- Joined
- Jan 8, 2019
- Messages
- 56,605
- Solutions
- 2
- Reputation
- 32
- Reaction score
- 100,451
- Points
- 2,313
- Credits
- 32,570
6 Years of Service
76%

It consists of three partially interdependent modules:
crimson_recon – automates the process of domain reconnaissance.
crimson_target – automates the process of urls reconnaissance.
crimson_exploit – automates the process of bug founding.

This module can help you if you have to test big infrastructure or you are trying to earn some bounties in *.scope.com domain. It includes many web scraping and bruteforcing tools.

This module covers one particular domain chosen by you for testing.
It uses a lot of vulnerability scanners, web scrapers and bruteforcing tools.

This module uses a number of tools to automate the search for certain bugs in a list of urls.
Changelog v1.4
Faster port scanning with “rustscan”
Patched jsextractor bug
“upload” directory created with a file for manual upload testing
“pywhat” and “gmapiscanner” was added to installation
Minor changes and bug fixes
To see this hidden content, you must like this content.