All Projects → BitTheByte → Eagle

BitTheByte / Eagle

Licence: other
Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Eagle

Virtual-Host
Modified Nuclei Templates Version to FUZZ Host Header
Stars: ✭ 38 (-55.29%)
Mutual labels:  bugbounty, cve, ssrf
credcheck
Credentials Checking Framework
Stars: ✭ 50 (-41.18%)
Mutual labels:  bugbounty, bugcrowd, hackerone
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (-60%)
Mutual labels:  bugbounty, bugcrowd, hackerone
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+1749.41%)
Mutual labels:  bugbounty, bugcrowd, hackerone
PayloadsAll
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (-63.53%)
Mutual labels:  bugbounty, bugcrowd, hackerone
dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+169.41%)
Mutual labels:  bugbounty, bugcrowd, hackerone
Domainker
BugBounty Tool
Stars: ✭ 40 (-52.94%)
Mutual labels:  bugbounty, bugcrowd, hackerone
h1-search
Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.
Stars: ✭ 58 (-31.76%)
Mutual labels:  bugbounty, hackerone
Blind-SSRF
Nuclei Templates to reproduce Cracking the lens's Research
Stars: ✭ 111 (+30.59%)
Mutual labels:  bugbounty, ssrf
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+245.88%)
Mutual labels:  xss, bugbounty
Bugs-feed
Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...
Stars: ✭ 90 (+5.88%)
Mutual labels:  bugbounty, cve
Hacker101
Source code for Hacker101.com - a free online web and mobile security class.
Stars: ✭ 12,246 (+14307.06%)
Mutual labels:  xss, hackerone
xssfinder
Toolset for detecting reflected xss in websites
Stars: ✭ 105 (+23.53%)
Mutual labels:  xss, bugbounty
PastebinMarkdownXSS
XSS in pastebin.com and reddit.com via unsanitized markdown output
Stars: ✭ 84 (-1.18%)
Mutual labels:  xss, bugbounty
cve-2016-1764
Extraction of iMessage Data via XSS
Stars: ✭ 52 (-38.82%)
Mutual labels:  xss, cve
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+896.47%)
Mutual labels:  ftp, xss
0l4bs
Cross-site scripting labs for web application security enthusiasts
Stars: ✭ 119 (+40%)
Mutual labels:  xss, bugbounty
Xss Payload List
🎯 Cross Site Scripting ( XSS ) Vulnerability Payload List
Stars: ✭ 2,617 (+2978.82%)
Mutual labels:  xss, bugbounty
XSS-Payload-without-Anything
XSS Payload without Anything.
Stars: ✭ 74 (-12.94%)
Mutual labels:  xss, bugbounty
BugHunterID
Para pencari bug / celah kemanan bisa bergabung.
Stars: ✭ 72 (-15.29%)
Mutual labels:  bugbounty, hackerone

Project Eagle (Alpha)

Project Eagle is a plugin based vulnerabilities scanner with threading support used for detection of low-hanging bugs on mass scale

                              .---.        .-----------
                             /     \  __  /    ------
                            / /     \(  )/    -----
                           //////   ' \/ `   ---      Multipurpose vulnerability scanner
                          //// / // :    : ---                    v1.0b
                          / /   /  /`    '--                    2019-2020
                                    //..\\           
                               ====UU====UU====       
                                   '//||\\`           
                                     ''``
                                Project Eagle

Developed and maintained: @BitTheByte Idea: @K4r1it0

Requirements

  1. Python >= 3.6
  2. Install python libraries
$ python3 -m pip install -r requirements.txt
  1. Works on Windows and Linux however windows is not the primary platform

Usage

Ping

This mode is only for checking online targets

$ python3 main.py -f domains.txt --ping

Basic usage

$ python3 main.py -f domains.txt

domains.txt: is a text file containing host names or ips, new line separated

Advanced usage

$ python3 main.py -f domains.txt -w 10 --db output.db.json

domains.txt: is a text file containing host names or ips, new line separated
output.db.json: json formated output of the tool (will be used to restore state in future releases)
10: is the number of working threads. keep in mind, workers are able to start workers for their work not limited by this number

Debug (verbose) mode

$ python3 main.py ...args -v*?

v: success, warning vv: success, warning, error vvv: all suppored messages

Features

  1. CRLF
  2. Senstive files e.g(.git, info.php ..)
  3. Subdomain takeover
  4. Anonymous FTP login
  5. S3 buckets misconfiguration including automatic takeover and upload
  6. HTTP Request Sumggling
  7. Firebase database misconfiguration
  8. Senstive information disclosure e.g(API Keys, Secrets ..) including JS files and HTML pages
  9. Missing SPF Records
  10. Path Traversal
  11. PHP-CGI - CVE_2012_1823
  12. Shell Shock - CVE_2014_6271
  13. Struts RCE - CVE_2018_11776
  14. WebLogic RCE - CVE_2019_2725
  15. Confluence LFI - CVE_2019_3396
  16. Ruby on Rails LFI - CVE_2019_5418
  17. Atlassian SSRF - CVE_2019_8451
  18. Apache Httpd mod_rewrite - CVE_2019_10098

TODO-Features

  • XSS Detection
  • SSRF Attacks
  • Platform Delection
  • Platform Based attacks
  • Automatic Login bruteforce
  • Automatic directory bruteforce
  • Parameter gathering and fuzzing
  • Detecting Error messages
  • Ability to select plugins
  • Automatic updates
  • Port Scanning and service detection
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].