Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/emo-crab/observer_ward
侦查守卫(observer_ward)Web应用和服务指纹识别工具
https://github.com/emo-crab/observer_ward
nmap-vscan nuclei nuclei-templates serivce wappalyzer whatweb
Last synced: 1 day ago
JSON representation
侦查守卫(observer_ward)Web应用和服务指纹识别工具
- Host: GitHub
- URL: https://github.com/emo-crab/observer_ward
- Owner: emo-crab
- License: gpl-3.0
- Created: 2021-08-21T10:11:41.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2024-10-29T02:32:13.000Z (about 2 months ago)
- Last Synced: 2024-10-29T15:40:50.542Z (about 1 month ago)
- Topics: nmap-vscan, nuclei, nuclei-templates, serivce, wappalyzer, whatweb
- Language: Rust
- Homepage: https://emo-crab.github.io/observer_ward/
- Size: 2.75 MB
- Stars: 1,254
- Watchers: 23
- Forks: 135
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-rust - observer_ward - Web application and service fingerprint identification tool (Applications / Security tools)
- awesome-hacking-lists - emo-crab/observer_ward - 侦查守卫(observer_ward)Web应用和服务指纹识别工具 (Rust)
- fucking-awesome-rust - observer_ward - Web application and service fingerprint identification tool (Applications / Security tools)
- fucking-awesome-rust - observer_ward - Web application and service fingerprint identification tool (Applications / Security tools)
README
[![Contributors][contributors-shield]][contributors-url]
[![Forks][forks-shield]][forks-url]
[![Stargazers][stars-shield]][stars-url]
[![Issues][issues-shield]][issues-url]
[![MIT License][license-shield]][license-url]
## 关于这个项目
- 郑重声明:文中所涉及的技术、思路和工具仅供以安全为目的的学习交流使用,任何人不得将其用于非法用途以及盈利等目的,否则后果自行承担。
| 类别 | 说明 |
| ---- | ----------------------------------------------------------------- |
| 作者 | [三米前有蕉皮](https://github.com/cn-kali-team) |
| 团队 | [0x727](https://github.com/0x727) 未来一段时间将陆续开源工具 |
| 定位 | 社区化[指纹库](https://github.com/0x727/FingerprintHub)识别工具。 |
| 语言 | Rust |
| 功能 | 服务和Web应用指纹识别工具 |![Product Name Screen Shot][product-screenshot]
- 基于yaml编写探针,匹配规则和提取器
- 支持服务和Web应用版本识别
- 使用nvd标准通用平台枚举 ([CPE](https://scap.kali-team.cn/cpe/)) 命名规范
- [社区化指纹库](https://github.com/0x727/FingerprintHub)和nmap服务探针
- 集成 [Nuclei](https://github.com/projectdiscovery/nuclei) 验证漏洞## 安装
### 源码安装
- 从源码编译安装,更多可以查看github的action工作流文件 [workflow](https://github.com/emo-crab/observer_ward/blob/main/.github/workflows/post-release.yml)
```bash,no-run
cargo build --release --manifest-path=observer_ward/Cargo.toml
```### 二进制安装
- 从发布页面下载 [release](https://github.com/emo-crab/observer_ward/releases)
- 如果是Mac系统可以通过brew安装### 使用Mac系统brew安装
```bash,no-run
brew install observer_ward
```### Docker镜像
- docker镜像,`observer_ward`只有指纹识别功能
```bash,no-run
➜ docker run --rm -it kaliteam/observer_ward -t http://172.17.0.2
[INFO ] probes loaded: 2223
[INFO ] optimized probes: 7
[INFO ] target loaded: 1
|_uri:[ http://172.17.0.2/ [apache-http] <> (200 OK) ]
|_uri:[ http://172.17.0.2/ [thinkphp] <> (200 OK) ]
```- `kaliteam/observer_ward:nuclei`是内置nuclei,在默认配置文件夹有`plugins`目录,但是更新时间不会最新了,是构建docker时的版本
