HawkScan
1.0.0

웹 사이트에서 정찰 및 정보 수집을위한 보안 도구. (파이썬 3.x)
- Add proxy function
- Redefining priorities/tasks
- Let's debug certificate subdomains results
- Display the current bypass number during scan ("CB:")
- Easter egg for xmas :)
- Option -nfs (not first step) to pass the first recon steps
- Google CSE before scan
- Creation of WIKI
- Detecting potential path disclosure into html webpage
- Detecting potential hidden directory
(자세한 내용은 changelog.md를 참조하십시오)
- git clone https://github.com/c0dejump/HawkScan.git && sudo python3 HawkScan/setup.py install
- pip(3) install -r requirements.txt
- python3 -m pip install -r requirements.txt
P1이 가장 중요합니다
[WIP] 다중 제외 : -Exclude 403,1337B [P1] [진행 중] (예 : 예시 참조)
[WIP] 일부 프록시를 통한 익명 라우팅 (HTTP/S 프록시 목록) [P1] [P1] [WIP] 리 스포츠 재 구축 스캔 [P1] [WIP] 스캔 전에 "헤더 정보"교체
usage: hawkscan.py [-h] [-u URL] [-f FILE_URL] [-t THREAD] [--exclude EXCLUDE [EXCLUDE ...]] [--auto] [--update] [-w WORDLIST] [-b [BACKUP ...]] [-p PREFIX] [-H HEADER_] [-a USER_AGENT] [--redirect] [--auth AUTH] [--timesleep TS] [--proxie PROXIE] [-r] [-s SUBDOMAINS] [--js] [--nfs] [--ffs] [--notify] [-o OUTPUT] [-of OUTPUT_TYPE]
> General:
-u URL URL to scan [required]
-f FILE_URL file with multiple URLs to scan
-t THREAD Number of threads to use for URL Fuzzing. Default: 30
--exclude EXCLUDE [EXCLUDE ...] Exclude page, response code, response size. (Exemples: --exclude 500,337b)
--auto Automatic threads depending response to website. Max: 30
--update For automatic update
--lightmode For a just simple fuzzing 1 request per second & a new session for each request
> Wordlist Settings:
-w WORDLIST Wordlist used for Fuzzing the desired webite. Default: dichawk.txt
-b Adding prefix/suffix backup extensions during the scan. (Exemples: exemple.com/~ex/, exemple.com/ex.php.bak...) /! beware, take more longer
-p PREFIX Add prefix in wordlist to scan
> Request Settings:
-H HEADER_ Modify header. (Exemple: -H "cookie: test")
-a USER_AGENT Choice user-agent. Default: Random
--redirect For scan with redirect response (301/302)
--auth AUTH HTTP authentification. (Exemples: --auth admin:admin)
--timesleep TS To define a timesleep/rate-limit if app is unstable during scan.
> Tips:
-r Recursive dir/files
-s SUBDOMAINS Subdomain tester
--js For try to found keys, token, sensitive endpoints... in the javascript page
--nfs Not the first step of scan during the first running (waf, vhosts, wayback etc...)
--ffs Force the first step of scan during the first running (waf, vhosts, wayback etc...)
--notify For receveid notify when the scan finished (only work on linux)
> Export Settings:
-o OUTPUT Output to site_scan.txt (default in website directory)
-of OUTPUT_TYPE Output file format. Available formats: json, csv, txt
//Basic
python hawkscan.py -u https://www.exemple.com/
//With specific dico
python hawkscan.py -u https://www.exemple.com/ -w dico_extra.txt
//with 30 threads
python hawkscan.py -u https://www.exemple.com/ -t 30
//With backup files scan
python hawkscan.py -u https://www.exemple.com/ -b
//With an exclude page
python hawkscan.py -u https://www.exemple.com/ --exclude profile.php
//With an exclude response code
python hawkscan.py -u https://www.exemple.com/ --exclude 403
//With an exclude bytes number
python hawkscan.py -u https://www.exemple.com/ --exclude 1337b
//With two excludes type
python hawkscan.py -u https://www.exemple.com/ --exclude 1337b,403
Layno (https://github.com/clayno/) [기술 도우미]
Sanguinarius (https://twitter.com/sanguinarius_bt) [기술 도우미]
JAMB0N69 (https://twitter.com/jamb0n69) [기술 도우미]
cyber_ph4ntom (https://twitter.com/__ph4ntom__) [베타 테스터 및 로고 그래픽]
https://www.paypal.me/c0dejump
또는 당신이 나에게 커피를 제공하고 싶다면 :)
https://ko-fi.com/c0dejump
이 스크립트는 "WAFW00F"를 사용하여 첫 번째 단계에서 WAF를 감지합니다 (https://github.com/enablesecurity/wafw00f)
이 스크립트는 "Sublist3r"을 사용하여 하위 도메인을 스캔합니다 (https://github.com/aboul3la/sublist3r)