A Comprehensive Web Fuzzer and Content Discovery Tool

Overview

rustbuster CircleCI

A Comprehensive Web Fuzzer and Content Discovery Tool

asciicast

Introduction

Check the blog post: Introducing Rustbuster — A Comprehensive Web Fuzzer and Content Discovery Tool

Download

You can download prebuilt binaries from here.

Installation

install_rustbuster() {
    echo "Installing latest version of Rustbuster"
    latest_version=`curl -s https://github.com/phra/rustbuster/releases | grep "rustbuster-v" | head -n1 | cut -d'/' -f6`
    echo "Latest release: $latest_version"
    mkdir -p /opt/rustbuster
    wget -qP /opt/rustbuster https://github.com/phra/rustbuster/releases/download/$latest_version/rustbuster-$latest_version-x86_64-unknown-linux-gnu
    ln -fs /opt/rustbuster/rustbuster-$latest_version-x86_64-unknown-linux-gnu /opt/rustbuster/rustbuster
    chmod +x /opt/rustbuster/rustbuster
    echo "Done! Try running"
    echo "/opt/rustbuster/rustbuster -h"
}

install_rustbuster

Usage

rustbuster 2.1.0
DirBuster for rust

USAGE:
    rustbuster [SUBCOMMAND]

FLAGS:
    -h, --help       Prints help information
    -V, --version    Prints version information

SUBCOMMANDS:
    dir      Directories and files enumeration mode
    dns      A/AAAA entries enumeration mode
    fuzz     Custom fuzzing enumeration mode
    help     Prints this message or the help of the given subcommand(s)
    vhost    Virtual hosts enumeration mode
    tilde    IIS 8.3 shortname enumeration mode

EXAMPLES:
    1. Dir mode:
        rustbuster dir -u http://localhost:3000/ -w examples/wordlist -e php
    2. Dns mode:
        rustbuster dns -d google.com -w examples/wordlist
    3. Vhost mode:
        rustbuster vhost -u http://localhost:3000/ -w examples/wordlist -d test.local -x "Hello"
    4. Fuzz mode:
        rustbuster fuzz -u http://localhost:3000/login \
            -X POST \
            -H "Content-Type: application/json" \
            -b '{"user":"FUZZ","password":"FUZZ","csrf":"CSRFCSRF"}' \
            -w examples/wordlist \
            -w /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-10000.txt \
            -s 200 \
            --csrf-url "http://localhost:3000/csrf" \
            --csrf-regex '\{"csrf":"(\w+)"\}'
    5. Tilde mode:
        rustbuster tilde -u http://localhost:3000/ -e aspx -X OPTIONS

dir usage

rustbuster-dir
Directories and files enumeration mode

USAGE:
    rustbuster dir [FLAGS] [OPTIONS] --url <url> --wordlist <wordlist>...

FLAGS:
    -f, --append-slash          Tries to also append / to the base request
    -K, --exit-on-error         Exits on connection errors
    -h, --help                  Prints help information
    -k, --ignore-certificate    Disables TLS certificate validation
        --no-banner             Skips initial banner
        --no-progress-bar       Disables the progress bar
    -V, --version               Prints version information
    -v, --verbose               Sets the level of verbosity

OPTIONS:
    -e, --extensions <extensions>                        Sets the extensions [default: ]
    -b, --http-body <http-body>                          Uses the specified HTTP method [default: ]
    -H, --http-header <http-header>...                   Appends the specified HTTP header
    -X, --http-method <http-method>                      Uses the specified HTTP method [default: GET]
    -S, --ignore-status-codes <ignore-status-codes>      Sets the list of status codes to ignore [default: 404]
    -s, --include-status-codes <include-status-codes>    Sets the list of status codes to include [default: ]
    -o, --output <output>                                Saves the results in the specified file [default: ]
    -t, --threads <threads>                              Sets the amount of concurrent requests [default: 10]
    -u, --url <url>                                      Sets the target URL
    -a, --user-agent <user-agent>                        Uses the specified User-Agent [default: rustbuster]
    -w, --wordlist <wordlist>...                         Sets the wordlist

EXAMPLE:
    rustbuster dir -u http://localhost:3000/ -w examples/wordlist -e php

dns usage

rustbuster-dns
A/AAAA entries enumeration mode

USAGE:
    rustbuster dns [FLAGS] [OPTIONS] --domain <domain> --wordlist <wordlist>...

