Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/shriyanss/UtilityTools
Web hacking utility tools in one .ipynb
https://github.com/shriyanss/UtilityTools
Last synced: 3 months ago
JSON representation
Web hacking utility tools in one .ipynb
- Host: GitHub
- URL: https://github.com/shriyanss/UtilityTools
- Owner: shriyanss
- License: gpl-3.0
- Created: 2021-11-21T04:53:26.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-06-17T06:35:30.000Z (over 2 years ago)
- Last Synced: 2024-05-20T12:35:31.965Z (6 months ago)
- Language: Jupyter Notebook
- Size: 34.2 KB
- Stars: 3
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - shriyanss/UtilityTools - Web hacking utility tools in one .ipynb (Jupyter Notebook)
README
# UtilityTools
Web hacking utility tools in one .ipynb# Pro Tip: Run the jupyter notebook file in google colab for faster execution
# Usage
## Python Scripts
All the python scripts does the same things as .ipynb. Just the thing different is it's python script and it takes arguments via command line (params are same as the those in jupyter notebook)## Subdomain Bruteforcer
`wordlist` : The URL to wordlist (default already set)
`target`: Domain of the target
Some wordlists for subdomain bruteforce can be found [here](https://github.com/danielmiessler/SecLists/tree/master/Discovery/DNS)
Just copy the raw URL for desired wordlist and paste it below.
**This tool checks if the host (subdomain) have an IP or not. If yes, then there's chance that subdomain is live**## Custom Subdomain Bruteforcer
`main_url`: The URL of the main web page
`target_host`: Hostname of the target
`protocol_prefix`: Protocol to use [http/https]
`port_suffix`: Port number to check
`wordlist`: URL of the wordlist
This tool checks if the content is matching with the main domain or not. If it matches, it excludes it, and if not, it is printed## Custom subdomain checker
`main_url`: This is the URL of main page to match the code with
`wordlist`: This is the list of URLs containing URLs of subdomain## Mass file finder
`files`: enter the file to search at a list of domains/subdomains (comma seperated value, please)
`subdomainList`: Path to the file containing domains/subdomains (one line each)
`protocol`: Protocol to use (*http/https*)
`port`: Port to use (*1-65535*)
`timeoutSec`: Set timeout for each requestThis tool helps you find some specific files in the targeted domain list. E.g. find .git in all subdomains of target.com
## Display IP addresses
`hostnames`: Path to file containing hostnames to resolve IP of (1 per line)Print the ip address of all domains in list (useful to find host header injection, identifying proxy, etc.)