Convert Figma logo to code with AI

s0md3v logoStriker

Striker is an offensive information and vulnerability scanner.

2,212
449
2,212
19

Top Related Projects

19,837

Fast and customizable vulnerability scanner based on simple YAML based DSL.

31,882

Automatic SQL injection and database takeover tool

8,312

Nikto web server scanner

8,489

WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com

4,522

w3af: web application attack and audit framework, the open source web vulnerability scanner.

12,480

The ZAP core project

Quick Overview

Striker is an offensive information and vulnerability scanner designed for penetration testing and reconnaissance. It combines multiple tools and techniques to perform comprehensive scans on target websites, identifying potential security weaknesses and gathering valuable information for further exploitation.

Pros

  • Comprehensive scanning capabilities, including subdomain enumeration, port scanning, and vulnerability detection
  • Integrates multiple tools and techniques into a single, easy-to-use package
  • Actively maintained and regularly updated with new features and improvements
  • Supports both passive and active scanning modes for different security assessment scenarios

Cons

  • May trigger security alerts or be blocked by some target systems due to its aggressive scanning nature
  • Requires careful use to avoid unintended consequences or legal issues when scanning targets without proper authorization
  • Some features may have varying effectiveness depending on the target's security measures and infrastructure
  • Learning curve for users unfamiliar with penetration testing tools and techniques

Getting Started

To get started with Striker, follow these steps:

  1. Clone the repository:

    git clone https://github.com/s0md3v/Striker.git
    
  2. Install the required dependencies:

    cd Striker
    pip install -r requirements.txt
    
  3. Run Striker with a target domain:

    python striker.py example.com
    

Note: Always ensure you have proper authorization before scanning any target. Use Striker responsibly and in compliance with applicable laws and regulations.

Competitor Comparisons

19,837

Fast and customizable vulnerability scanner based on simple YAML based DSL.

Pros of Nuclei

  • More extensive and customizable scanning capabilities with a large library of templates
  • Active development and regular updates from a dedicated team
  • Supports multiple protocols beyond just web (e.g., DNS, TCP, SSH)

Cons of Nuclei

  • Steeper learning curve due to its more complex template system
  • Requires more setup and configuration compared to Striker's simpler approach
  • May be overkill for basic reconnaissance tasks

Code Comparison

Striker (simple usage):

python striker.py example.com

Nuclei (basic scan):

nuclei -u https://example.com -t nuclei-templates/

Key Differences

  • Striker is a Python-based tool focused on web application reconnaissance
  • Nuclei is a Go-based vulnerability scanner with a broader scope and more advanced features
  • Striker provides a quick, all-in-one solution for basic recon, while Nuclei offers more flexibility and depth in scanning

Use Cases

  • Striker: Rapid initial reconnaissance of web applications
  • Nuclei: In-depth vulnerability scanning across multiple protocols and complex scenarios

Both tools have their merits, with Striker being more suitable for quick checks and Nuclei for comprehensive security assessments.

31,882

Automatic SQL injection and database takeover tool

Pros of sqlmap

  • More comprehensive and mature SQL injection testing tool
  • Supports a wider range of database management systems
  • Actively maintained with frequent updates and contributions

Cons of sqlmap

  • Steeper learning curve due to its extensive features
  • Can be slower for quick scans compared to Striker
  • Requires more manual configuration for complex scenarios

Code Comparison

sqlmap

def checkDbms(self):
    for dbms in self.DBMS_DICT:
        if conf.dbms and conf.dbms.lower() == dbms.lower():
            return dbms
    return None

Striker

def check_sqli(url):
    errors = {'MySQL': 'You have an error in your SQL syntax',
              'Oracle': 'ORA-01756',
              'MSSQL': 'Microsoft SQL Native Client error'}
    for db, error in errors.items():
        if error in requests.get(url).text:
            return db
    return None

Summary

sqlmap is a more powerful and versatile SQL injection tool with broader database support and active development. However, it may require more time to master and configure for specific scenarios. Striker, on the other hand, offers a simpler approach for quick scans but lacks the depth and extensive features of sqlmap. The code comparison shows that sqlmap has a more modular approach to DBMS detection, while Striker uses a straightforward dictionary-based method for identifying potential SQL injection vulnerabilities.

8,312

Nikto web server scanner

Pros of Nikto

  • More comprehensive scanning capabilities with a larger database of vulnerabilities
  • Actively maintained with regular updates and a strong community
  • Supports multiple output formats for easy integration with other tools

Cons of Nikto

  • Slower scanning speed compared to Striker
  • Less user-friendly interface, primarily command-line based
  • May generate more false positives due to its extensive checks

Code Comparison

Nikto (Perl):

sub nikto_headers {
    my ($mark) = @_;
    my %headers;
    foreach my $header (split(/\n/, $mark->{'headers'})) {
        my ($key, $value) = split(/:\s*/, $header, 2);
        $headers{lc($key)} = $value;
    }
    return %headers;
}

Striker (Python):

def extract_headers(response):
    headers = {}
    for header, value in response.headers.items():
        headers[header.lower()] = value
    return headers

Both code snippets demonstrate header extraction, but Nikto uses Perl while Striker uses Python. Nikto's implementation is more verbose, splitting the headers manually, while Striker leverages Python's built-in response object for a more concise approach.