FLAGS:
    -K, --exit-on-error      Exits on connection errors
    -h, --help               Prints help information
        --no-banner          Skips initial banner
        --no-progress-bar    Disables the progress bar
    -V, --version            Prints version information
    -v, --verbose            Sets the level of verbosity

OPTIONS:
    -d, --domain <domain>           Uses the specified domain
    -o, --output <output>           Saves the results in the specified file [default: ]
    -t, --threads <threads>         Sets the amount of concurrent requests [default: 10]
    -w, --wordlist <wordlist>...    Sets the wordlist

EXAMPLE:
    rustbuster dns -d google.com -w examples/wordlist

vhost usage

rustbuster-vhost 
Virtual hosts enumeration mode

USAGE:
    rustbuster vhost [FLAGS] [OPTIONS] --domain <domain> --ignore-string <ignore-string>... --url <url> --wordlist <wordlist>...

FLAGS:
    -K, --exit-on-error         Exits on connection errors
    -h, --help                  Prints help information
    -k, --ignore-certificate    Disables TLS certificate validation
        --no-banner             Skips initial banner
        --no-progress-bar       Disables the progress bar
    -V, --version               Prints version information
    -v, --verbose               Sets the level of verbosity

OPTIONS:
    -d, --domain <domain>                                Uses the specified domain to bruteforce
    -b, --http-body <http-body>                          Uses the specified HTTP body [default: ]
    -H, --http-header <http-header>...                   Appends the specified HTTP header
    -X, --http-method <http-method>                      Uses the specified HTTP method [default: GET]
    -S, --ignore-status-codes <ignore-status-codes>      Sets the list of status codes to ignore [default: 404]
    -x, --ignore-string <ignore-string>...               Ignores results with specified string in the HTTP body
    -s, --include-status-codes <include-status-codes>    Sets the list of status codes to include [default: ]
    -o, --output <output>                                Saves the results in the specified file [default: ]
    -t, --threads <threads>                              Sets the amount of concurrent requests [default: 10]
    -u, --url <url>                                      Sets the target URL
    -a, --user-agent <user-agent>                        Uses the specified User-Agent [default: rustbuster]
    -w, --wordlist <wordlist>...                         Sets the wordlist

EXAMPLE:
    rustbuster vhost -u http://localhost:3000/ -w examples/wordlist -d test.local -x "Hello"

fuzz usage

rustbuster-fuzz
Custom fuzzing enumeration mode

USAGE:
    rustbuster fuzz [FLAGS] [OPTIONS] --url <url> --wordlist <wordlist>...

FLAGS:
    -K, --exit-on-error         Exits on connection errors
    -h, --help                  Prints help information
    -k, --ignore-certificate    Disables TLS certificate validation
        --no-banner             Skips initial banner
        --no-progress-bar       Disables the progress bar
    -V, --version               Prints version information
    -v, --verbose               Sets the level of verbosity

OPTIONS:
        --csrf-header <csrf-header>...                   Adds the specified headers to CSRF GET request
        --csrf-regex <csrf-regex>                        Grabs the CSRF token applying the specified RegEx
        --csrf-url <csrf-url>                            Grabs the CSRF token via GET to csrf-url
    -b, --http-body <http-body>                          Uses the specified HTTP method [default: ]
    -H, --http-header <http-header>...                   Appends the specified HTTP header
    -X, --http-method <http-method>                      Uses the specified HTTP method [default: GET]
    -S, --ignore-status-codes <ignore-status-codes>      Sets the list of status codes to ignore [default: 404]
    -x, --ignore-string <ignore-string>...               Ignores results with specified string in the HTTP Body
    -s, --include-status-codes <include-status-codes>    Sets the list of status codes to include [default: ]
    -i, --include-string <include-string>...             Includes results with specified string in the HTTP body
    -o, --output <output>                                Saves the results in the specified file [default: ]
    -t, --threads <threads>                              Sets the amount of concurrent requests [default: 10]
    -u, --url <url>                                      Sets the target URL
    -a, --user-agent <user-agent>                        Uses the specified User-Agent [default: rustbuster]
    -w, --wordlist <wordlist>...                         Sets the wordlist

