Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/AbelChe/whichAlive
信息收集,批量多线程探测url存活、获取基本信息(标题、ip、长度、跳转、server等)
https://github.com/AbelChe/whichAlive
Last synced: 3 months ago
JSON representation
信息收集,批量多线程探测url存活、获取基本信息(标题、ip、长度、跳转、server等)
- Host: GitHub
- URL: https://github.com/AbelChe/whichAlive
- Owner: AbelChe
- Created: 2022-04-19T03:09:09.000Z (over 2 years ago)
- Default Branch: main
- Last Pushed: 2023-06-18T15:18:45.000Z (over 1 year ago)
- Last Synced: 2024-06-06T20:03:17.499Z (5 months ago)
- Language: Python
- Homepage:
- Size: 3.59 MB
- Stars: 17
- Watchers: 1
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - AbelChe/whichAlive - 信息收集,批量多线程探测url存活、获取基本信息(标题、ip、长度、跳转、server等) (Python)
README
# whichAlive
批量多线程探测url存活
探测存活、获取基本信息(标题、ip、指纹、长度、跳转、server等)
边探测遍输出结果,当前目录下result/urlxxxxxxxxxxxx.csv
输出的csv如果直接用excel打开乱码,可以选择导入数据:数据->获取数据->从文本,然后编码格式选择utf8即可,或者使用macos的numbers直接打开
优点:
- 多线程
- 获取标题
- 识别跳转(状态码、指纹、标题、长度、server均以`->`连接标出)## 使用方法
```
> python whichalive.py -h
__ _ __ ___ ___
_ __/ /_ (_)____/ /_ / | / (_) _____
| | /| / / __ \/ / ___/ __ \/ /| | / / / | / / _ \
| |/ |/ / / / / / /__/ / / / ___ |/ / /| |/ / __/
|__/|__/_/ /_/_/\___/_/ /_/_/ |_/_/_/ |___/\___/ FASTAbout: https://github.com/abelche/whichalive
usage: FAST detect alive targets
python whichalive-air.py -u url.txt
cat url.txt | python whichalive-air.pyoptional arguments:
-h, --help show this help message and exit
-f [FILE], --file [FILE]
URL lists file.
--proxy PROXY Set proxy, such as http://127.0.0.1:8080 or socks5://127.0.0.1:7777
-t THREAD, --thread THREAD
Set max threads, default 20
--timeout TIMEOUT Set request timeout value, default 10s
-d, --debug print some debug information
--no-redirect Set to disallow redirect
--try-again If some error, try again scan that url once
--no-outfile Set to NOT output results to file
```直接识别:
因为用了f-string,所以要 python3.6+```sh
python whichAlive.py
cat url.txt | ./whichalive.py
python whichAlive.py -f xxx.txt
python whichAlive.py -f xxx.txt -t 20
```也可以结合被动扫描工具比如xray
xray 开启7777端口监听被动扫描
```sh
./xray webscan --listen 0.0.0.0:7777 --html-output scan.html
```whichAlive 代理到xray
```sh
python whichAlive.py -f xxx.txt --proxy 127.0.0.1:7777
```联动fofa等
```shell
echo -n 'title="管理后台"' | base64 | xargs -I '{}' curl -s 'https://fofa.info/api/v1/search/[email protected]&key=xxxxxxxxxxxxxxxxxxx&size=30&fields=host&qbase64={}' | jq -r '.results[]' | python whichalive.py --no-outfile
```效果截图:
![](images/3.png)
![](images/4.png)
![](images/2.png)
## TODO
- [x] 增加cms识别
- [ ] 增加waf识别
- [ ] 扫描ip列表、ip段等
- [ ] 识别云waf、CDN