• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

HawkScan v1.9.5 - Security Tool for Reconnaissance and Information Gathering on a website

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,602
Solutions
2
Reputation
32
Reaction score
100,445
Points
2,313
Credits
32,540
‎6 Years of Service‎
 
76%
haw.png


HawkScan

Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)

This script uses “WafW00f” to detect the WAF in the first step.

This script uses “Sublist3r” to scan subdomains.

This script uses “waybacktool” to check in the waybackmachine.

Features

     URL fuzzing and dir/file detection
     Test backup/old file on all the files found (index.php.bak, index.php~ …)
     Check header information
     Check DNS information
     Check whois information
     User-agent random or personal
     Extract files
     Keep a trace of the scan
     Check @mail in the website and check if @mails leaked
     CMS detection + version and vulns
     Subdomain Checker
    Backup system (if the script stopped, it take again in the same place)
     WAF detection
     Add personal prefix
    Auto-update script
     Auto or personal output of scan (scan.txt)
     Check Github
    Recursive dir/file
    Scan with an authentication cookie
     Option –profil to pass profil page during the scan
     HTML report
     Work it with py2 and py3
    Add option rate-limit if the app is unstable (–timesleep)
    Check-in waybackmachine
     Response error to WAF
    Check if DataBase firebaseio exists and is accessible
    Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30
    Search S3 buckets in the source code page
     Testing bypass of waf if detected
     Testing if it’s possible scanning with “localhost” host

Changelog v1.9.5

    Fixed: A pass on the source code, more speedy

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top