GhostTroops / scan4all

Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
https://scan4all.51pwn.com
BSD 3-Clause "New" or "Revised" License
5.58k stars 666 forks source link
0day attack auto brute-force bugbounty bugbounty-tools golang hacker hacktools nmap nuclei pentest-tool recon security-scanner security-tools ssh tools vulnerabilities-scan vulnerability-detection vulnerability-scanners

Twitter Follow on Twitter GitHub Followers 💬

README_中文Compile/Install/RunParameter DescriptionHow to useScenarioPOC ListCustom ScanBest Practices

Features

image

  export PPSSWWDD=yourRootPswd 

More references: config/doNmapScan.sh By default, naabu is used to complete port scanning -stats=true to view the scanning progress Can I not scan Ports?

noScan=true ./scan4all -l list.txt -v
# nmap result default noScan=true 
./scan4all -l nmapRssuilt.xml -v
TAG COUNT AUTHOR COUNT DIRECTORY COUNT SEVERITY COUNT TYPE COUNT
cve 1430 daffainfo 631 cves 1407 info 1474 http 3858
panel 655 dhiyaneshdk 584 exposed-panels 662 high 1009 file 76
edb 563 pikpikcu 329 vulnerabilities 509 medium 818 network 51
lfi 509 pdteam 269 technologies 282 critical 478 dns 17
xss 491 geeknik 187 exposures 275 low 225
wordpress 419 dwisiswant0 169 misconfiguration 237 unknown 11
exposure 407 0x_akoko 165 token-spray 230
cve2021 352 princechaddha 151 workflows 189
rce 337 ritikchaddha 137 default-logins 103
wp-plugin 316 pussycat0x 133 file 76

281 directories, 3922 files.

how to install

download from Releases

go install github.com/GhostTroops/scan4all@2.8.9
scan4all -h

how to use

Search syntax, more query methods, learn Elasticsearch by yourself

http://127.0.0.1:9200/nmap_index/_doc/_search?q=_id:192.168.0.111 where 92.168.0.111 is the target to query

- Please install nmap by yourself before use
  <a href=https://github.com/GhostTroops/scan4all/discussions>Using Help</a>
```bash
go build
# Precise scan szUrl list UrlPrecise=true
UrlPrecise=true ./scan4all -l xx.txt
# Disable adaptation to nmap and use naabu port to scan its internally defined http-related Ports
priorityNmap=false ./scan4all -tp http -list allOut.txt -v

Work Plan

Q & A

more see: discussions

References

Thanks Donors

Contributors

https://github.com/GhostTroops/scan4all/graphs/contributors

Changelog

Communication group (WeChat, QQ,Tg)

Wechat Or QQchat Or Tg

💖Star

Stargazers over time

Donation

Wechat Pay AliPay Paypal BTC Pay BCH Pay
paypal miracletalent@gmail.com