Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/s0md3v/Striker
Striker is an offensive information and vulnerability scanner.
https://github.com/s0md3v/Striker
cloudflare cms-detector dnsdumpster email harvester information-gathering parameter recon theharvester
Last synced: about 1 month ago
JSON representation
Striker is an offensive information and vulnerability scanner.
- Host: GitHub
- URL: https://github.com/s0md3v/Striker
- Owner: s0md3v
- License: gpl-3.0
- Created: 2017-10-30T07:08:02.000Z (about 7 years ago)
- Default Branch: master
- Last Pushed: 2023-06-04T20:15:11.000Z (over 1 year ago)
- Last Synced: 2024-10-29T17:50:42.243Z (about 1 month ago)
- Topics: cloudflare, cms-detector, dnsdumpster, email, harvester, information-gathering, parameter, recon, theharvester
- Language: Python
- Homepage:
- Size: 212 KB
- Stars: 2,230
- Watchers: 119
- Forks: 451
- Open Issues: 19
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- WebHackersWeapons - Striker
- awesome-termux-hacking - Striker - Striker is an offensive information and vulnerability scanner..[![->](https://img.shields.io/github/stars/s0md3v/Striker.svg?style=social&label=Star&maxAge=2592000)](https://github.com/s0md3v/Striker/stargazers/) (Uncategorized / Uncategorized)
- awesome-hacking-lists - s0md3v/Striker - Striker is an offensive information and vulnerability scanner. (Python)
README
Striker
Recon & Vulnerability Scanning Suite
### Important Notice
Striker 2.0 is still in prototype phase, which means it's not intended to be used by regular users. It has been made public for contrbutions to make the development faster.\
**Usage:** `python3 striker.py example.com`### Workflow
##### Phase 1: Attack Surface Discovery
This phase includes finding subdomains of the user specified domain, filtering alive hosts as well scanning of 1000 most common TCP ports.
##### Phase 2: Sweeping
Mass scanning of misconfigured HTTP response headers, croassdomain.xml as well as checks for some sensitive files is done in this phase.
##### Phase 3: Agressive Information Gathering
This phase is dedicated to data gathering by crawling the subdomains. The gathered data is used to find outdated JS libraries, detect CMS and technologies in use.\
HTML forms that are tested in later phases for vulnerability detection are also collected during this crawling.
##### Phase 4: Vulnerability Scanning
[This phase is under development]### Credits
`/db/outdated_js.json` is taken from [retire.js](https://github.com/RetireJS/retire.js).\
`/db/tech_signatures.json` is taken from [Wappalyzer](https://github.com/AliasIO/Wappalyzer).\
`/db/waf_signatures.json` is extracted (and converted to JSON) from [sqlmap](https://github.com/sqlmapproject/sqlmap)'s WAF detection modules.\
`/modules/retirejs.py` is a modified version of [retirejslib](https://github.com/FallibleInc/retirejslib).\
`