An open API service indexing awesome lists of open source software.

https://github.com/vmfunc/sif

the blazing-fast pentesting suite.
https://github.com/vmfunc/sif

attack-surface cve-scanner cve-scanning cybersecurity directory-enumeration dirlist dns-enumeration hacktoberfest infosec pentest pentest-scripts pentest-tool pentesting security vulnerability-detection vulnerability-scanners

Last synced: about 1 month ago
JSON representation

the blazing-fast pentesting suite.

Awesome Lists containing this project

README

          

sif



[![go version](https://img.shields.io/github/go-mod/go-version/vmfunc/sif?style=flat-square&color=00ADD8)](https://go.dev/)
[![build](https://img.shields.io/github/actions/workflow/status/vmfunc/sif/go.yml?style=flat-square)](https://github.com/vmfunc/sif/actions)
[![license](https://img.shields.io/badge/license-BSD--3--Clause-blue?style=flat-square)](LICENSE)
[![discord](https://img.shields.io/badge/discord-join-5865F2?style=flat-square&logo=discord&logoColor=white)](https://discord.gg/sifcli)

**[install](#install) ยท [usage](#usage) ยท [modules](#modules) ยท [contribute](#contribute)**

---

## what is sif?

sif is a modular pentesting toolkit written in go. it's designed to be fast, concurrent, and extensible. run multiple scan types against targets with a single command.

```bash
./sif -u https://example.com -all
```

## install

### from releases

grab the latest binary from [releases](https://github.com/vmfunc/sif/releases).

### from source

```bash
git clone https://github.com/dropalldatabases/sif.git
cd sif
make
```

requires go 1.23+

## usage

```bash
# basic scan
./sif -u https://example.com

# directory fuzzing
./sif -u https://example.com -dirlist medium

# subdomain enumeration
./sif -u https://example.com -dnslist medium

# port scanning
./sif -u https://example.com -ports common

# javascript framework detection + cloud misconfig
./sif -u https://example.com -js -c3

# shodan host intelligence (requires SHODAN_API_KEY env var)
./sif -u https://example.com -shodan

# sql recon + lfi scanning
./sif -u https://example.com -sql -lfi

# framework detection (with cve lookup)
./sif -u https://example.com -framework

# everything
./sif -u https://example.com -all
```

run `./sif -h` for all options.

## modules

| module | description |
|--------|-------------|
| `dirlist` | directory and file fuzzing |
| `dnslist` | subdomain enumeration |
| `ports` | port and service scanning |
| `nuclei` | vulnerability scanning with nuclei templates |
| `dork` | automated google dorking |
| `js` | javascript framework detection (next.js, supabase) |
| `c3` | cloud storage misconfiguration scanning |
| `headers` | http header analysis |
| `takeover` | subdomain takeover detection |
| `cms` | cms detection |
| `whois` | whois lookups |
| `git` | exposed git repository detection |
| `shodan` | shodan host intelligence (requires SHODAN_API_KEY) |
| `sql` | sql admin panel and error disclosure detection |
| `lfi` | local file inclusion vulnerability scanning |
| `framework` | web framework detection with version + cve lookup |

## contribute

contributions welcome. see [contributing.md](CONTRIBUTING.md) for guidelines.

```bash
# format
gofmt -w .

# lint
golangci-lint run

# test
go test ./...
```

## community

join our discord for support, feature discussions, and pentesting tips:

[![discord](https://img.shields.io/badge/join%20our%20discord-5865F2?style=for-the-badge&logo=discord&logoColor=white)](https://discord.gg/sifcli)

## contributors



mel
mel

๐Ÿšง ๐Ÿง‘โ€๐Ÿซ ๐Ÿ“† ๐Ÿ›ก๏ธ โš ๏ธ ๐Ÿ’ผ ๐Ÿ’ป ๐ŸŽจ ๐Ÿ’ต ๐Ÿค”
ProjectDiscovery
ProjectDiscovery

๐Ÿ“ฆ
macdoos
macdoos

๐Ÿ’ป
Matthieu Witrowiez
Matthieu Witrowiez

๐Ÿค”
tessa
tessa

๐Ÿš‡ ๐Ÿ’ฌ ๐Ÿ““
Eva
Eva

๐Ÿ“ ๐Ÿ–‹ ๐Ÿ”ฌ ๐Ÿ›ก๏ธ โš ๏ธ ๐Ÿ’ป

## acknowledgements

- [projectdiscovery](https://projectdiscovery.io/) for nuclei and other security tools
- [shodan](https://www.shodan.io/) for infrastructure intelligence

---


bsd 3-clause license ยท made by vmfunc, xyzeva, and contributors