You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| -r REAL_PORT | The real port of the webserver to use in headers when not 80 (see RFC2616 14.23), useful when pivoting through ssh/nc etc (default to PORT). |
40
40
| --ignore-http-codes IGNORE_HTTP_CODES | Comma separated list of http codes to ignore with virtual host scans (default 404). |
| --first-hit | Return first successful result. Only use in scenarios where you are sure no catch-all is configured (such as a CTF). |
42
43
| --unique-depth UNIQUE_DEPTH | Show likely matches of page content that is found x times (default 1). |
43
44
| --ssl | If set then connections will be made over HTTPS instead of HTTP. |
44
45
| --fuzzy-logic | If set then all unique content replies are compared and a similarity ratio is given for each pair. This helps to isolate vhosts in situations where a default page isn't static (such as having the time on it). |
| -oJ OUTPUT_JSON | JSON output printed to a file when the -oJ option is specified with a filename argument. |
52
53
| - | By passing a blank '-' you tell VHostScan to expect input from stdin (pipe). |
53
54
55
+
54
56
## Usage Examples
55
57
56
58
_Note that a number of these examples reference 10.10.10.29. This IP refers to BANK.HTB, a retired target machine from HackTheBox (https://www.hackthebox.eu/)._
If you're thinking of adding a new feature to the project, consider also contributing with a couple of tests. A well-tested codebase is a sane codebase. :)
103
+
If you're thinking of adding a new feature to the project, consider also contributing with a couple of tests. A well-tested codebase is a sane codebase. :)
Copy file name to clipboardExpand all lines: VHostScan.py
+10-6Lines changed: 10 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,7 @@ def main():
28
28
29
29
parser.add_argument('--ignore-http-codes', dest='ignore_http_codes', type=str, help='Comma separated list of http codes to ignore with virtual host scans (default 404).', default='404')
parser.add_argument('--first-hit', dest='first_hit', action='store_true', help='Return first successful result. Only use in scenarios where you are sure no catch-all is configured (such as a CTF).', default=False)
31
32
parser.add_argument('--unique-depth', dest='unique_depth', type=int, help='Show likely matches of page content that is found x times (default 1).', default=1)
32
33
parser.add_argument("--ssl", dest="ssl", action="store_true", help="If set then connections will be made over HTTPS instead of HTTP (default http).", default=False)
33
34
parser.add_argument("--fuzzy-logic", dest="fuzzy_logic", action="store_true", help="If set then fuzzy match will be performed against unique hosts (default off).", default=False)
@@ -40,7 +41,7 @@ def main():
40
41
parser.add_argument("-oJ", dest="output_json", help="JSON output printed to a file when the -oJ option is specified with a filename argument." )
41
42
parser.add_argument("-", dest="stdin", action="store_true", help="By passing a blank '-' you tell VHostScan to expect input from stdin (pipe).", default=False)
42
43
43
-
arguments=parser.parse_args()
44
+
arguments=parser.parse_args()
44
45
wordlist= []
45
46
46
47
word_list_types= []
@@ -69,23 +70,26 @@ def main():
69
70
70
71
user_agents= []
71
72
ifarguments.user_agent:
72
-
print('[>] User-Agent specified, using it')
73
+
print('[>] User-Agent specified, using it.')
73
74
user_agents= [arguments.user_agent]
74
75
elifarguments.random_agent:
75
-
print('[>] Random User-Agent flag set')
76
+
print('[>] Random User-Agent flag set.')
76
77
user_agents=load_random_user_agents()
77
78
78
79
if(arguments.ssl):
79
-
print("[>] SSL flag set, sending all results over HTTPS")
80
+
print("[>] SSL flag set, sending all results over HTTPS.")
80
81
81
82
if(arguments.add_waf_bypass_headers):
82
-
print("[>] WAF flag set, sending simple WAF bypass headers")
83
+
print("[>] WAF flag set, sending simple WAF bypass headers.")
0 commit comments