All Projects → hahwul → ras-fuzzer

hahwul / ras-fuzzer

Licence: MIT license
RAS(RAndom Subdomain) Fuzzer

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to ras-fuzzer

Dirsearch
Web path scanner
Stars: ✭ 7,246 (+17152.38%)
Mutual labels:  fuzzing, bugbounty, fuzzer
Dictionary Of Pentesting
Dictionary collection project such as Pentesing, Fuzzing, Bruteforce and BugBounty. 渗透测试、SRC漏洞挖掘、爆破、Fuzzing等字典收集项目。
Stars: ✭ 492 (+1071.43%)
Mutual labels:  subdomain, fuzzing, bugbounty
nozaki
HTTP fuzzer engine security oriented
Stars: ✭ 37 (-11.9%)
Mutual labels:  fuzzing, bugbounty, fuzzer
Crlf Injection Scanner
Command line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (+116.67%)
Mutual labels:  fuzzing, bugbounty, fuzzer
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+2219.05%)
Mutual labels:  subdomain, fuzzing, bugbounty
vaf
Vaf is a cross-platform very advanced and fast web fuzzer written in nim
Stars: ✭ 294 (+600%)
Mutual labels:  fuzzing, bugbounty, fuzzer
afl-dyninst
American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries
Stars: ✭ 65 (+54.76%)
Mutual labels:  fuzzing, fuzzer
ksubdomain
Subdomain enumeration tool, asynchronous dns packets, use pcap to scan 1600,000 subdomains in 1 second
Stars: ✭ 320 (+661.9%)
Mutual labels:  subdomain, bugbounty
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (+388.1%)
Mutual labels:  subdomain, bugbounty
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+7973.81%)
Mutual labels:  subdomain, bugbounty
Sonarsearch
A MongoDB importer and API for Project Sonars DNS datasets
Stars: ✭ 297 (+607.14%)
Mutual labels:  subdomain, bugbounty
Oneforall
OneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+9904.76%)
Mutual labels:  subdomain, bugbounty
Sub-Drill
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Stars: ✭ 70 (+66.67%)
Mutual labels:  subdomain, bugbounty
magicRecon
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.
Stars: ✭ 478 (+1038.1%)
Mutual labels:  subdomain, bugbounty
Domainker
BugBounty Tool
Stars: ✭ 40 (-4.76%)
Mutual labels:  subdomain, bugbounty
Fuzzcheck Rs
Structure-aware, in-process, coverage-guided, evolutionary fuzzing engine for Rust functions.
Stars: ✭ 247 (+488.1%)
Mutual labels:  fuzzing, fuzzer
Intruderpayloads
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+6516.67%)
Mutual labels:  fuzzing, bugbounty
Subjack
Subdomain Takeover tool written in Go
Stars: ✭ 1,194 (+2742.86%)
Mutual labels:  subdomain, bugbounty
Acamar
A Python3 based single-file subdomain enumerator
Stars: ✭ 89 (+111.9%)
Mutual labels:  subdomain, bugbounty
Onelistforall
Rockyou for web fuzzing
Stars: ✭ 213 (+407.14%)
Mutual labels:  fuzzing, bugbounty

RAS-Fuzzer (RAndom Subdomain Fuzzer)

Install

go get

$ go get github.com/hahwul/ras-fuzzer

or

clone and build

$ git clone https://github.com/hahwul/ras-fuzzer
$ cd ras-fuzzer
$ go build

Usage

Options

Usage of ./ras-fuzzer:
  -callback string
    	runnning command if me find
    	- Pattern: **PARAM**
    	- e.g: **PARAM**
  -length int
    	Max Length of domain (default 8)
  -target string
    	Target domain (e.g hahwul.com)
  -verbose int
    	(Not Supported) Show/Unshow Log(1=show log, 0=only result) (default 1)

Default Fuzzing

./ras-fuzzer -target google.com
____ ___  ___       ____ _    ___  ___  ____ ____
| . \|  \ | _\  ___ |  _\|| \ |_ \ |_ \ | __\| . \
|  <_| . \[__ \|___\| _\ ||_|\| __]| __]|  ]_|  <_
|/\_/|/\_/|___/     |/   |___/|___/|___/|___/|/\_/      by hahwul
* Fuzzing Information
* Your Target: *.google.com
* Max Length : 8
* Dictionary  : [a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9]
* Combinatorial: (36+8-1)!/((36-1)!*8!) = ༼ つ ◕_◕ ༽つ <= !@#.. many case..
-----------------------------------------------------------------------------------------
[+] w.google.com
[+] d.google.com
[+] vr.google.com
[+] gg.google.com
[+] yp.google.com
[+] id.google.com
[+] 1.google.com
....

Callback

send message to slack (with callback options)

./ras-fuzzer -target google.com -callback "curl -X POST --data-urlencode 'payload={\"channel\": \"#your-slack-channel\", \"username\": \"ras-fuzzer\", \"text\": \"Find subdomain : **PARAM**\", \"icon_emoji\": \":ghost:\"}' https://hooks.slack.com/services/your-slack-webhook-address"

make file (with callback options)

./ras-fuzzer -target google.com -callback "touch **PARAM**"
...
[+] gg.google.com
[+] 1.google.com 
...


$ ls | grep google.com
1.google.com
gg.google.com

Video

asciicast

Donate

I like coffee! I'm a coffee addict.
Buy Me A Coffee

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].