https://github.com/copyleftdev/fatt
A high-performance, modular, asynchronous, and distributed security scanning CLI tool designed to rapidly identify sensitive or exposed files and directories across millions of domains.
https://github.com/copyleftdev/fatt
redteam-tools redteaming rust security-audit security-tools
Last synced: 2 months ago
JSON representation
A high-performance, modular, asynchronous, and distributed security scanning CLI tool designed to rapidly identify sensitive or exposed files and directories across millions of domains.
- Host: GitHub
- URL: https://github.com/copyleftdev/fatt
- Owner: copyleftdev
- Created: 2025-03-22T06:26:00.000Z (2 months ago)
- Default Branch: master
- Last Pushed: 2025-03-22T07:12:01.000Z (2 months ago)
- Last Synced: 2025-03-22T08:20:21.915Z (2 months ago)
- Topics: redteam-tools, redteaming, rust, security-audit, security-tools
- Language: Rust
- Homepage: https://fatt-cli.vercel.app/
- Size: 2.21 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README

# FATT (Find All The Things)
A high-performance, modular, asynchronous, and distributed security scanning CLI tool designed to rapidly identify sensitive or exposed files and directories across millions of domains.
## Features
- 🚀 **High Performance**: Built in Rust for maximum speed and efficiency
- 🔄 **Asynchronous**: Leverages Tokio for concurrent scanning operations
- 🌐 **Distributed**: Scales horizontally across multiple worker nodes
- 🧩 **Modular**: Easily extend with custom scanning rules via YAML configuration
- 💾 **Persistent DNS Cache**: Dramatically improves scanning speed for repeat operations
- 📊 **Comprehensive Reporting**: SQLite storage for efficient result management## Installation
```bash
cargo install fatt
```Or build from source:
```bash
git clone https://github.com/copyleftdev/fatt.git
cd fatt
cargo build --release
```## Quick Start
```bash
# Scan domains from a list using default rules
fatt scan -i domains.txt# Scan with custom rules
fatt scan -i domains.txt -r custom-rules.yaml# Export results to CSV
fatt results export -o findings.csv# Start a worker node for distributed scanning
fatt worker start -m master-ip:port
```## Configuration
FATT uses YAML-based rules for scan configuration. Example:
```yaml
rules:
- name: Git Exposure
path: /.git/HEAD
signature: "ref: refs/"
- name: Env File Exposure
path: /.env
signature: "APP_KEY="
```## Usage
```
USAGE:
fattSUBCOMMANDS:
scan Scan domains for sensitive files and directories
rules Manage scanning rules
results Query and export scan results
dns Manage DNS cache
worker Control distributed worker nodes
help Prints help information
```## Performance Tuning
FATT is designed for high performance but can be further optimized:
- Increase concurrency with `-c/--concurrency` flag
- Adjust batch size with `-b/--batch-size` flag
- Optimize DNS cache lifetime with `--dns-ttl` option## License
MIT License 2025 [copyleftdev](https://github.com/copyleftdev)