Welcome to the repository dedicated to collecting and maintaining a precise list of the Dutch government's bug bounty scope. This includes domains, subdomains, and endpoints (URLs).
This is NOT an official bug bounty scope.
To report a vulnerability or to learn more about Coordinated Vulnerability Disclosure (CVD), visit:
👉 https://www.ncsc.nl/contact/kwetsbaarheid-melden
This project aims to provide the most accurate and detailed list of domains and endpoints that are in scope of the Dutch government’s bug bounty program. By mapping and monitoring relevant infrastructure, the goal is to support the security and visibility of government digital assets.
This repository focuses on verified, government-related resources. The scope list is built to ensure it is the most accurate list available.
Each resource is included only if it meets the following criteria:
- Meta tag: The page must include the
RIJKSOVERHEID.Organisatiemeta information. - Official logo: The site must display the Dutch government logo.
- Clear affiliation: There must be a clear mention of the official government body or agency.
The data is collected using a semi-automated pipeline and updated regularly. All analysis is done via Github actions and results are stored and synced in the scan_scope.db SQLite database. The process includes:
- Manual updates: Input resources are stored in the
/scopefolder. - Weekly sync with CommunicatieRijk data.
- Automated collection per domain:
- Subdomain discovery: Using Amass, Subfinder, and DNSX for validation.
- Endpoint discovery: HTTPX filters and confirms valid HTTP/HTTPS endpoints.
scope/rijksoverheid.txt– Current list of Rijksoverheid domainsstorage/subdomains.txt– Combined list of all discovered subdomains (Rijksoverheid)storage/endpoints.txt– Discovered HTTP/HTTPS endpointsstorage/wordlist.txt– Wordlist for subdomain bruteforcing, generated from known subdomainsstorage/rijksoverheid/subdomains.txt– Subdomains related to Rijksoverheidstorage/rijksoverheid/endpoints.txt– HTTP/HTTPS endpoints under Rijksoverheid
curl --silent https://raw.githubusercontent.com/zzzteph/DutchGovScope/refs/heads/main/storage/rijksoverheid/endpoints.txt | ./nuclei -silent -id geoserver-login-panel
curl --silent https://raw.githubusercontent.com/zzzteph/DutchGovScope/refs/heads/main/storage/rijksoverheid/endpoints.txt | ./nuclei -silent -id exposure -severity critical,high
curl --silent https://raw.githubusercontent.com/zzzteph/DutchGovScope/refs/heads/main/storage/rijksoverheid/endpoints.txt -o endpoints.txt | docker run -v "$PWD:/data" --rm projectdiscovery/nuclei -silent -id geoserver-login-panel
curl --silent https://raw.githubusercontent.com/zzzteph/DutchGovScope/refs/heads/main/storage/rijksoverheid/endpoints.txt -o endpoints.txt | docker run -v "$PWD:/data" --rm projectdiscovery/nuclei -silent -id exposure -severity critical,high
- Bug Bounty Dutch Government Scope – Gist
- basisbeveiliging.nl
- overheid.nl
- communicatierijk.nl
- ncsc.nl
- shrewdeye.app
- NCSC Wall of Fame
To report a vulnerability or learn more, please visit:
👉 https://www.ncsc.nl/contact/kwetsbaarheid-melden