ScopeHound is an interactive Python tool for exploring and filtering assets from public bug bounty programs. It fetches real-time data from the arkadiyt/bounty-targets-data project and allows you to drill down into scope details by platform, asset type, bounty eligibility, and more.
- Fetches bug bounty data from:
- HackerOne
- Bugcrowd
- YesWeHack
- Intigriti
- Local custom JSON
- Interactive CLI menus to filter by:
- Platform
- Program type (Bug bounty / VDP / Both)
- Asset type (e.g. WEB, API, MOBILE)
- Scope (in-scope, out-of-scope, all)
- Bounty eligibility
- Clean and color-coded terminal output
- Export filtered results to:
.txt(plain text).json(structured data).csv(spreadsheet-friendly).html(readable table)
- Python 3.7+
- Install dependencies:
pip install requests termcolorLaunch the tool:
python ScopeHound.pyYouβll be prompted to choose options step by step:
-
Select the bug bounty platform
-
Choose program type (Bug bounty or VDP)
-
Pick asset type(s)
-
Select scope (in/out/all)
-
Choose bounty eligibility
-
Select output format (or skip saving)
Results will be displayed in your terminal with color formatting, and optionally saved to file(s).
Depending on your selection, files will be saved as:
-
filename.txt β plain text output without colors
-
filename.json β structured program/asset data
-
filename.csv β spreadsheet-compatible format
-
filename.html β styled table view in browser
You can use your own bounty program data:
-
Choose "Load custom JSON" in the first menu
-
Provide the path to your JSON file
-
Choose which platform format to treat it as (for parsing)


