diff --git a/.gitbook/assets/image (1) (1).png b/.gitbook/assets/image (1) (1).png
new file mode 100644
index 0000000..b1eac99
Binary files /dev/null and b/.gitbook/assets/image (1) (1).png differ
diff --git a/.gitbook/assets/image (1).png b/.gitbook/assets/image (1).png
index b1eac99..417a93a 100644
Binary files a/.gitbook/assets/image (1).png and b/.gitbook/assets/image (1).png differ
diff --git a/.gitbook/assets/image.png b/.gitbook/assets/image.png
index 417a93a..2823e75 100644
Binary files a/.gitbook/assets/image.png and b/.gitbook/assets/image.png differ
diff --git a/SUMMARY.md b/SUMMARY.md
index 8b421c2..9259265 100644
--- a/SUMMARY.md
+++ b/SUMMARY.md
@@ -5,3 +5,4 @@
* [🔼 Subdomain Takeover](subdomain-takeover.md)
* [Other](other.md)
* [🔎 Recon With Me](recon-with-me.md)
+* [🔎 Extensive Recon Guide For Bug Hunting](extensive-recon-guide-for-bug-hunting.md)
diff --git a/extensive-recon-guide-for-bug-hunting.md b/extensive-recon-guide-for-bug-hunting.md
new file mode 100644
index 0000000..cfdd417
--- /dev/null
+++ b/extensive-recon-guide-for-bug-hunting.md
@@ -0,0 +1,253 @@
+# 🔎 Extensive Recon Guide For Bug Hunting
+
+
+
+### WHAT IS RECONNAISSANCE?
+
+Reconnaissance is one of the most important aspects of penetration testing. It’s also known as Recon.\
+Recon will help you to increase attack surface area and may allow you to get more vulnerabilities but the ultimate goal is to dig deep in the target.
+
+ Recon = Increase in Attack surface = More vulnerabilities\
+ Recon = Finding untouched endpoints = Fewer duplicates\
+ Recon = Sharpening your axe before attack
+
+***
+
+### 1. SUBDOMAIN ENUMERATION
+
+Subdomain enumeration is the process of finding subdomains for one or more domains.
+
+**Tools used ⇒**
+
+Visual Recon⇒
+
+* [https://Virustotal.com](https://virustotal.com/)
+* [https://Subdomainfinder.c99.nl](https://subdomainfinder.c99.nl/)
+* [https://crt.sh/?q=%25.target.com](https://crt.sh/?q=%25.target.com)
+* [https://securitytrails.com/list/apex\_domain/target.com](https://securitytrails.com/list/apex\_domain/target.com)
+* [https://www.shodan.io/search?query=Ssl.cert.subject.CN%3A%22target.com%22](https://www.shodan.io/search?query=Ssl.cert.subject.CN%3A%22target.com%22)
+
+Command Line⇒
+
+* [Amass](https://github.com/owasp-amass/amass)
+* [Sunfinder](https://github.com/projectdiscovery/subfinder)
+* [dnsx](https://github.com/projectdiscovery/dnsx)
+* [Chaos](https://chaos.projectdiscovery.io/#/)
+* [Assetfinder](https://github.com/tomnomnom/assetfinder)
+
+**Oneliners for Subdomain Enumeration ⇒**
+
+```shell
+$ amass enum -passive -norecursive -noalts -df domians.txt -o subs-list.txt
+$ dnsx -silent -d $domain -w ~/wordlist.txt -o ~/dnsbrute.txt
+$ cat domain.txt | dnsgen - | massdns -r ~/resolvers.txt -o S -w alive.txt
+```
+
+***
+
+### 2. FILTERING THE SUBDOMAINS WITH HTTPX
+
+```shell
+$ httpx -l domain.txt -timeout 13 -o domain-probe.txt
+```
+
+**PORT SCANNING ⇒**
+
+```shell
+$ naabu -list sub-list.txt -top-ports 1000 -exclude-ports 80,443,21,22,25 -o ports.txt
+$ naabu -list sub-list.txt -p - -exclude-ports 80,443,21,22,25 -o ports.txt
+$ cat domain-subs.txt | aquatone -ports xlarge -scan-timeout 300 -out aquatone.txt
+```
+
+**SUBDOMAIN OF SUBDOMAIN ENUMERATION ⇒**\
+“This is one of the rare things people search for.”\
+**Tools used:**
+
+* **Subbrute**: [https://github.com/TheRook/subbrute](https://github.com/TheRook/subbrute)
+* **Altdns**: [https://github.com/infosec-au/altdns](https://github.com/infosec-au/altdns)
+ * Usage: `./altdns.py -i subdomains.txt -o data_output -w words.txt -r -s output.txt`
+
+***
+
+### 3. SCREENSHOT TOOLS
+
+These tools are capable of taking screenshots of websites to view offline anytime.
+
+**Tools used ⇒**
+
+* **Eyewitness**: [https://github.com/FortyNorthSecurity/EyeWitness](https://github.com/FortyNorthSecurity/EyeWitness)
+* **httpscreenshot**: [https://github.com/breenmachine/httpscreenshot](https://github.com/breenmachine/httpscreenshot)
+
+***
+
+### 4. BROADENING YOUR SCOPE
+
+More targets lead to more option which ultimately lead to more opportunities.
+
+* Crunchbase
+* bgp.he.net
+* tools.whoisxmlapi.com
+* [https://whois.arin.net/](https://whois.arin.net/)
+
+***
+
+### 5. WHAT TO DO AFTER ENUMERATION? | Collecting URLs
+
+* **Waybackurls**: [https://github.com/tomnomnom/waybackurls](https://github.com/tomnomnom/waybackurls)
+* **Gau**: [https://github.com/lc/gau](https://github.com/lc/gau)
+* **web archieve**: [https://web.archive.org/cdx/search/cdx?url=\*.target.com\&fl=original\&collapse=](https://web.archive.org/cdx/search/cdx?url=\*.target.com\&fl=original\&collapse=) urlkey
+
+***
+
+### 6. TIPS AND TRICKS
+
+1\. After collecting URLs, curl out the responses of the URLs and grep for the following URLs:
+
+* drive.google
+* docs.google
+* /spreadsheets/d/
+* /document/d/
+
+ ```shell
+ $ cat domains.txt | katana -silent | while read url; do cu=$(curl -s $url | grep -E '(drive. google | docs. google | spreadsheet\/d | document.\/d\/)' ;echo -e " ==> $url" "\n"" $cu" ; done
+ ```
+
+2\. Using paramspider, gxss to detect Cross-site Scripting (XSS)
+
+* Commands:-
+
+ ```shell
+ $ cat params | qsreplace yogi | dalfox pipe --mining-dom --deep-domxss --mining-dict --remotepayloads=portswigger,payloadbox --remote wordlists=burp,assetnote -o xssoutput.txt
+ ```
+
+ ```shell
+ $ cat alive.txt | waybackurls | gf xss | uro | httpx -silent | qsreplace '">