Skip to content

Commit 2b55077

Browse files
committed
add cors scanner
1 parent 876299b commit 2b55077

File tree

3 files changed

+60
-18
lines changed

3 files changed

+60
-18
lines changed

README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,16 @@ chmod +x install.sh
6262
* sqlmap-dev
6363
* Unfurl
6464
* nuclei
65-
* deduplicate
6665
* dalfox
6766
* ParamSpider
6867
* qsreplace
6968
* notify
7069
* Seclists collection
70+
* CorsMe
71+
* ppmap
72+
73+
74+
7175

7276
## Vulnerability
7377
this is not only recon tools ! we automate find bug for your :D

install.sh

Lines changed: 13 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -194,12 +194,23 @@ go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest
194194
echo "done"
195195

196196

197+
echo "installing CorsMe"
198+
go install github.com/shivangx01b/CorsMe@latest
199+
echo "done"
200+
197201

198-
echo "installing deduplicate"
199-
go install github.com/nytr0gen/deduplicate@latest
202+
203+
echo "installing CorsMe"
204+
go install github.com/kleiton0x00/ppmap@latest
200205
echo "done"
201206

202207

208+
209+
# echo "installing deduplicate"
210+
# go install github.com/nytr0gen/deduplicate@latest
211+
# echo "done"
212+
213+
203214
echo "installing dalfox"
204215
go install github.com/hahwul/dalfox/v2@latest
205216
echo "done"

smartrecon.sh

Lines changed: 42 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -172,12 +172,20 @@ screenshots(){
172172
}
173173

174174

175-
interesting(){
175+
getgau(){
176+
echo "${green}fetch url from wayback,commoncrawl,otx,urlscan...${reset}"
177+
cat ./$domain/$foldername/subdomain_live.txt | gau --blacklist jpg,jpeg,gif,css,js,tif,tiff,png,ttf,woff,woff2,ico,svg,eot | qsreplace -a | tee ./$domain/$foldername/gau_output.txt
178+
echo "${green}gau done.${reset}"
179+
}
180+
181+
182+
183+
get_interesting(){
176184
echo -e "${green}find interesting data in site...${reset}"
177-
cat ./$domain/$foldername/subdomain_live.txt | waybackurls | qsreplace -a | tee ./$domain/$foldername/waybackurls.txt
178-
cat ./$domain/$foldername/waybackurls.txt | gf interestingEXT | grep -viE '(\.(js|css|pdf|svg|png|jpg|woff))' | sort -u | httpx -status-code -mc 200 -silent | awk '{ print $1}' > ./$domain/$foldername/interesting.txt
185+
cat ./$domain/$foldername/gau_output.txt | gf interestingEXT | grep -viE '(\.(js|css|svg|png|jpg|woff))' | qsreplace -a | httpx -mc 200 -silent | awk '{ print $1}' > ./$domain/$foldername/interesting.txt
179186
}
180187

188+
181189
directory_bruteforce(){
182190
echo -e "${green}Starting directory bruteforce with FFUF...${reset}"
183191
# cat ./$domain/$foldername/subdomain_live.txt | $feroxbuster --stdin --silent -s 200 -n -w $dirsearchWordlist -o ./$domain/$foldername/directory.txt
@@ -206,7 +214,7 @@ SSRF_Scanner(){
206214

207215

208216
echo -e "${green}find SSRF vulnerability ...${reset}"
209-
cat ./$domain/$foldername/waybackurls.txt | gf ssrf | qsreplace https://$LISTENSERVER | httpx -silent
217+
cat ./$domain/$foldername/gau_output.txt | gf ssrf | qsreplace https://$LISTENSERVER | httpx -silent
210218
notify -bulk -data ./$domain/$foldername/listen_server.txt -silent
211219

