tips and techniques from Twitter's security community. ![image.png](fileId:2299)

K
Kunsh
Market Research
2 Sep 2025
290
0
Workflow preview: Extract actionable security insights from HackerOne reports with Google Gemini
Free intermediate

Extract actionable security insights from HackerOne reports with Google Gemini

A streamlined AI-powered tool that extracts actionable technical insights from HackerOne security reports for advanced bug bounty hunters. ## How It Works Send any HackerOne report URL (e.g., https://hackerone.com/reports/123456) to the chat interface. The AI agent will: 1. Fetch the report JSON automatically 2. Analyze for unique techniques, payloads, and root causes 3. Extract reusable insights in a structured format Summarize with practical pentesting value ## Setup Requirements 1. Google Gemini API credentials configured 2. Chat interface deployed and accessible 3. HackerOne report URLs ## Output Format 1. Summary: One-liner impact statement 2. Techniques: Payloads, code snippets, exploitation steps 3. Pro Tips: Reusable insights for future hunts Perfect for rapid triage and building your personal exploit knowledge base.

K
Kunsh
SecOps
23 Jul 2025
605
0