```bash,no-run
➜ docker run --rm -it kaliteam/observer_ward:nuclei -t http://172.17.0.2 --plugin default
[INFO ] probes loaded: 2223
[INFO ] optimized probes: 7
[INFO ] target loaded: 1
|_uri:[ http://172.17.0.2/ [apache-http] <> (200 OK) ]
|_uri:[ http://172.17.0.2/ [thinkphp] <> (200 OK) ]
|_exploitable: [Critical] thinkphp-5023-rce: ThinkPHP 5.0.23 - Remote Code Execution
|_matched_at: http://172.17.0.2/index.php?s=captcha
|_shell: curl -X 'POST' -d '_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=1' -H 'Accept: */*' -H 'Accept-Language: en' -H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.2.1 Safari/605.3.23' 'http://172.17.0.2/index.php?s=captcha'
```## 入门
```bash,no-run
➜ ~ ./observer_ward -u
➜ ~ ./observer_ward -t http://httpbin.org/
[INFO ] 📇probes loaded: 6183
[INFO ] 🎯target loaded: 1
[INFO ] 🚀optimized probes: 8
🎯:[ http://httpbin.org/ [0example,swagger] (200 OK) ]
```- 使用帮助
```bash,no-run
➜ ./observer_ward --help
Usage: observer_ward [-l ] [-t ] [-p ] [--probe-dir ] [--ua ] [--mode ] [--timeout ] [--thread ] [--proxy ] [--ir] [--ic] [--plugin ] [-o ] [--format ] [--no-color] [--nuclei-args ] [--silent] [--debug] [--config-dir ] [--update-self] [-u] [--update-plugin] [--daemon] [--token ] [--webhook ] [--webhook-auth ] [--api-server ]observer_ward
Options:
-l, --list multiple targets from file path
-t, --target the target (required)
-p, --probe-path customized fingerprint json file path
--probe-dir customized fingerprint yaml file dir
--ua customized ua
--mode mode probes option[tcp,http,all] default: all
--timeout set request timeout.
--thread number of concurrent threads.
--proxy proxy to use for requests
(ex:[http(s)|socks5(h)]://host:port)
--ir include request/response pairs in output
--ic include certificate pairs in output
--plugin customized template dir
-o, --output export to the file
--format output format option[json,csv,txt] default: txt
--no-color disable output content coloring
--nuclei-args poc nuclei engine additional args
--silent silent mode
--debug debug mode
--config-dir customized template dir
--update-self update self
-u, --update-fingerprint
update fingerprint
--update-plugin update plugin
--daemon api background service
--token api Bearer authentication
--webhook send results to webhook server
(ex:https://host:port/webhook)
--webhook-auth the auth will be set to the webhook request header
AUTHORIZATION
--api-server start a web API service (ex:127.0.0.1:8080)
--help display usage information
```| 参数名 | 作用和描述 |
| ----------------------- | ------------------------------------------------------------------------------------------------ |
| -l,--list | 从文件中读取目标列表,一行一个目标 |
| -t,--target | 单个或者多个目标 |
| -p,--probe | json探针路径(如果和`--probe-dir`一起使用,该参数为转换json后的输出文件路径) |
| --probe-dir | yaml探针目录(如果和`--probe`一起使用,会读取该目录下的全部yaml文件转换为一个json文件) |
| --ua | 设置请求头 |
| --mode | 模式:safe和danger,safe只请求首页,dranger会请求特殊路径,容易被waf拦截 |
| --timeout | 请求和连接超时,单位为秒 |
| --thread | 同时识别的线程数,默认为cpu的核数 |