EXAMPLE:
    rustbuster fuzz -u http://localhost:3000/login \
        -X POST \
        -H "Content-Type: application/json" \
        -b '{"user":"FUZZ","password":"FUZZ","csrf":"CSRFCSRF"}' \
        -w examples/wordlist \
        -w /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-10000.txt \
        -s 200 \
        --csrf-url "http://localhost:3000/csrf" \
        --csrf-regex '\{"csrf":"(\w+)"\}'

tilde usage

rustbuster-tilde
IIS 8.3 shortname enumeration mode

USAGE:
    rustbuster tilde [FLAGS] [OPTIONS] --url <url>

FLAGS:
    -K, --exit-on-error         Exits on connection errors
    -h, --help                  Prints help information
    -k, --ignore-certificate    Disables TLS certificate validation
        --no-banner             Skips initial banner
        --no-progress-bar       Disables the progress bar
    -V, --version               Prints version information
    -v, --verbose               Sets the level of verbosity

OPTIONS:
    -e, --extension <extension>                          Sets the redirect extension
    -b, --http-body <http-body>                          Uses the specified HTTP body [default: ]
    -H, --http-header <http-header>...                   Appends the specified HTTP header
    -X, --http-method <http-method>                      Uses the specified HTTP method [default: GET]
    -S, --ignore-status-codes <ignore-status-codes>      Sets the list of status codes to ignore [default: 404]
    -s, --include-status-codes <include-status-codes>    Sets the list of status codes to include [default: ]
    -o, --output <output>                                Saves the results in the specified file [default: ]
    -t, --threads <threads>                              Sets the amount of concurrent requests [default: 10]
    -u, --url <url>                                      Sets the target URL
    -a, --user-agent <user-agent>                        Uses the specified User-Agent [default: rustbuster]

EXAMPLE:
    rustbuster tilde -u http://localhost:3000/ -e aspx -X OPTIONS
Comments
  • IIS short scanner module (Tilde enumeration) - multiple files with same prefix

    IIS short scanner module (Tilde enumeration) - multiple files with same prefix

    There might be a problem with files with multiple dots.

    For instance, web.config.old is discovered as web~1.con

    Screenshot from 2019-07-11 21-45-27

    iis_shortname_Scan.py finds the same file as webcon~1.old*

    Screenshot from 2019-07-11 21-53-11

    Side question: is there room to spot file with multiple dots?

    bug 
    opened by 0xea31 2
  • Connection timed out (os error 110)

    Connection timed out (os error 110)

    I keep getting this error with rustbuster

    ❯ rustbuster dir -u https://secbytes.net/ -w /usr/share/wordlists/dirb/directory-list-2.3-medium.txt -t 20 
    ...
     ERROR rustbuster > https://secbytes.net/1859 - "error trying to connect: Connection timed out (os error 110)"
     ERROR rustbuster > https://secbytes.net/2980 - "error trying to connect: Connection timed out (os error 110)"
     ERROR rustbuster > https://secbytes.net/2910 - "error trying to connect: Connection timed out (os error 110)"
     ERROR rustbuster > https://secbytes.net/2766 - "error trying to connect: Connection timed out (os error 110)"
     ERROR rustbuster > https://secbytes.net/inde - "error trying to connect: Connection timed out (os error 110)"
    ⠤ [00:22:04] ##>-------------------------------------   13900/218691  ETA: 05:25:17 req/s: 10
    

    The issue only happens when using rustbuster i don't have a similar issue with other tools like gobuster

    opened by Bad3r 1
  • Specifying just the IP/Hostname to dirbust causes a segfault

    Specifying just the IP/Hostname to dirbust causes a segfault

    Doing rustbuster --url 127.0.0.1 --wordlist /usr/share/dirb/wordlists/common.txt should produce the same output as rustbuster --url 127.0.0.1/ --wordlist /usr/share/dirb/wordlists/common.txt but the latter gives a segmentation fault on Linux htb 4.19.0-kali5-amd64 #1 SMP Debian 4.19.37-2kali1 (2019-05-15) x86_64 GNU/Linux

