Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/r3curs1v3-pr0xy/vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
https://github.com/r3curs1v3-pr0xy/vajra
bug-bounty hacking information-gathering osint pentest-tool pentesting recon scanner vajra web-hacking
Last synced: about 1 month ago
JSON representation
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
- Host: GitHub
- URL: https://github.com/r3curs1v3-pr0xy/vajra
- Owner: r3curs1v3-pr0xy
- License: gpl-3.0
- Archived: true
- Created: 2021-03-12T17:05:47.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2021-10-29T10:43:47.000Z (about 3 years ago)
- Last Synced: 2024-04-13T17:18:00.650Z (8 months ago)
- Topics: bug-bounty, hacking, information-gathering, osint, pentest-tool, pentesting, recon, scanner, vajra, web-hacking
- Language: JavaScript
- Homepage:
- Size: 2.69 MB
- Stars: 684
- Watchers: 24
- Forks: 156
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - r3curs1v3-pr0xy/vajra - Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing. (JavaScript)
README
![logo](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/images/logo.png)
![Stars](https://img.shields.io/github/stars/r3curs1v3-pr0xy/vajra?style=flat)
![NPM Version](https://img.shields.io/badge/NPM-v6.14-blue?style=flat)
[![License: GPL v3](https://img.shields.io/badge/License-GPLv3-blue.svg)](https://www.gnu.org/licenses/gpl-3.0)
![contribution](https://camo.githubusercontent.com/f5054ffcd4245c10d3ec85ef059e07aacf787b560f83ad4aec2236364437d097/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f636f6e747269627574696f6e732d77656c636f6d652d627269676874677265656e2e7376673f7374796c653d666c6174)
[![PyPi Python Versions](https://img.shields.io/pypi/pyversions/yt2mp3.svg)](https://pypi.python.org/pypi/yt2mp3/)
![Demo Youtube](https://camo.githubusercontent.com/80760ab9f96d5aae23525bf95b1fddf638860c80f80100a963ae61bb80ec4dc6/68747470733a2f2f696d672e736869656c64732e696f2f62616467652f64656d6f2d796f75747562652d626c75652e737667)
An automated web hacking framework for web applications
## Table of Content
- [About Vajra](#about-vajra)
* [What is Vajra](#what-is-vajra)
* [Key Feaures](#key-features)
* [What Vajra does](#what-vajra-does)
- [Installation](#installation)
- [Running with docker-compose](#running-with-docker-compose)
- [Tools Used by Vajra](#tools-used-by-vajra)
- [Contributing](#contributing)
- [License](#license)
- [Future Plans/Under Development](#Future-PlansUnder-Development)
- [Credits](#credits)
- [Disclaimer](#disclaimer)
- [FAQ](#faq)#### Detailed insight about Vajra can be found at
https://hackwithproxy.medium.com/introducing-vajra-an-advanced-web-hacking-framework-bd8307a01aa8
## About Vajra
![logo](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/images/home.png)Vajra is an automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing. Vajra has highly customizable target scope based scan feature. Instead of running all the scan on target, it runs only those scan selected by you which will minimize unnecessary traffic and stores output in one place at CouchDB.
Vajra uses most common open source tools which every Bug Hunter runs during their testing on target. It does all the stuffs through web browser with very simple UI that makes it absolute beginner friendly framework.
Analyzing your data from scan result is very important in Bug Bounty. The chances of missing anything is less only if you could visualize your data in proper way and Vajra does so with a lot of filters.
I created this project for my personal use (about 6 months ago) but looking at its usefulness, I decided to make it open-source so that it can save your time and can get some more improvement from community.
#### Currently, I added only 27 unique bug bounty feature to it but more will be added in near future.
# Demo
[![Demo Video](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/images/demo.png)](https://drive.google.com/file/d/1O-KKhK54jXMUPAiOS8ZWnvZ4sFxDHy7a/view)## Key Features
- Highly target specific scan
- Run multiple scans in parallel
- Highly customizable scan based on user requirements
- Absolute beginner friendly Web UI
- Fast (as it is Asynchronous)
- Export result in CSV or directly copy to clipboard
- Telegram Notification## What Vajra does
- [x] Subdomain Scan with IP, Status Code and Title.