| --proxy | 设置代理服务器,支持http和socks5,例如:`https://username:[email protected]:port` |
| --ir | 在json结果中保存请求和响应,保存请求响应可能比较消耗内存 |
| --ic | 在json结果中保存证书数据 |
| --plugin | 指定nuclei插件路径,会开启nuclei验证漏洞,如果路径为`default`默认调用配置文件夹下的`plugins`目录 |
| -o,--output | 将结果保存到文件,如果文件后缀名是下面格式支持的可以省略`--format`参数 |
| --format | 输出格式:支持`json`,`csv`和`txt`,在保存文件的时候会根据文件后缀自动识别 |
| --no-color | 禁用颜色输出 |
| --nuclei-args | nuclei的额外参数,会按照空格分割追加到调用nuclei参数,例如:`-es info`,排除info插件 |
| --silent | 静默模式,不打印任何信息,常用在命令行管道作为输入源 |
| --debug | 开启调试模式,会输出更多信息,包括请求和响应,提取到的图标哈希,nuclei调用命令行等信息 |
| --config-dir | 指定配置文件夹,默认在用户配置文件夹下的`observer_ward`目录 |
| --update-self | 更新程序自身版本,也就是该项目的`defaultv4`发布标签 |
| -u,--update-fingerprint | 更新指纹到配置文件夹,会覆盖`web_fingerprint_v4.json`文件 |
| --update-plugin | 更新社区nuclei插件到配置文件夹,会自动解压zip并且覆盖`plugins`目录 |
| --daemon | api服务后台运行,window不支持 |
| --token | api服务认证token |
| --webhook | 要将识别结果通过webhook发送到指定url |
| --webhook-auth | webhook的`AUTHORIZATION`认证 |
| --api-server | api监听地址的端口 |
| --help | 打印帮助信息 |### 更新指纹库
- 从github下载指纹库,默认只更新web指纹,如果需要加载服务指纹需要自行下载[service_fingerprint_v4.json](https://github.com/0x727/FingerprintHub/blob/main/service_fingerprint_v4.json)
到配置文件夹。- 默认不更新服务指纹
```bash,no-run
➜ ./observer_ward -u
```- 默认的指纹文件名有两个`web_fingerprint_v4.json`和`service_fingerprint_v4.json`,如果在配置文件夹中存在将会自动加载。
- 例如:`web_fingerprint_v4.json`文件在配置文件夹下的路径| 操作系统 | 保存路径 |
| -------- | ------------------------------------------------------------------------------ |
| Windows | C:\Users\Alice\AppData\Roaming\observer_ward\web_fingerprint_v4.json |
| Linux | /home/alice/.config/observer_ward/web_fingerprint_v4.json |
| macOS | /Users/Alice/Library/Application Support/observer_ward/web_fingerprint_v4.json |- 指定yaml文件夹`--probe-dir`和单个json文件`--probe-path`参数将全部yaml文件转换为一个单json文件,方便携带
- 然后将这个json文件复制到配置文件夹```base,no-run
➜ ./observer_ward --probe-dir web_fingerprint --probe-dir service_fingerprint/null -p fingerprint_v4.json
[INFO ] ℹ️ convert the 6183 yaml file of the probe directory to a json file fingerprint_v4.json
```- 例如你可以将`FingerprintHub`项目下的服务指纹中`null`探针转换为json文件,并保存到配置文件夹
```
➜ ~ ./observer_ward --probe-dir FingerprintHub/service-fingerprint/null -p .config/observer_ward/service_fingerprint_v4.json
[INFO ] ℹ️ convert the 3960 yaml file of the probe directory to a json file .config/observer_ward/service_fingerprint_v4.json
```### 调试模式
- 使用`--debug`开启调试模式,可以看到更详细的输出结果
```bash,no-run
➜ ./observer_ward -t http://httpbin.org -p observer_ward/examples/json.yaml --debug
[INFO ] 📇probes loaded: 1
[INFO ] 🎯target loaded: 1
[INFO ] 🚀optimized probes: 1
[DEBUG] start: http://httpbin.org/
[DEBUG] Request {
uri: http://httpbin.org/ip,
version: HTTP/1.1,
method: GET,
headers: {
"accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8",
"content-type": "application/json",
},
body: None,
raw_request: None,
}
[DEBUG] Response {
version: HTTP/1.1,
uri: http://httpbin.org/ip,
status_code: 200,
headers: {
"date": "Mon, 08 Jul 2024 13:19:59 GMT",
"content-type": "application/json",
"content-length": "32",