212220
# kill listen server
@@ -216,25 +224,34 @@ SSRF_Scanner(){
216224

217225
XSS_Scanner(){
218226
echo -e "${green}find Xss vulnerability ...${reset}"
219-
python3 $paramspider -d $domain -s TRUE -e jpg,jpeg,gif,css,js,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,eot -q -o ./$domain/$foldername/xss_result.txt
220-
cat ./$domain/$foldername/xss_result.txt | qsreplace -a | httpx -silent -threads 500 -mc 200 | dalfox pipe -S | tee ./$domain/$foldername/xss_raw_result.txt
227+
# python3 $paramspider -d $domain -s TRUE -e jpg,jpeg,gif,css,js,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,eot -q -o ./$domain/$foldername/xss_result.txt
228+
cat ./$domain/$foldername/gau_output.txt | gf xss | qsreplace -a | httpx -silent -threads 500 -mc 200 | dalfox pipe -S | tee ./$domain/$foldername/xss_raw_result.txt
221229
cat ./$domain/$foldername/xss_raw_result.txt | cut -d ' ' -f2 | tee ./$domain/$foldername/xss_result.txt; notify -bulk -data ./$domain/$foldername/xss_result.txt -silent
222230
}
223231

232+
233+
CORS_Scanner(){
234+
echo -e "${green}find CORS vulnerability ...${reset}"
235+
# echo https://google.com | hakrawler -u | httpx -silent | CorsMe
236+
cat ./$domain/$foldername/gau_output.txt | qsreplace -a | httpx -silent -threads 500 -mc 200 | CorsMe - t 70 -output ./$domain/$foldername/cors_result.txt
237+
}
238+
239+
240+
Prototype_Pollution_Scanner(){
241+
echo -e "${green}find Prototype Pollution vulnerability ...${reset}"
242+
cat ./$domain/$foldername/gau_output.txt | qsreplace -a | httpx -silent -threads 500 -mc 200 | ppmap | tee ./$domain/$foldername/prototype_pollution_result.txt
243+
}
244+
245+
246+
224247
# echo -e "${green}find sql injection with wayback ...${reset}"
225248
# python3 paramspider.py -d $domain -s TRUE -e woff,ttf,eot,css,js,png,svg,jpg | deduplicate --sort | httpx -silent | sqlmap
226249

227-
# echo -e "${green}find open redirect vulnerability ...${reset}"
228-
# cat ./$domain/$foldername/waybackurls.txt | gf redirect | qsreplace -a | httpx -silent | while read domain; do python3 oralyzer.py -u $domain; done
229250

230-
# echo -e "${green}find CORS vulnerability ...${reset}"
231-
# echo https://google.com | hakrawler -u | httpx -silent | CorsMe
232251

233-
# echo -e "${green}find Prototype Pollution vulnerability ...${reset}"
234-
# echo https://google.com | hakrawler -u | httpx -silent | ppmap
235252

236-
# echo -e "${green}find dom xss with parameter pollution vulnerability ...${reset}"
237-
# cat ./$domain/$foldername/waybackurls.txt | httpx -silent | ppmap
253+
# echo -e "${green}find open redirect vulnerability ...${reset}"
254+
# cat ./$domain/$foldername/gau_output.txt | gf redirect | qsreplace -a | httpx -silent | while read domain; do python3 oralyzer.py -u $domain; done
238255

239256

240257

@@ -401,6 +418,7 @@ fi
401418
touch ./$domain/$foldername/interesting.txt
402419
touch ./$domain/$foldername/directory.txt
403420
touch ./$domain/$foldername/xss_raw_result.txt
421+
touch ./$domain/$foldername/gau_output.txt
404422
touch ./$domain/$foldername/html_report.html
405423

406424
cleantemp
@@ -414,7 +432,8 @@ fi
414432
subdomain_takeover $domain
415433
checkhttprobe $domain
416434
screenshots $domain
417-
interesting $domain
435+
getgau $domain
436+
get_interesting $domain
418437
if [[ -n "$brute" ]]; then
419438
directory_bruteforce $domain
420439
fi
@@ -427,6 +446,14 @@ fi
427446
if [[ -n "$xss" ]]; then
428447
XSS_Scanner $domain
429448
fi
449+
# if [[ -n "$cors" ]]; then
450+
# CORS_Scanner $domain
451+
# fi
452+
# if [[ -n "$prototype" ]]; then
453+
# Prototype_Pollution_Scanner $domain
454+
# fi
455+
456+
430457
report $domain
431458
echo "${green}Scan for $domain finished successfully${reset}" | notify -silent
432459
duration=$SECONDS

0 commit comments

Comments
 (0)