    Image: image

    opened by InfoSecJack 1
  • -S ignored in vhost mode

    -S ignored in vhost mode

    running rustbuster with: ./rustbuster-v3.0.3-x86_64-unknown-linux-gnu vhost -d foo.bar --wordlist raft-large-words.txt -u http://127.0.0.1/ -x 'permission' -S 400

    i still see 400 errors: [?] Started at : 2019-10-28 15:34:32 GET 400 Bad Request _private.foo.bar GET 400 Bad Request aspnet_client.foo.bar GET 400 Bad Request create_account.foo.bar

    to test it you could also use -S 200 against an apache configured with defaults

    opened by theguly 0
  • --domain ignored in vhost mode

    --domain ignored in vhost mode

    running rustbuster 3.0.3 with: ./rustbuster-v3.0.3-x86_64-unknown-linux-gnu vhost --domain foo.bar --wordlist wl -u http://127.0.0.1/ -S 400 -x 'default'

    i have an error message like this: error: The following required arguments were not provided: --domain

    same behaviour with --domain=foo.bar of course

    same CLI arguments but with -d, like: ./rustbuster-v3.0.3-x86_64-unknown-linux-gnu vhost -d foo.bar --wordlist wl -u http://127.0.0.1/ -S 400 -x 'default'

    runs wl wordlist against given host/ip

    opened by theguly 0
  • Dir mode: recursion

    Dir mode: recursion

    Thanks for the great tool. Is there an option for recursion in dir mode? I couldn't find it. If there is none, consider this a feature request. ;) I could try to roll my own, but I haven't done anything in Rust before.

    opened by schinkelg 0
  • Add support for csrf token in fuzzbuster module

    Add support for csrf token in fuzzbuster module

    will fix #17

    example usage: env RUST_BACKTRACE=1 RUST_LOG=rustbuster=debug cargo run -- -m fuzz -u http://localhost:3000/login -X POST -H "Content-Type: application/json" -b '{"user":"FUZZ","password":"FUZZ","csrf":"CSRF"}' -w examples/wordlist -w /usr/share/seclists/Passwords/Common-Credentials/10-million-password-list-top-10000.txt -s 200 --csrf-url "http://localhost:3000/csrf" --csrf-regex '\{"csrf":"(\w+)"\}'

    opened by phra 0
  • Different Output Format

    Different Output Format

    To really set rustbuster apart adding different type of outputs would be nice, for example, JSON and XML. This would allow to easily post-process the results and give more flexibility when chaining different tools.

    opened by aress31 0
  • Pre-built Windows Binary

    Pre-built Windows Binary

    I know and it is clear from the doc that for anything other than Unix binary you want us to build them but providing Windows binary for each release would help us save up some time and remove the need for installing the rust compiling env.

    Could you please consider building them directly for future releases?

    opened by aress31 0
  • Crashing `rustbuster fuzz` when matching binary files.

    Crashing `rustbuster fuzz` when matching binary files.

    I'm getting the following error, it prevents rusbuster fuzz from continuing.

    thread 'tokio-runtime-worker-2' panicked at 'called `Result::unwrap()` on an `Err` value: FromUtf8Error { bytes: [137, ..., 123, 133, 0, 0, 0, 0, 73, 69, 78, 68, 174, 66, 96, 130], error: Utf8Error { valid_up_to: 0, error_len: Some(1) } }', src/fuzzbuster/mod.rs:296:59
    note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
    

    It's crashing when e.g. a binary file .png is found.

    I've changed String::from_utf8 with the unchecked version, and it works fine.

    let body = unsafe { String::from_utf8_unchecked(vec) };
    

    But not sure if you want to follow this route, let me know if you need any further details.

    Thanks!

    opened by Shaddy 0
  • function is never used in build

    function is never used in build

    $ rustc --version
    rustc 1.52.1 (9bc8c42bb 2021-05-09)
    
    $ sw_vers
    ProductName:    macOS
    ProductVersion: 11.3.1
    BuildVersion:   20E241
    

    I see this warning from cargo build --release:

    warning: function is never used: `configuration`
      --> src/banner.rs:29:8
       |
    29 | pub fn configuration(mode: &str, url: &str, threads: &str, wordlist: &str) -> String {
       |        ^^^^^^^^^^^^^
       |
       = note: `#[warn(dead_code)]` on by default
    
    warning: 1 warning emitted
    
    opened by mikemadden42 0
  • tokio-runtime-worker-0 panic

    tokio-runtime-worker-0 panic

    Error:

    root@kali:~/OSCP/PG/Wombo$ /tmp/rustbuster/target/release/rustbuster dir --url http://192.168.93.69:8080 --wordlist /usr/share/seclists/Discovery/Web-Content/raft-small-files.txt 
    ~ rustbuster v3.0.3 ~ by phra & ps1dr3x ~
    