"connection": "keep-alive",
"server": "gunicorn/19.9.0",
"access-control-allow-origin": "*",
"access-control-allow-credentials": "true",
},
extensions: Extensions,
body: Some(
{
"origin": "1.1.1.1"
}
,
),
}
[DEBUG] end: http://httpbin.org/
🎯:[ http://httpbin.org/]
🎯:[ http://httpbin.org/ip [httpbin-ip] <>]
|_📰: ip:["1.1.1.1"]
```### 目标输入
- 使用`--target`或者`-t`指定一个或者多个uri目标
```bash,no-run
➜ ~ ./observer_ward -t https://www.example.com/ -t http://httpbin.org
[INFO ] 📇probes loaded: 6183
[INFO ] 🎯target loaded: 2
[INFO ] 🚀optimized probes: 8
🎯:[ https://www.example.com/ (200 OK) ]
🎯:[ http://httpbin.org/ [0example,swagger] (200 OK) ]
```- 使用`--list`或者`-l`指定一个目标列表文件
```bash,no-run
➜ ~ ./observer_ward -l target.txt
[INFO ] 📇probes loaded: 6183
[INFO ] 🎯target loaded: 3
[INFO ] 🚀optimized probes: 8
🎯:[ tcp://127.0.0.1:22/ [ssh] ]
|_📰: version:[9.7] info:[protocol 2.0]
🎯:[ http://172.17.0.2/ [apache-http] <>]
🎯:[ http://172.17.0.2/ [thinkphp] <>]
🎯:[ http://httpbin.org/ [swagger,0example] (200 OK) ]
```- 从标准输入读取目标
```bash,no-run
➜ ~ echo http://172.17.0.2 | ./observer_ward
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
🎯:[ http://172.17.0.2/ [apache-http] <>]
🎯:[ http://172.17.0.2/ [thinkphp] <>]
```### 结果输出
- 使用`--output`或者`-o`将结果保存到指定文件路径
```bash,no-run
➜ ~ ./observer_ward -t https://www.example.com/ -o output.txt
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
➜ ~ cat output.txt
🎯:[ https://www.example.com/ (200 OK) ]
```- 如果是保存到文件输出格式会根据文件后缀自动切换,也可以使用`--format`参数指定输出格式,支持: `txt`,`json`,`csv`
```bash,no-run
➜ ~ ./observer_ward -t https://httpbin.org/ -o output.json
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
➜ ~ cat output.json
{"https://httpbin.org/":{"title":["httpbin.org"],"status":200,"favicon":{"https://httpbin.org/static/favicon.ico":{"md5":"3aa2067193b2ed83f24c30bd238a717c","mmh3":"-1296740046"}},"name":["swagger"],"fingerprints":[{"matcher-results":[{"template":"swagger","info":{"name":"swagger","author":"cn-kali-team","tags":"detect,tech,swagger","severity":"info","metadata":{"product":"swagger","vendor":"00_unknown","verified":true}},"matcher-name":["swagger-ui.css"],"extractor":{}}],"matched-at":"https://httpbin.org/"}],"nuclei":{}}}
```- 再保存文件的同时也会在终端打印进度信息,如果要想只打印纯结果数据可以使用`--silent`开启静默模式,例如:我只想打印`json`
格式的数据并输出到jq```bash,no-run
➜ ~ ./observer_ward_amd64 -t http://172.17.0.2 --format json --ir --ic --silent |jq
```- 其中的`--ir`和`--ic`分别为保存结果的请求响应和证书信息
- 使用`--webhook`指定要将结果发送到的服务器url,如果webhook服务器有认证也可以使用`--webhook-auth`添加值到`Authorization`
请求头```python
from flask import Flask, requestapp = Flask(__name__)
@app.route("/webhook", methods=['POST'])
def observer_ward_webhook():
print("Authorization: ", request.headers.get("Authorization"))
print(request.json)
return 'ok'if __name__ == '__main__':
app.run()
```- 例如先在本地启动一个简易webhook服务器
```bash,no-run
➜ observer_ward git:(main) ✗ python observer_ward/examples/webhook.py
* Serving Flask app 'webhook'
* Debug mode: off
WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.
