All Projects → cloudtracer → Paskto

cloudtracer / Paskto

Licence: mit
Paskto - Passive Web Scanner

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to Paskto

Dnstwist
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Stars: ✭ 3,124 (+2197.06%)
Mutual labels:  osint, scanner
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+196.32%)
Mutual labels:  osint, scanner
Pulsar
Network footprint scanner platform. Discover domains and run your custom checks periodically.
Stars: ✭ 314 (+130.88%)
Mutual labels:  osint, scanner
nuubi
Nuubi Tools (Information-ghatering|Scanner|Recon.)
Stars: ✭ 76 (-44.12%)
Mutual labels:  osint, scanner
Blackwidow
A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.
Stars: ✭ 887 (+552.21%)
Mutual labels:  osint, scanner
Resources
No description or website provided.
Stars: ✭ 38 (-72.06%)
Mutual labels:  osint, scanner
Vault
swiss army knife for hackers
Stars: ✭ 346 (+154.41%)
Mutual labels:  osint, scanner
Netz
Discover internet-wide misconfigurations while drinking coffee
Stars: ✭ 159 (+16.91%)
Mutual labels:  osint, scanner
Snoop
Snoop — инструмент разведки на основе открытых данных (OSINT world)
Stars: ✭ 886 (+551.47%)
Mutual labels:  osint, scanner
Reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (+356.62%)
Mutual labels:  osint, scanner
pywhatcms
Unofficial WhatCMS API package
Stars: ✭ 42 (-69.12%)
Mutual labels:  osint, scanner
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-22.79%)
Mutual labels:  osint, scanner
findcdn
findCDN is a tool created to help accurately identify what CDN a domain is using.
Stars: ✭ 64 (-52.94%)
Mutual labels:  osint, scanner
Deep-Inside
Command line tool that allows you to explore IoT devices by using Shodan API.
Stars: ✭ 22 (-83.82%)
Mutual labels:  scanner, internet-of-things
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+2428.68%)
Mutual labels:  osint, scanner
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+97.79%)
Mutual labels:  osint, scanner
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+1600%)
Mutual labels:  osint, scanner
Phoneinfoga
PhoneInfoga is one of the most advanced tools to scan international phone numbers using only free resources. It allows you to first gather standard information such as country, area, carrier and line type on any international phone number. Then search for footprints on search engines to try to find the VoIP provider or identify the owner.
Stars: ✭ 5,927 (+4258.09%)
Mutual labels:  osint, scanner
Deadtrap
An OSINT tool to gather information about the real owner of a phone number
Stars: ✭ 73 (-46.32%)
Mutual labels:  osint, scanner
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (-17.65%)
Mutual labels:  osint, scanner

Paskto - Passive Web Scanner

Paskto will passively scan the web using the Common Crawl internet index either by downloading the indexes on request or parsing data from your local system. URLs are then processed through Nikto and known URL lists to identify interesting content. Hash signatures are also used to identify known default content for some IoT devices or web applications.

  Options

    -d, --dir-input directory      Directory with common crawl index files with .gz extension. Ex: -d "/tmp/cc/"
    -v, --ia-dir-input directory   Directory with internet archive index files with .gz extension. Ex: -v         "/tmp/ia/"                                                                    
    -o, --output-file file         Save test results to file. Ex: -o /tmp/results.csv                            
    -u, --update-db                Build/Update Paskto DB from Nikto databases.                                  
    -n, --use-nikto                Use Nikto DBs. Default: true                                                  
    -e, --use-extras               Use EXTRAS DB. Default: true                                                  
    -s, --scan domain name         Domain to scan. Ex: -s "www.google.ca" or -s "*.google.ca"                    
    -i, --cc-index index           Common Crawl index for scan. Ex: -i "CC-MAIN-2017-34-index"                   
    -a, --save-all-urls file       Save CSV List of all URLS. Ex: -a /tmp/all_urls.csv                           
    -h, --help                     Print this usage guide.                                                       

  Examples

    Scan domain, save results and URLs   $ node paskto.js -s "www.msn.com" -o /tmp/rest-results.csv -a /tmp/all-urls.csv                                                                       
    Scan domain with CC wildcards.       $ node paskto.js -s "*.msn.com" -o /tmp/rest-results.csv -a /tmp/all-urls.csv  
    Scan domain, only save URLs.         $ node paskto.js -s "www.msn.com" -o /tmp/rest-results.csv                     
    Scan dir with indexes.               $ node paskto.js -d "/tmp/CC-MAIN-2017-39-index/" -o /tmp/rest-results.csv -a  /tmp/all-urls.csv                                                              

Create Custom Digest signatures

A quick way to create new digest signatures for default content is to use WARCPinch which is a Chrome Extension I hacked together based off of WARCreate except it creates digital signatures as well as WARC files. (Also adds highlight and right click functionality, which is useful to just highlight any identifying text to use as the name of the signatures).

News & Updates

Follow @ThreatPinch on twitter.

Make sure to check out ThreatPinch Lookup as well, our OSINT and Threat Intel Chrome / Firefox browser extension.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].