All Projects → enemy-submarine → Pidrila

enemy-submarine / Pidrila

Licence: gpl-2.0
Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Pidrila

Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+2702.4%)
Mutual labels:  hacking, pentesting, penetration-testing, scanner, pentest, appsec
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+5696.8%)
Mutual labels:  hacking, pentesting, penetration-testing, scanner, appsec, bug-bounty
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (+100%)
Mutual labels:  hacking, pentesting, scanner, bug-bounty
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (+115.2%)
Mutual labels:  hacking, pentesting, scanner, bug-bounty
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+268.8%)
Mutual labels:  hacking, pentesting, penetration-testing, pentest
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+13.6%)
Mutual labels:  scanner, penetration-testing, bug-bounty, pentest
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-65.6%)
Mutual labels:  penetration-testing, bug-bounty, pentest, appsec
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+222.4%)
Mutual labels:  pentesting, penetration-testing, scanner, pentest
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+307.2%)
Mutual labels:  hacking, pentesting, scanner, bug-bounty
Habu
Hacking Toolkit
Stars: ✭ 635 (+408%)
Mutual labels:  hacking, pentesting, penetration-testing, pentest
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-19.2%)
Mutual labels:  hacking, penetration-testing, pentest, bug-bounty
Capsulecorp Pentest
Vagrant VirtualBox environment for conducting an internal network penetration test
Stars: ✭ 214 (+71.2%)
Mutual labels:  hacking, pentesting, penetration-testing, pentest
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+2651.2%)
Mutual labels:  scanner, penetration-testing, bug-bounty, pentesting
Offensive Docker
Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the targets.
Stars: ✭ 328 (+162.4%)
Mutual labels:  hacking, pentesting, pentest, bug-bounty
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+279.2%)
Mutual labels:  hacking, pentesting, penetration-testing, pentest
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (-16%)
Mutual labels:  hacking, pentesting, penetration-testing, scanner
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (+459.2%)
Mutual labels:  hacking, penetration-testing, pentest, bug-bounty
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+679.2%)
Mutual labels:  hacking, scanner, pentest
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+596%)
Mutual labels:  hacking, pentesting, penetration-testing
Pythem
pentest framework
Stars: ✭ 1,060 (+748%)
Mutual labels:  hacking, scanner, pentest

PIDRILA

Current Release: v0.1.0 (2020.11.08)

Overview

PIDRILA: Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team for all ethical netstalkers.

Installation & Usage

git clone https://github.com/enemy-submarine/pidrila.git
cd pidrila
python3 pidrila.py -u <URL>

Options

Usage: pidrila.py [OPTIONS]

Options:
  -U, --user-agent TEXT           User-Agent
  -t, --timeout INTEGER           Request timeout  [default: 30]
  -A, --auth TEXT                 Basic HTTP auth, i.e. login:password
  -M, --max-connections-per-host INTEGER
                                  How many simultaneous connections should we
                                  open (per each host)  [default: 16]

  -m, --max-connections INTEGER   How many simultaneous connections should we
                                  open  [default: 128]

  -p, --proxy TEXT                Proxy address, like socks5h://127.0.0.1:9050
  -p, --pathlist FILENAME         Path list
  -L, --url-list FILENAME         Target URL list
  -u, --url TEXT                  Target URL, option is mutually exclusive
                                  with url_list  [required]

  -l, --logs DIRECTORY            Destination directory for the logs
  --http-method [head|get]        HTTP method: GET or HEAD  [default: get]
  --help                          Show this message and exit.

Features

  • Asynchronous
  • Can simultaneously scan unlimited number of sites
  • Keep-alive support
  • HTTP and SOCKS proxy support
  • User agent randomization

Screenshot

Usage examples

Scan single clearweb site

 python3 ./pidrila.py -u http://silenthouse.yoba -M 128

Scan single onion site

 python3 ./pidrila.py -u http://zqktlwi4fecvo6ro.onion -m 16 -M 16 --proxy=socks5h://127.0.0.1:9050

Fast batch scan with custom User-Agent

python3 ./pidrila.py -m 2048 -L darkweb_sites_list.txt --user-agent "Pantusha/2.0 (4.2BSD)"

License

License: GNU General Public License, version 2

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].