* Running on http://127.0.0.1:5000
Press CTRL+C to quit
```- 将结果发送到本地webhook服务器:`http://127.0.0.1:5000`,当识别完成后你将可以在webhook服务器接收到结果
```bash,no-run
➜ ~ ./observer_ward -t http://httpbin.org --webhook http://127.0.0.1:5000/webhook --webhook-auth 22e038328151a7a06fd4ebfa63a10228
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
🎯:[ http://httpbin.org/ [swagger,0example] (200 OK) ]
```### 更新nuclei插件
- 使用`--update-plugin`更新nuclei插件到配置文件夹的`plugins`目录
- 当然你也可以手动将[plugins.zip](https://github.com/0x727/FingerprintHub/releases/download/defaultv4/plugins.zip)
下载到配置文件夹并解压
- 注意:每次更新会将原来插件文件夹删除掉再解压,如果你有自己的插件需要单独存放在别的文件夹### 集成nuclei验证漏洞
- 开启该功能前先安装最新版的[nuclei](https://github.com/projectdiscovery/nuclei)到系统环境变量,使得程序可以在命令行中正常调用
- 使用`--plugin`指定nuclei的template文件夹开启nuclei,这个`plugins`文件夹可以到社区指纹库项目下载
- 当`--plugin`的参数为`default`时,默认使用配置文件夹中的`plugins`文件夹,也就是使用`--update-plugin`下载的插件
- 文件夹结构为`厂商/产品/nuclei的yaml文件`,如果识别到的指纹解析cpe后得到了厂商和产品在这个文件夹可以找到就会调用这个文件夹下面的yaml进行漏洞验证
- 例如:指纹识别到了`tomcat`,通过解析cpe得到厂商为`apache`和产品为`tomcat`,调用`apache/tomcat`文件夹下面的全部yaml验证漏洞```bash,no-run
➜ ~ ./observer_ward -t http://172.17.0.2/ --plugin default
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🎯target loaded: 1
🎯:[ http://172.17.0.2/ [apache-http] <>]
🎯:[ http://172.17.0.2/ [thinkphp] <>]
|_🐞: [Critical] thinkphp-5023-rce: ThinkPHP 5.0.23 - Remote Code Execution
|_🔥: http://172.17.0.2/index.php?s=captcha
|_🐚: curl -X 'POST' -d '_method=__construct&filter[]=phpinfo&method=get&server[REQUEST_METHOD]=1' -H 'Accept: */*' -H 'Accept-Language: en' -H 'Content-Type: application/x-www-form-urlencoded' -H 'User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/16.5 Safari/605.1.15 Ddg/17.4' 'http://172.17.0.2/index.php?s=captcha'
```### 开启Web服务
- 使用`--api-server`指定监听IP和端口,`--token`设置api的`Bearer`认证
```bash,no-run
➜ ~ ./observer_ward --api-server 127.0.0.1:8000 --token 22e038328151a7a06fd4ebfa63a10228
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🌐API service has been started: http://127.0.0.1:8000/v1/observer_ward
[INFO ] 📔:curl --request POST \
--url http://127.0.0.1:8000/v1/observer_ward \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":["https://httpbin.org/"]}'
[INFO ] 🗳:[result...]
```- 使用curl请求api,同时设置`Authorization`参数
```bash,no-run
➜ ~ curl --request POST \
--url http://127.0.0.1:8000/v1/observer_ward \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":["https://httpbin.org/"]}'
{"https://httpbin.org/":{"title":["httpbin.org"],"status":200,"favicon":{"https://httpbin.org/static/favicon.ico":{"md5":"3aa2067193b2ed83f24c30bd238a717c","mmh3":"-1296740046"}},"name":["swagger"],"fingerprints":[{"matcher-results":[{"template":"swagger","info":{"name":"swagger","author":"cn-kali-team","tags":"detect,tech,swagger","severity":"info","metadata":{"product":"swagger","vendor":"00_unknown","verified":true}},"matcher-name":["swagger-ui.css"],"extractor":{}}],"matched-at":"https://httpbin.org/"}],"nuclei":{}}}
```- 通过api获取当前config,这些字段都是可以通过每次的POST请求创建识别任务中配置
```bash,no-run
➜ ~ curl --request GET \
--url http://127.0.0.1:8000/v1/config \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--header 'Content-Type: application/json'
{"target":[],"ua":"Mozilla/5.0 (X11; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/94.0","timeout":10,"thread":4,"ir":false,"ic":false,"update-fingerprint":false,"update-plugin":false,"webhook":null,"webhook-auth":null}
```- 设置`update-plugin`和`update-fingerprint`为`true`更新指纹库和nuclei的插件库
```bash,no-run
➜ ~ curl --request POST \
--url http://127.0.0.1:8000/v1/config \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":[],"update-plugin":true,"update-fingerprint":true}'
{"target":[],"ua":"Mozilla/5.0 (X11; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/94.0","timeout":10,"thread":4,"ir":false,"ic":false,"update-fingerprint":true,"update-plugin":true,"webhook":null,"webhook-auth":null
```- 如果同时开启了`--webhook`或者提交的任务配置中的`webhook`不为空,请求api后会在后台运行任务,结果将通过webhook发送到指定服务器
- 如果不想监听本地端口也可以指定`--api-server`参数为unix-socket文件路径,使用socket over http
```bash,no-run
➜ ~ ./observer_ward --api-server /tmp/observer_ward.socket
[INFO ] 📇probes loaded: 6183
[INFO ] 🚀optimized probes: 8
[INFO ] 🌐API service has been started: /tmp/observer_ward.socket
[INFO ] 📔:curl --request POST \
--unix-socket /tmp/observer_ward.socket \
--url http://localhost/v1/observer_ward \
--header 'Authorization: Bearer 22e038328151a7a06fd4ebfa63a10228' \
--json '{"target":["https://httpbin.org/"]}'
[INFO ] 🗳:[result...]
