All Projects → s0md3v → Striker

s0md3v / Striker

Licence: gpl-3.0
Striker is an offensive information and vulnerability scanner.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Striker

H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+16.86%)
Mutual labels:  email, recon, theharvester
Favfreak
Making Favicon.ico based Recon Great again !
Stars: ✭ 564 (-69.53%)
Mutual labels:  recon, information-gathering
Theharvester
E-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+233.6%)
Mutual labels:  recon, information-gathering
Github Recon
GitHub Recon — and what you can achieve with it!
Stars: ✭ 47 (-97.46%)
Mutual labels:  recon, information-gathering
Oneforall
OneForAll是一款功能强大的子域收集工具
Stars: ✭ 4,202 (+127.01%)
Mutual labels:  recon, information-gathering
Zen
Find emails of Github users
Stars: ✭ 343 (-81.47%)
Mutual labels:  recon, information-gathering
Reconspider
🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
Stars: ✭ 621 (-66.45%)
Mutual labels:  recon, information-gathering
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-92.33%)
Mutual labels:  recon, information-gathering
Recondog
Reconnaissance Swiss Army Knife
Stars: ✭ 1,069 (-42.25%)
Mutual labels:  recon, information-gathering
Cloudfail
Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
Stars: ✭ 1,239 (-33.06%)
Mutual labels:  cloudflare, recon
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-93.73%)
Mutual labels:  recon, information-gathering
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-85.47%)
Mutual labels:  recon, information-gathering
querytool
Querytool is an OSINT framework based on Google Spreadsheets. With this tool you can perform complex search of terms, people, email addresses, files and many more.
Stars: ✭ 104 (-94.38%)
Mutual labels:  recon, information-gathering
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+239.49%)
Mutual labels:  recon, information-gathering
asnap
asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
Stars: ✭ 28 (-98.49%)
Mutual labels:  recon, information-gathering
Holehe
holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
Stars: ✭ 568 (-69.31%)
Mutual labels:  email, information-gathering
Iky
OSINT Project
Stars: ✭ 203 (-89.03%)
Mutual labels:  email, recon
osint
Docker image for osint
Stars: ✭ 92 (-95.03%)
Mutual labels:  recon, harvester
Th3inspector
Th3Inspector 🕵️ Best Tool For Information Gathering 🔎
Stars: ✭ 1,041 (-43.76%)
Mutual labels:  cloudflare, information-gathering
Yotter
yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage
Stars: ✭ 118 (-93.63%)
Mutual labels:  recon, information-gathering


Striker
Striker

Recon & Vulnerability Scanning Suite

Important Notice

Striker 2.0 is still in prototype phase, which means it's not intended to be used by regular users. It has been made public for contrbutions to make the development faster.
Usage: python3 striker.py example.com

Workflow

Phase 1: Attack Surface Discovery

This phase includes finding subdomains of the user specified domain, filtering alive hosts as well scanning of 1000 most common TCP ports.

Phase 2: Sweeping

Mass scanning of misconfigured HTTP response headers, croassdomain.xml as well as checks for some sensitive files is done in this phase.

Phase 3: Agressive Information Gathering

This phase is dedicated to data gathering by crawling the subdomains. The gathered data is used to find outdated JS libraries, detect CMS and technologies in use.
HTML forms that are tested in later phases for vulnerability detection are also collected during this crawling.

Phase 4: Vulnerability Scanning

[This phase is under development]

Credits

/db/outdated_js.json is taken from retire.js.
/db/tech_signatures.json is taken from Wappalyzer.
/db/waf_signatures.json is extracted (and converted to JSON) from sqlmap's WAF detection modules.
/modules/retirejs.py is a modified version of retirejslib.
`

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].