All Projects → iamnihal → warf

iamnihal / warf

Licence: MIT license
WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.

Programming Languages

python
139335 projects - #7 most used programming language
HTML
75241 projects

Projects that are alternatives of or similar to warf

Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+215.09%)
Mutual labels:  osint, penetration-testing, reconnaissance
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-15.09%)
Mutual labels:  osint, penetration-testing, reconnaissance
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+6388.68%)
Mutual labels:  osint, penetration-testing, reconnaissance
Intrigue Core
Discover Your Attack Surface!
Stars: ✭ 1,013 (+1811.32%)
Mutual labels:  osint, penetration-testing, reconnaissance
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (+105.66%)
Mutual labels:  osint, penetration-testing, reconnaissance
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-18.87%)
Mutual labels:  osint, penetration-testing, reconnaissance
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+415.09%)
Mutual labels:  osint, penetration-testing, reconnaissance
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+6298.11%)
Mutual labels:  osint, penetration-testing, reconnaissance
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+705.66%)
Mutual labels:  osint, penetration-testing, reconnaissance
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+4707.55%)
Mutual labels:  osint, penetration-testing, reconnaissance
go-spyse
The official wrapper for spyse.com API, written in Go, aimed to help developers build their integrations with Spyse.
Stars: ✭ 25 (-52.83%)
Mutual labels:  osint, reconnaissance
I See You
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Stars: ✭ 246 (+364.15%)
Mutual labels:  osint, reconnaissance
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+375.47%)
Mutual labels:  osint, reconnaissance
Investigo
🔎 Find usernames and download their data across social media.
Stars: ✭ 168 (+216.98%)
Mutual labels:  osint, reconnaissance
Osint Framework
OSINT Framework
Stars: ✭ 3,348 (+6216.98%)
Mutual labels:  osint, reconnaissance
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+167.92%)
Mutual labels:  penetration-testing, reconnaissance
SourceWolf
Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥
Stars: ✭ 132 (+149.06%)
Mutual labels:  osint, reconnaissance
Pdlist
A passive subdomain finder
Stars: ✭ 204 (+284.91%)
Mutual labels:  osint, reconnaissance
frisbee
Collect email addresses by crawling search engine results.
Stars: ✭ 29 (-45.28%)
Mutual labels:  osint, penetration-testing
Argos
This script will automatically set up an OSINT workstation starting from a Ubuntu OS.
Stars: ✭ 73 (+37.74%)
Mutual labels:  osint, reconnaissance

WARF: Web Application Reconnaissance Framework

version python django platform

Dashboard

Try WARF

Username: demo
Password: demopass

⚠️ Since Heroku apps run in a lightweight container called dynos, so any changes to the filesystem while the dyno is running only last until that dyno is shut down or restarted. This operation causes the saved scan results to get deleted from the server and hence you won't be able to see the saved results. Due to this limitation of file storage, the live version of app deployed in Heroku is not stable and might throw errors while performing some operations.

Table of Contents

About WARF

WARF is a Recon framework for the web application. It comprises different tools to perform information gathering on the target such as subdomain enumeration, directory Bruteforce, gathering all sorts of endpoints like Wayback URLs, JS URLs, endpoints from JS files, API/Secret keys, etc.

WARF is highly customizable and allows you to perform a full scan or individual scan on the target. It accumulates the results and shows them in a powerful DataTable through which you can narrow down your searches. WARF also give you the option to add and save target individually and perform different scans on them.

With a Dashboard, you will quickly get the metrics of your activity. WARF confined all your targets together and provide you with a clean and efficient way to search them down with their names.

Main Features

  • Subdomain Enumeration
  • Directory BruteForce
  • Gather Wayback URLs
  • Gather JavaScript URLs
  • Extract links from JS files
  • Extract API/Secret Keys from JS files
  • Supports Background Scan

Screenshots

FullScan

fullscan

Subdomain Enumeration

subdomain

Add Target

target

View Target

target2

View Details

targetview

View Result

result

Installation

You can install WARF in two ways:-

  • By creating a python virtual environment and git cloning the repository.

  1. Create a virtualenv:
$ python3 -m venv <virtual env path>
  1. Activate the virtualenv you have just created:
$ source <virtual env path>/bin/activate
  1. Clone this repository:
$ git clone https://github.com/iamnihal/warf.git
  1. Install the requirements:
$ pip install -r requirements.txt
  1. Apply migrations:
$ python manage.py migrate
  1. Run the server:
$ python manage.py runserver

and load the app at http://127.0.0.1:8000

  • Using Docker

If you don't have Docker installed on your system, you can follow up with the official Docker installation guide.

  1. Start by cloning the repository:
$ git clone https://github.com/iamnihal/warf.git
  1. Build the Docker image:
$ docker build -t warf .
  1. Build and run Docker container:
$ docker run --name warf -d -p 8000:8000 warf

and now your app is ready to launch at http://127.0.0.1:8000

⚠️ Warning:- Change SECRET_KEY in settings.py for the security purpose. To generate your own SECRET_KEY, use this:-

python -c "import secrets; print(secrets.token_urlsafe())"

Contributing

If you want to contribute to this project and make it better, your help is very welcome. As this is my first ever project in Django, there could exist a lot of caveats and other coding related issues. Your contribution to this project helps me to learn and inspire to build more awesome projects in future. Contributing is also a great way to learn more about social coding on Github, new technologies and and their ecosystems. Contributions are what make the open source community such an amazing place to be learn, inspire, and create. Any contributions you make are greatly appreciated.

License

Distributed under the MIT License. See LICENSE for more information.

Acknowledgements and Credits

All the tools in WARF have been created by these awesome people:

  1. Sublist3r:- aboul3la
  2. github-subdomain.py:- gwen001
  3. Dirsearch:- maurosoria
  4. SecretFinder:- m4ll0k
  5. Linkfinder:- GerbenJavado
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].