```## 提交指纹
- observer_ward使用到的指纹规则全部来自[FingerprintHub](https://github.com/0x727/FingerprintHub)项目。
- 如果需要获取指纹库和提交指纹规则,请查看[FingerprintHub](https://github.com/0x727/FingerprintHub)项目。## 为observer_ward做贡献
### 提交代码
- 点击Fork按钮克隆这个项目到你的仓库
```bash,no-run
git clone [email protected]:你的个人github用户名/observer_ward.git
```- 添加上游接收更新
```bash,no-run
cd observer_ward
git remote add upstream [email protected]:emo-crab/observer_ward.git
git fetch upstream
```- 配置你的github个人信息
```bash,no-run
git config --global user.name "$GITHUB_USERNAME"
git config --global user.email "$GITHUB_EMAIL"
git config --global github.user "$GITHUB_USERNAME"
```- 拉取所有分支的规则
```bash,no-run
git fetch --all
git fetch upstream
```- **不要**直接在`main`分支上修改,例如我想修改某个bug,创建一个新的分支并切换到新的分支。
```bash,no-run
git checkout -b dev
```- 修改完成后,测试通过
- 跟踪修改和提交Pull-Requests。```bash,no-run
git add 你添加或者修改的文件名
git commit -m "添加你的描述"
git push origin dev
```- 打开你Fork这个项目的地址,点击与上游合并,等待审核合并代码。
## License
Distributed under the `GPL-3.0-only` License. See `LICENSE` for more information.
## Contact
Your Name - [@Kali_Team](https://twitter.com/Kali_Team) - [email protected]
Project Link: [https://github.com/emo-crab/observer_ward](https://github.com/emo-crab/observer_ward)
## Acknowledgments
- [slinger](https://github.com/emo-crab/slinger)
- [nuclei](https://github.com/projectdiscovery/nuclei)## Stargazers over time
[![Stargazers over time](https://starchart.cc/emo-crab/observer_ward.svg)](https://github.com/emo-crab/observer_ward)
[contributors-shield]: https://img.shields.io/github/contributors/emo-crab/observer_ward.svg?style=for-the-badge
[contributors-url]: https://github.com/emo-crab/observer_ward/graphs/contributors
[forks-shield]: https://img.shields.io/github/forks/emo-crab/observer_ward.svg?style=for-the-badge
[forks-url]: https://github.com/emo-crab/observer_ward/network/members
[stars-shield]: https://img.shields.io/github/stars/emo-crab/observer_ward.svg?style=for-the-badge
[stars-url]: https://github.com/emo-crab/observer_ward/stargazers
[issues-shield]: https://img.shields.io/github/issues/emo-crab/observer_ward.svg?style=for-the-badge
[issues-url]: https://github.com/emo-crab/observer_ward/issues
[license-shield]: https://img.shields.io/github/license/emo-crab/observer_ward.svg?style=for-the-badge
[license-url]: https://github.com/emo-crab/observer_ward/blob/master/LICENSE.txt
[product-screenshot]: images/screenshot.png
[crates-shield]: https://img.shields.io/crates/v/observer_ward.svg?style=for-the-badge
[crates-url]: https://crates.io/crates/observer_ward