{"id":13843505,"url":"https://github.com/wuba/Antenna","last_synced_at":"2025-07-11T19:31:58.576Z","repository":{"id":57869725,"uuid":"503646811","full_name":"wuba/Antenna","owner":"wuba","description":"Antenna是58同城安全团队打造的一款辅助安全从业人员验证网络中多种漏洞是否存在以及可利用性的工具。其基于带外应用安全测试(OAST)通过任务的形式，将不同漏洞场景检测能力通过插件的形式进行集合，通过与目标进行out-bind的数据通信方式进行辅助检测。","archived":false,"fork":false,"pushed_at":"2023-06-06T10:04:37.000Z","size":5235,"stargazers_count":717,"open_issues_count":6,"forks_count":72,"subscribers_count":12,"default_branch":"main","last_synced_at":"2024-08-05T17:37:42.573Z","etag":null,"topics":["antenna","cybersecurity","django","dns-rebinding","dnslog","ftp","http","jndi","jsonp","ldap","mysql","oast","python","rmi","vulnerability-scanners","xss"],"latest_commit_sha":null,"homepage":"http://blog.antenna.cool","language":"JavaScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/wuba.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2022-06-15T06:42:25.000Z","updated_at":"2024-08-01T05:59:09.000Z","dependencies_parsed_at":"2023-01-23T16:15:59.041Z","dependency_job_id":null,"html_url":"https://github.com/wuba/Antenna","commit_stats":null,"previous_names":[],"tags_count":4,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/wuba%2FAntenna","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/wuba%2FAntenna/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/wuba%2FAntenna/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/wuba%2FAntenna/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/wuba","download_url":"https://codeload.github.com/wuba/Antenna/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":225755013,"owners_count":17519186,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["antenna","cybersecurity","django","dns-rebinding","dnslog","ftp","http","jndi","jsonp","ldap","mysql","oast","python","rmi","vulnerability-scanners","xss"],"created_at":"2024-08-04T17:02:11.066Z","updated_at":"2024-11-21T15:31:04.867Z","avatar_url":"https://github.com/wuba.png","language":"JavaScript","readme":"# Antenna\n\n## 免责声明\n\n1. 本工具仅面向 合法授权 的企业安全建设行为与个人学习行为，如您需要测试本工具的可用性，请自行搭建靶机环境。\n2. 如您在使用本工具的过程中存在任何非法行为，您需自行承担相应后果，我们将不承担任何法律及连带责任。\n   在安装并使用本工具前，请您 务必审慎阅读、充分理解各条款内容限制、免责条款或者其他涉及您重大权益的条款可能会以\n   加粗、加下划线等形式提示您重点注意。\n   除非您已充分阅读、完全理解并接受本协议所有条款，否则，请您不要安装并使用本工具。您的使用行为或者您以其他任何明示或者默示方式表示接受本协议的，即视为您已阅读并同意本协议的约束。\n\n## Antenna简介\n\nAntenna是58同城安全团队打造的一款辅助安全从业人员辅助验证网络中多种漏洞是否存在以及可利用性的工具。其基于带外应用安全测试(\nOAST)通过任务的形式，将不同漏洞场景检测能力通过插件的形式进行集合，通过与目标进行Out-of-bind的数据通信方式进行辅助检测。\n\n## Antenna的目标\n\n我们绝不仅仅只是将Antenna做成一款只能监听DNS、HTTP等协议来简单判断无回显类型漏洞的工具，我们的目标是尝试在良好使用体验的基础上支持高度灵活的自定义组件能力，满足用户通过Antenna探索并实现各种应用安全漏洞场景的辅助检测。尽可能得实现通过Antenna这款产品降低各种安全漏洞场景的检测成本。\n\n## 相关网站\n\n博客(已开放)：[Antenna 博客](https://blog.antenna.cool/docs/intro)\n\n演示平台(暂时关闭)：[演示平台](https://jiemuzu.cn)\n\n漏洞靶场(已支持docker部署,docker-compose文件在项目docker目录中)\n：[lcttty/antenna-range:0.0.1](https://github.com/wuba/Antenna/blob/main/docker/docker-compose-range.yaml)\n\n## Antenna_Inside计划\n\n在我们开发Antenna时，就希望能够支持现有市场上流行的漏洞扫描工具漏洞结果回调与主动查询\n,所以我们推出了CallBack与OpenAPI。