Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/blackhatethicalhacking/terminatorz

TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
https://github.com/blackhatethicalhacking/terminatorz

bugbounty bugbounty-tool hacking offensive-security penetration-testing pentesting redteam

Last synced: 8 days ago
JSON representation

TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.

Awesome Lists containing this project

README

        

# BHEH's TerminatorZ


BHEH


TerminatorZ is written by Chris "SaintDruG" Abou-Chabke from Black Hat Ethical Hacking and is designed for Offensive Security attacks.

Black Hat Ethical Hacking







# Description

TerminatorZ is a highly sophisticated and efficient web security tool that scans for potential vulnerabilities in your web applications. It uses a combination of advanced techniques, including using popular tools like waybackurls and curl, to scan your web applications and highlight any potential vulnerabilities but in a passive and quick way for a quick look. The results are displayed in an easy-to-read format in the terminal, and only vulnerable results are saved for further investigation. With its lightweight and fast nature, TerminatorZ is the perfect tool for any RED Teamer.

# What Makes TerminatorZ Unique:

TerminatorZ is special because it's a highly customized for quick and speed high priority known CVES. The script then reads each URL from urls.txt and checks for various vulnerabilities including RCE, CSRF, LFI, open redirect, Log4J, RFI, path traversal, and SQL injection. For each vulnerability, the script performs a test by sending a specific HTTP request and looking for a specific response.

If the vulnerability is detected, the script will write a message to the domain.txt file indicating that the URL is vulnerable. If the vulnerability is not detected, the script will write a message indicating that the URL is not vulnerable.

**Total POCs it will check so far after v2: 24**

It is also Special well, because:

![giphy](https://user-images.githubusercontent.com/13942386/220471761-3c554abf-ece4-442f-84de-2b28b5f02329.gif)

# The Flow & Methodology

The tool starts by asking the user to input the domain they wish to scan. It then creates a folder to store the results and starts the scan. The scan utilizes curl to make HTTP requests to the target domain and checks for various vulnerabilities by injecting known payloads. The tool then checks the responses for indicators of exploitation and validates the results to determine if the target is vulnerable.

The tool's methodology is carefully designed to ensure that each type of vulnerability is checked specifically and thoroughly. The tool employs a highly analytical and methodical approach to the scanning process, which results in the identification of even the most elusive vulnerabilities. The tool's logic is designed to be highly efficient and effective, making it the ultimate choice for red team security experts and web security professionals.

In conclusion, TerminatorZ offers a combination of technology, methodology, and expert logic makes it the ultimate tool for identifying and mitigating web application vulnerabilities. Speed is sometimes needed, if you want more tools that do not focus on speed, please make sure to check our other ones :)

# Features:

Scans for various web application vulnerabilities, including:

- File Upload

- Command Injection

- Host Header Injection

- HTTP Parameter Pollution (HPP)

- Clickjacking

- CORS Misconfiguration

- Sensitive Data Exposure

- Session Fixation

- XSS (Cross-site scripting)

- SSRF (Server-side request forgery)

- XXE (XML external entity)

- Insecure deserialization

- Remote Code Execution via Shellshock (RCE)

- SQL Injection (SQLi)

- Cross-Site Scripting (XSS)

- Cross-Site Request Forgery (CSRF)

- Remote Code Execution (RCE)

- Log4J

- Directory Traversal (DT)

- File Inclusion (FI)

- Sensitive Data Exposure (SDE)

- Server Side Request Forgery (SSRF)

- Shell Injection (SI)

- Broken Access Control (BAC)

- Generates Random Sun Tzu Quote for Red Teamers, Checks if you are connected to the Internet too!

- Utilizes tools such as waybackurls, curl, and others for comprehensive vulnerability assessments

- Lightweight and fast, delivering results in real-time directly to the terminal

- Only reports vulnerabilities, making it easy to prioritize and remediate vulnerabilities in a timely manner

# Screenshot

![One](https://github.com/user-attachments/assets/61214770-9840-47ce-9d9c-a75b5d14d24f)
![Two](https://github.com/user-attachments/assets/d3f89e26-59a9-43d9-ac0e-e3118539ce21)
![Three](https://github.com/user-attachments/assets/a6220871-c9cb-4f2a-ab30-b97379ef92fa)

# Expansion

Feel free to expand more Pocs, and integrate it, the idea is speed, and sending 1 curl, send a push!

# Requirements:

- waybackurls: This tool can be installed by running `go install github.com/tomnomnom/waybackurls@latest`

- cURL: This tool is commonly pre-installed on Kali Linux and Ubuntu, but can be installed by running `apt-get install curl` on Ubuntu or `brew install curl` on MacOS

- httpx: is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryable http library. To install it: `go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest`

- lolcat: `pip install lolcat` for rainbow beauty
- You also need, toilet, fortune-mod but the new update will install them in the beginning.

# Installation

`git clone https://github.com/blackhatethicalhacking/TerminatorZ.git`

`cd TerminatorZ`

`chmod +x TerminatorZ.sh`

`./TerminatorZ.sh`

# Compatibility:

This tool has been tested on Kali Linux, Ubuntu and MacOS.

# Latest Version & Updates:

## Version 2.0:

- Added 8 new Vulnerabilities with exploits:

• File Upload

• Command Injection

• Host Header Injection

• HTTP Parameter Pollution (HPP)

• Clickjacking

• CORS Misconfiguration

• Sensitive Data Exposure

• Session Fixation

## Version 1.1:

- Enhancement in the output, Red for not vulnerable, Green for vulnerable.
- Counts URLs before starting the attack, which gives you an estimate, based on final URLs.
- Added 5 more new Vulnerabilities with exploits:

• XSS (Cross-site scripting)

• SSRF (Server-side request forgery)

• XXE (XML external entity)

• Insecure deserialization

• Remote Code Execution via Shellshock (RCE)

# To Do

A lot will be done and added to it, this is the starting point. If you want to contribute, send me a commit explaining what more / better you are doing, and will credit you if it fits the model of design in mind!

# Disclaimer

This tool is provided for educational and research purpose only. The author of this project are no way responsible for any misuse of this tool.
We use it to test under NDA agreements with clients and their consents for pentesting purposes and we never encourage to misuse or take responsibility for any damage caused !


BHEH Official Merch


Introducing our Merch Store, designed for the Offensive Security community. Explore a curated collection of apparel and drinkware, perfect for both professionals and enthusiasts. Our selection includes premium t-shirts, hoodies, and mugs, each featuring bold hacking-themed slogans and graphics that embody the spirit of red teaming and offensive security.
Hack with style and showcase your dedication to hacker culture with gear that’s as dynamic and resilient as you are. 😊