             _     _                 _         _           _        _                 _         _           _           _     
            /\ \  /\_\              / /\      /\ \        / /\     /\_\              / /\      /\ \        /\ \        /\ \   
           /  \ \/ / /         _   / /  \     \_\ \      / /  \   / / /         _   / /  \     \_\ \      /  \ \      /  \ \  
          / /\ \ \ \ \__      /\_\/ / /\ \__  /\__ \    / / /\ \  \ \ \__      /\_\/ / /\ \__  /\__ \    / /\ \ \    / /\ \ \ 
         / / /\ \_\ \___\    / / / / /\ \___\/ /_ \ \  / / /\ \ \  \ \___\    / / / / /\ \___\/ /_ \ \  / / /\ \_\  / / /\ \_\
        / / /_/ / /\__  /   / / /\ \ \ \/___/ / /\ \ \/ / /\ \_\ \  \__  /   / / /\ \ \ \/___/ / /\ \ \/ /_/_ \/_/ / / /_/ / /
       / / /__\/ / / / /   / / /  \ \ \    / / /  \/_/ / /\ \ \___\ / / /   / / /  \ \ \    / / /  \/_/ /____/\   / / /__\/ / 
      / / /_____/ / / /   / / _    \ \ \  / / /     / / /  \ \ \__// / /   / / _    \ \ \  / / /     / /\____\/  / / /_____/  
     / / /\ \ \  / / /___/ / /_/\__/ / / / / /     / / /____\_\ \ / / /___/ / /_/\__/ / / / / /     / / /______ / / /\ \ \    
    / / /  \ \ \/ / /____\/ /\ \/___/ / /_/ /     / / /__________/ / /____\/ /\ \/___/ / /_/ /     / / /_______/ / /  \ \ \   
    \/_/    \_\/\/_________/  \_____\/  \_\/      \/_____________\/_________/  \_____\/  \_\/      \/__________\/_/    \_\/   
    
    
    [?] Started at  : 2021-02-24 12:39:28
    
    thread 'tokio-runtime-worker-0' panicked at 'attempted to leave type `std::mem::ManuallyDrop<internal::SealedBag>` uninitialized, which is invalid', /usr/src/rustc-1.48.0/library/core/src/mem/mod.rs:658:9
    stack backtrace:
       0: rust_begin_unwind
                 at /usr/src/rustc-1.48.0/library/std/src/panicking.rs:483
       1: core::panicking::panic_fmt
                 at /usr/src/rustc-1.48.0/library/core/src/panicking.rs:85
       2: core::panicking::panic
                 at /usr/src/rustc-1.48.0/library/core/src/panicking.rs:50
       3: std::sync::once::Once::call_once::{{closure}}
       4: std::sync::once::Once::call_inner
                 at /usr/src/rustc-1.48.0/library/std/src/sync/once.rs:419
       5: <crossbeam_epoch::default::COLLECTOR as core::ops::deref::Deref>::deref
       6: std::thread::local::fast::Key<T>::try_initialize
       7: tokio_threadpool::worker::Worker::run
       8: tokio::runtime::threadpool::builder::Builder::build::{{closure}}
    note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.
    Segmentation fault
    
    opened by blitztide 3
  • Ability to exclude empty responses in fuzz mode

    Ability to exclude empty responses in fuzz mode

    Some APIs always return same response status code and use empty response to tell from a error or from data not being found.

    I'm thinking that the best way to work with this kind of endpoints is to have a exact --ignore-string flag which tests if the response body is exactly what is given.

    Example rustbuster fuzz --ignore-exact "" -w wordlist.txt -u http://localhost:8000/api?field=FUZZ

    A option to see response sizes in bytes like wfuzz gives also would address this use case when combined with grep by the user.

    opened by Jaakkonen 0
Releases(v3.0.3)
Owner
Francesco Soncina
OSCE // OSCP // Ethical Hacker & Red Teamer @ABNAMRO // Full Stack Developer // JavaScript Enthusiast // Staff Member of @BolognaJS // CTF player at @d0nkeys
Francesco Soncina
Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...

