Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/thenewattacker64/theattackerscanner
Simple Tool for webhacking
https://github.com/thenewattacker64/theattackerscanner
sqlinjection webhacking
Last synced: 1 day ago
JSON representation
Simple Tool for webhacking
- Host: GitHub
- URL: https://github.com/thenewattacker64/theattackerscanner
- Owner: TheNewAttacker64
- Created: 2023-04-04T07:42:15.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2023-04-04T13:37:22.000Z (over 1 year ago)
- Last Synced: 2024-11-08T18:39:18.014Z (about 2 months ago)
- Topics: sqlinjection, webhacking
- Language: Python
- Homepage:
- Size: 930 KB
- Stars: 9
- Watchers: 2
- Forks: 3
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# TheAttackerScanner
Simple Tool for webhackingThe Main Function of this Tool is scanning Urls for SQLI but it has some helpful functions
## Installation For windows
1. Install Python 3.x from the official Python website: https://www.python.org/downloads/
2. Clone this repository using Git:https://github.com/TheNewAttacker64/TheAttackerScanner/
3. py -3 -m pip install -r req.txt## Installation For Linux
1. Clone this repository using Git:https://github.com/TheNewAttacker64/TheAttackerScanner/
2. chmod +x install.sh && sudo ./install.sh### Simple commands
- `theattacker --url http://site.com/example.php?id=1`
- `theattacker urlslist.txt`### Advanced usage
The tool supports several advanced options to customize the scan:
- `--payload` - Specify a custom SQL injection payload to use
- `--use-cookies` - Use cookies in requests
- `--num-threads` - Specify the number of threads to use (default is 10)
- `--proxy` - Specify a proxy to use for requests (format: `http://proxyserver:port`)
- `--random-user-agent` - Generate a random user agent for each request
- `--cert-path` this option for who want to check the request with burpsuiteTo see the full list of options, use the `--help` option:
## Burp Suite Certificate Conversion
If you want to use a Burp Suite certificate with the `--proxy` option, you may need to convert the certificate to a format supported by this tool (PEM format). To do this, use the `--convert-burpcert` option:
### Examples
OneUrl:
![One url](Gifs/oneurl.gif)
LoadingUrlsFromlist:
![loadfile](Gifs/loadfile.gif)
UsingWithBurp:
![burp](Gifs/burptest.gif)