8,489

WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com

Pros of WPScan

  • Specialized for WordPress security scanning
  • Extensive database of WordPress vulnerabilities
  • Active development and community support

Cons of WPScan

  • Limited to WordPress sites only
  • Requires Ruby installation and dependencies

Code Comparison

WPScan (Ruby):

def scan_headers
  puts '[+] Checking headers'
  @target.headers.each do |header|
    puts " | #{header}: #{@target.headers[header]}"
  end
end

Striker (Python):

def headers(target):
    print(O+'[!] Requesting headers')
    try:
        r = requests.get(target)
        for k, v in r.headers.items():
            print(G+' '+k+' : '+C+v)
    except:
        print(R+' [-] Exception while requesting headers')

Summary

WPScan is a specialized tool for WordPress security scanning, offering a comprehensive vulnerability database and active community support. However, it's limited to WordPress sites and requires Ruby installation. Striker, on the other hand, is a more general-purpose security scanner written in Python, offering broader functionality but potentially less depth for WordPress-specific issues.

Both tools provide header scanning capabilities, with WPScan using a more concise Ruby implementation and Striker offering a slightly more verbose Python approach with additional error handling.

4,522

w3af: web application attack and audit framework, the open source web vulnerability scanner.

Pros of w3af

  • More comprehensive and feature-rich web application security scanner
  • Actively maintained with regular updates and a larger community
  • Supports a wide range of web technologies and vulnerabilities

Cons of w3af

  • Steeper learning curve due to its complexity
  • Slower scanning speed compared to Striker
  • Requires more system resources to run effectively

Code Comparison

w3af (Python):

def get_long_desc(self):
    return """
    This plugin finds CSRF vulnerabilities.

    The simplest type of csrf is checked, the one that is generated by
    forms.
    """

Striker (Python):

def check_csrf(url):
    form = br.select_form(nr=0)
    br.form['username'] = 'admin'
    br.form['password'] = 'password'
    br.submit()
    if 'Welcome' in br.response().read():
        print(R + '[+] CSRF Vulnerability Found')

While both tools aim to detect CSRF vulnerabilities, w3af's implementation is more modular and part of a larger framework, whereas Striker's approach is more straightforward and integrated into a single script. w3af's code suggests a more comprehensive scanning methodology, while Striker focuses on quick, targeted checks.

12,480

The ZAP core project

Pros of ZAProxy

  • More comprehensive and feature-rich web application security scanner
  • Actively maintained with regular updates and a large community
  • Offers both GUI and CLI interfaces for flexibility in usage

Cons of ZAProxy

  • Steeper learning curve due to its extensive feature set
  • Requires more system resources compared to lightweight alternatives

Code Comparison

ZAProxy (Java):

public class ActiveScan extends AbstractHostPlugin {
    @Override
    public void scan() {
        // Perform active scanning
    }
}

Striker (Python):

def scan(url):
    # Perform scanning
    pass

Key Differences

  • ZAProxy is a comprehensive web application security testing tool, while Striker focuses on information gathering and vulnerability scanning
  • ZAProxy is written in Java, whereas Striker is implemented in Python
  • ZAProxy offers a graphical user interface, while Striker is primarily command-line based

Use Cases

  • ZAProxy: Suitable for in-depth security assessments of web applications, especially in enterprise environments
  • Striker: Ideal for quick reconnaissance and initial vulnerability scanning, particularly useful for bug bounty hunters and penetration testers

Community and Support

ZAProxy has a larger and more active community, with regular updates and extensive documentation. Striker, while popular, has a smaller community and less frequent updates.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README


Striker
Striker

Recon & Vulnerability Scanning Suite

Important Notice

Striker 2.0 is still in prototype phase, which means it's not intended to be used by regular users. It has been made public for contrbutions to make the development faster.
Usage: python3 striker.py example.com

Workflow

Phase 1: Attack Surface Discovery

This phase includes finding subdomains of the user specified domain, filtering alive hosts as well scanning of 1000 most common TCP ports.

Phase 2: Sweeping

Mass scanning of misconfigured HTTP response headers, croassdomain.xml as well as checks for some sensitive files is done in this phase.

Phase 3: Agressive Information Gathering

This phase is dedicated to data gathering by crawling the subdomains. The gathered data is used to find outdated JS libraries, detect CMS and technologies in use.
HTML forms that are tested in later phases for vulnerability detection are also collected during this crawling.

Phase 4: Vulnerability Scanning

[This phase is under development]

Credits

/db/outdated_js.json is taken from retire.js.
/db/tech_signatures.json is taken from Wappalyzer.
/db/waf_signatures.json is extracted (and converted to JSON) from sqlmap's WAF detection modules.
/modules/retirejs.py is a modified version of retirejslib.
`