LibAFL, the fuzzer library. Advanced Fuzzing Library - Slot your own fuzzers together and extend their features using Rust. LibAFL is written and main

Advanced Fuzzing League ++ 1.2k Jan 6, 2023
A fuzzer framework built in Rust

lain This crate provides functionality one may find useful while developing a fuzzer. A recent nightly Rust build is required for the specialization f

Microsoft 469 Dec 9, 2022
a grammar based feedback fuzzer

Nautilus NOTE: THIS IS AN OUTDATE REPOSITORY, THE CURRENT RELEASE IS AVAILABLE HERE. THIS REPO ONLY SERVES AS A REFERENCE FOR THE PAPER Nautilus is a

Chair for Sys­tems Se­cu­ri­ty 157 Oct 26, 2022
Fuzzer to automatically find side-channel (timing) vulnerabilities

SideFuzz: Fuzzing for side-channel vulnerabilities SideFuzz is an adaptive fuzzer that uses a genetic-algorithm optimizer in combination with t-statis

Patrick Hayes 94 Sep 29, 2022
Verdict-as-a-Service SDKs: Analyze files for malicious content

Verdict-as-a-Service Verdict-as-a-Service (VaaS) is a service that provides a platform for scanning files for malware and other threats. It allows eas

G DATA CyberDefense AG 31 Dec 9, 2022
Rslide - A web service that allows you to move through multiple html pages in the browser like a slide, even without focusing on the app console or the browser. Currently only supports Windows.

rslide rslide is a web service that allows you to move through multiple html pages in the browser like a slide, even without focusing on the app conso

Jason Dongheng Lee 3 Jan 1, 2022
ctfsak is a tool to speed up common operations needed during CTFs

ctfsak (CTF Swiss Army Knife) This is a tool to help saving time during CTFs, where it's common to have to do a lot of encoding/decoding, encrypting/d

null 1 Dec 1, 2022
Binary coverage tool without binary modification for Windows

Summary Mesos is a tool to gather binary code coverage on all user-land Windows targets without need for source or recompilation. It also provides an

null 381 Dec 22, 2022
LLVM-CBE is a C-backend for LLVM, i.e. a tool that turns LLVM bitcode 1 into C

LLVM-CBE is a C-backend for LLVM, i.e. a tool that turns LLVM bitcode 1 into C. It requires to be built near LLVM, which was found to be so heavy dependency that shipping it as Cargo crate would be absurd.

Dmitrii - Demenev 2 May 26, 2022
subscout is a simple, nimble subdomain enumeration tool written in Rust language

subscout is a simple, nimble subdomain enumeration tool written in Rust language. It is designed to help bug bounty hunters, security professionals and penetration testers discover subdomains of a given target domain.

Dom Sec 5 Apr 5, 2023
A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.

Domo Arigato A simple command line tool which quickly audits the Disallow entries of a site's robots.txt. Disallow entries can be used to stop search

Ember Hext 20 Apr 17, 2023
Kepler is a vulnerability database and lookup store and API currently utilising National Vulnerability Database and NPM Advisories as data sources

Kepler — Kepler is a vulnerability database and lookup store and API currently utilising National Vulnerability Database and NPM Advisories as data so

Exein.io 101 Nov 12, 2022
Steals browser passwords and cookies and sends to webhook.

Browser-Stealer Steals browser passwords and cookies and sends to webhook. Donating Educational Purposes Only This code is made so you can learn from

RadonCoding 3 Sep 27, 2021
Xori is an automation-ready disassembly and static analysis library for PE32, 32+ and shellcode

Xori - Custom disassembly framework Xori is an automation-ready disassembly and static analysis library that consumes shellcode or PE binaries and pro

ENDGAME 712 Nov 28, 2022
🕵️‍♀️ Find, locate, and query files for ops and security experts ⚡️⚡️⚡️

Recon Find, locate, and query files for ops and security experts Key Features • How To Use • Download • Contributing • License Key Features Query with

Rusty Ferris Club 11 Dec 16, 2022
Semi-automatic OSINT framework and package manager

sn0int sn0int (pronounced /snoɪnt/) is a semi-automatic OSINT framework and package manager. It was built for IT security professionals and bug hunter

null 1.4k Dec 31, 2022
A simple menu to keep all your most used one-liners and scripts in one place

Dama Desktop Agnostic Menu Aggregate This program aims to be a hackable, easy to use menu that can be paired to lightweight window managers in order t

null 47 Jul 23, 2022
link is a command and control framework written in rust

link link is a command and control framework written in rust. Currently in alpha. Table of Contents Introduction Features Feedback Build Process Ackno

null 427 Dec 24, 2022
A simple scanner that loops through ips and checks if a minecraft server is running on port 25565

scanolotl Scanolotl is a simple scanner that loops through ips and checks if a minecraft server is running on port 25565. Scanolotl can also preform a

JustFr33z 3 Jul 28, 2022