为了让我们的这两个模块能够更加灵活与优雅。我们决定发起\nAntenna_Inside计划，如果您是使用扫描工具的用户或者作者请联系我们，我们会无条件支持您的项目与\n需求，帮助Antenna更方便的与漏洞扫描流程打通。如果您有推荐打通的项目，也可以在issue中提出来\n\n已加入Antenna_Inside项目\n\n| 项目名称       | 项目地址                                                                       |\n|------------|----------------------------------------------------------------------------|\n| EasyPen    | [https://github.com/lijiejie/EasyPen](https://github.com/lijiejie/EasyPen) |\n\n## 近期使用疑问解答\n\n#### 1、源码部署服务未启动，或者启动了DNS不好使\n\n回答: 该项目暂不推荐使用python3.7版本以下环境部署，请认真查看安装部署教程-源码部署部分，\n检查配置中项目路径与实际项目路径相同，启动后也可以尝试使用`supervisorctl status`\n查看各个组件运行状态\n\n#### 2、关于各类组件的使用说明以及能否再详细的进行说明自定义组件开发教程\n\n回答：文章将在Antenna博客不定时更新，基础文章已有，后续详细的也会有的，作者在加班加点的写，绝不会让各位师傅等太久\n\n#### 3、部分HTTPS请求接收不到\n\n回答：这可能是由于SSL证书的问题，项目使用的是`/conf`目录下测试证书`server.crt`与`server.key`\n建议使用个人证书进行替换(删除测试证书，将自己的证书放在该目录下，名字与测试证书相同)\n\n#### 4、其他问题\n如果您遇到了其他问题可查阅项目issue进行寻找相关解决方案，如果发现并没有其他人遇到和您相关的问题，请新建issue，\n作者会及时回答您的疑问\n\n## 相关教程链接\n\n## 最新公告\n\nDNS_REBINDING 功能演示:[Antenna v1.3.0 版本更新公告(含DNS REBINDING使用教程)](https://blog.antenna.cool/blog/V1.3.0%20update)\n\n### 关于部署\n\n基础部署教程:[安装部署](https://blog.antenna.cool/docs/intro)\n\n隐匿部署教程：[关于Antenna的隐匿性部署](https://blog.antenna.cool/blog/%20%20Secrecy)\n\n前后端分离部署 [Antenna的前后端分离部署](https://blog.antenna.cool/blog/client_server)\n\n### 关于配置\n\n基础配置教程:[基础配置教程](https://blog.antenna.cool/docs/%E5%85%B3%E4%BA%8E%E9%85%8D%E7%BD%AE/config)\n\n域名配置及DNS相关配置:[域名配置及阿里云dns服务修改教程](https://blog.antenna.cool/docs/%E5%85%B3%E4%BA%8E%E9%85%8D%E7%BD%AE/DNS)\n\n开通邮箱通知以及邮箱授权码申请教程:[QQ邮箱授权码申请教程](https://service.mail.qq.com/cgi-bin/help?subtype=1\u0026id=28\u0026no=1001256)\n\n### 关于任务\n\n任务基础使用教程:[如何简单的使用任务](https://blog.antenna.cool/docs/%E5%85%B3%E4%BA%8E%E4%BB%BB%E5%8A%A1/task)\n\n### 关于组件\n\n组件基础使用教程:[Antenna的灵魂-组件Template](https://blog.antenna.cool/docs/%E5%85%B3%E4%BA%8E%E7%BB%84%E4%BB%B6/template)\n\nxss 组件使用教程:[xss组件使用教程](https://blog.antenna.cool/docs/%E5%85%B3%E4%BA%8E%E7%BB%84%E4%BB%B6/xss)\n\n组件开发教程:[如何编写Antenna组件](https://blog.antenna.cool/docs/%E5%85%B3%E4%BA%8E%E7%BB%84%E4%BB%B6/template_demo)\n\n自定义HTTP组件使用教程[自定义HTTP组件使用教程](https://blog.antenna.cool/docs/%E5%85%B3%E4%BA%8E%E7%BB%84%E4%BB%B6/custom_https)\n\n### 关于OPEN_API与CallBack\n\nOPEN_API与CallBack使用教程:[关于OPEN_API与CallBack](https://blog.antenna.cool/docs/api_back)\n\n## 404星链计划\n\n![](https://github.com/knownsec/404StarLink-Project/raw/master/logo.png)\n\nANTENNA 项目 现已加入 [404星链计划](https://github.com/knownsec/404StarLink)\n\n## Stargazers over time\n\n[![Stargazers over time](https://starchart.cc/wuba/Antenna.svg)](https://starchart.cc/wuba/Antenna)\n\n## 联系我们\n\n如果对Antenna有任何建设性意见或 BUG 反馈，欢迎大家提 issue,进交流群 作者也会线下约饭进行奖励🐶\n\n如有问题想与技术同学沟通，请联系并添加微信号：bios_000\n\nAntenna用户交流群：\n\n![img_11.png](imgs/img_11.png)\n\n","funding_links":[],"categories":["漏洞扫描","JavaScript"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwuba%2FAntenna","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fwuba%2FAntenna","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwuba%2FAntenna/lists"}