- [x] Subdomain Takeover Scan
- [x] Port Scan
- [x] Endpoints Discovery
- [x] Endpoints with Parameter Discovery
- [x] 24/7 Monitor Subdomains
- [x] 24/7 Monitor JavaScript
- [x] Templates Scan using Nuclei
- [x] Fuzz endpoints to find hidden endpoints or critical files (e.g .env)
- [x] Extract JavaScripts
- [x] Fuzz with Custom Generated wordlist
- [x] Extracts Secrets (e.g api keys, hidden javascripts endpoints)
- [x] Checks for Broken Links
- [x] Filter Endpoints based on extensions
- [x] Favicon Hash
- [x] Github Dorks
- [x] CORS Scan
- [x] CRLF Scan
- [x] 403 Bypasser
- [x] Find Hidden Parameters
- [x] Google Hacking
- [x] Shodan Search Queries
- [x] Extract Hidden Endpoints from JavaScript
- [x] Create target based Custom Wordlist
- [x] Vulnerability Scan
- [x] CVE Scan
- [x] CouchDB to store all scan output#### Total Scans
![scans](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/images/scan.png)
#### Result of Scan
![result](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/images/scanned%20%20result.png)
#### Found Subdomains
![subdomains](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/images/subdomains.png)
#### Subdomain Monitoring
![subdomain monitor](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/images/monitoring.png)## Installation
All the installation instructions are available at wiki page. Find the wiki documentation here:https://github.com/r3curs1v3-pr0xy/vajra/wiki/Installation
## Running with docker-compose
1. git clone --recursive https://github.com/r3curs1v3-pr0xy/vajra.git
2. Make changes to files (add api tokens, etc.) [You can skip this]
3. Run ```docker-compose up```.If you wanna make changes later then update files and run ```docker-compose build``` and ```docker-compose up``` again.
For detailed instructions, follow this [URL](https://github.com/r3curs1v3-pr0xy/vajra/wiki/Running-with-docker-compose)
## Tools used by Vajra
All the tools used by Vajra are listed here: [Link](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/CREDITS.md)## Contributing
Thank you for your consideration for making your valuable contributions to Vajra! Start by taking a look at the below mentioned points- Fix any issues/bugs
- Solve opened issues
- Clean code
- Add any new features
- Works on [Future Plans/Under Developement](#Future-PlansUnder-Development)
- Support this project by sponsoring/donating#### Financial Contributors:
[![Deviner](https://avatars.githubusercontent.com/u/61959752?s=60&u=602bba1cc388927a89539410acbd913ff1862e12&v=4)](https://twitter.com/0xdeviner)
[![ABHISAR PANDEY](https://avatars.githubusercontent.com/u/50749078?v=4&s=60)](https://twitter.com/imabhisarpandey)#### Code Contributors:
[![Anas Jamal](https://avatars.githubusercontent.com/u/68706899?s=60&u=79088284cb876cd76fcbef4850066d291cce72c6&v=4)](https://twitter.com/0xanasjamal)
#### If you have some new idea about this project, issue, feedback or found some valuable tool feel free to open an issue or just DM me via [@r3curs1v3_pr0xy](https://twitter.com/r3curs1v3_pr0xy)## If you like Vajra and wants to support
[![cofee](https://camo.githubusercontent.com/c3f856bacd5b09669157ed4774f80fb9d8622dd45ce8fdf2990d3552db99bd27/68747470733a2f2f7777772e6275796d6561636f666665652e636f6d2f6173736574732f696d672f637573746f6d5f696d616765732f6f72616e67655f696d672e706e67)](https://www.buymeacoffee.com/r3curs1v3pr0xy)
#### Paypal: https://www.paypal.me/r3curs1v3pr0xy
#### Bitcoin: 3EB5AsRrzSjMXnPDwSuxnyW1cc2APSHEWr
#### 10% of total donation will go to [Animal Aid Unilimited](https://www.animalaidunlimited.org/).
## License
It is distributed under the GNU GPL v3 license License. See [LICENSE](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/LICENSE) for more information.## Future Plans/Under Development
- Add feature to upload wordlist for bruteforcing
- Add slack/discord notification
- Improve Result UI
- Add server console through web interface
- Schedule Scan
- Take Notes in web UI## Credits
Please take a look at [CREDITS.md](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/CREDITS.md). Thanks to [@maniac_en](https://twitter.com/maniac_en) for helping with version control and repo management.
## Disclaimer
Most of these tools have been developed by the authors of the tool that has been listed in [CREDITS.md](https://github.com/r3curs1v3-pr0xy/vajra/blob/main/CREDITS.md). I just put all the pieces together, plus some extra magic.
This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it's your fault, and your fault only.
## FAQ
- #### What is the accuracy of this framework?
=> Vajra uses only open source tools and scripts so its accuracy depends upon those tools.
- #### What is scalability of this framework?
=> It depends upon the resources you provide to run it.
- #### Does it gives immediate result?
-=> Although Vajra uses asynchronous methods but still it takes some time to complete all the scan. You can see your running scans through ongoing scan tab