https://github.com/V1n1v131r4/webdiscover
The purpose of this script is to automate the web enumeration process and search for exploits
https://github.com/V1n1v131r4/webdiscover
Last synced: 4 months ago
JSON representation
The purpose of this script is to automate the web enumeration process and search for exploits
- Host: GitHub
- URL: https://github.com/V1n1v131r4/webdiscover
- Owner: V1n1v131r4
- Created: 2021-07-19T18:56:38.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2022-04-19T19:22:55.000Z (over 3 years ago)
- Last Synced: 2024-08-05T17:45:33.858Z (over 1 year ago)
- Language: Shell
- Size: 53.7 KB
- Stars: 117
- Watchers: 4
- Forks: 24
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - V1n1v131r4/webdiscover - The purpose of this script is to automate the web enumeration process and search for exploits (Shell)
README
```
__ __ _ ___ _
/ / /\ \ \___| |__ / (_)___ ___ _____ _____ _ __
\ \/ \/ / _ \ '_ \ / /\ / / __|/ __/ _ \ \ / / _ \ '__|
\ /\ / __/ |_) | / /_//| \__ \ (_| (_) \ V / __/ |
\/ \/ \___|_.__/ /___,' |_|___/\___\___/ \_/ \___|_|
```
The purpose of this script is to automate the web enumeration process and search for exploits and vulns for your target attack surface.
Added Tools (dependencies are installed during script execution):
- seclist
- ffuf
- namelist
- dnsrecon
- subfinder
- whatweb
- gospider
- nuclei
- searchsploit
- aquatone
It creates a directory with the scan outputs, as shown in the example below.

# Usage
Prerequisites
* Docker service installed
If you want to build the container yourself manually, git clone the repo:
```
git clone git@github.com:V1n1v131r4/webdiscover.git
```
Then build your docker container
```
docker build -t webdiscover .
```
After building the container, run the following:
```
docker run --rm -it -v /path/to/local/directory:/webdiscoverData webdiscover
```