@@ -172,12 +172,20 @@ screenshots(){
172172}
173173
174174
175- interesting (){
175+ getgau (){
176+ echo " ${green} fetch url from wayback,commoncrawl,otx,urlscan...${reset} "
177+ cat ./$domain /$foldername /subdomain_live.txt | gau --blacklist jpg,jpeg,gif,css,js,tif,tiff,png,ttf,woff,woff2,ico,svg,eot | qsreplace -a | tee ./$domain /$foldername /gau_output.txt
178+ echo " ${green} gau done.${reset} "
179+ }
180+
181+
182+
183+ get_interesting (){
176184 echo -e " ${green} find interesting data in site...${reset} "
177- cat ./$domain /$foldername /subdomain_live.txt | waybackurls | qsreplace -a | tee ./$domain /$foldername /waybackurls.txt
178- cat ./$domain /$foldername /waybackurls.txt | gf interestingEXT | grep -viE ' (\.(js|css|pdf|svg|png|jpg|woff))' | sort -u | httpx -status-code -mc 200 -silent | awk ' { print $1}' > ./$domain /$foldername /interesting.txt
185+ cat ./$domain /$foldername /gau_output.txt | gf interestingEXT | grep -viE ' (\.(js|css|svg|png|jpg|woff))' | qsreplace -a | httpx -mc 200 -silent | awk ' { print $1}' > ./$domain /$foldername /interesting.txt
179186}
180187
188+
181189directory_bruteforce (){
182190 echo -e " ${green} Starting directory bruteforce with FFUF...${reset} "
183191 # cat ./$domain/$foldername/subdomain_live.txt | $feroxbuster --stdin --silent -s 200 -n -w $dirsearchWordlist -o ./$domain/$foldername/directory.txt
@@ -206,7 +214,7 @@ SSRF_Scanner(){
206214
207215
208216 echo -e " ${green} find SSRF vulnerability ...${reset} "
209- cat ./$domain /$foldername /waybackurls .txt | gf ssrf | qsreplace https://$LISTENSERVER | httpx -silent
217+ cat ./$domain /$foldername /gau_output .txt | gf ssrf | qsreplace https://$LISTENSERVER | httpx -silent
210218 notify -bulk -data ./$domain /$foldername /listen_server.txt -silent
211219
212220 # kill listen server
@@ -216,25 +224,34 @@ SSRF_Scanner(){
216224
217225XSS_Scanner (){
218226 echo -e " ${green} find Xss vulnerability ...${reset} "
219- python3 $paramspider -d $domain -s TRUE -e jpg,jpeg,gif,css,js,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,eot -q -o ./$domain /$foldername /xss_result.txt
220- cat ./$domain /$foldername /xss_result .txt | qsreplace -a | httpx -silent -threads 500 -mc 200 | dalfox pipe -S | tee ./$domain /$foldername /xss_raw_result.txt
227+ # python3 $paramspider -d $domain -s TRUE -e jpg,jpeg,gif,css,js,tif,tiff,png,ttf,woff,woff2,ico,pdf,svg,txt,eot -q -o ./$domain/$foldername/xss_result.txt
228+ cat ./$domain /$foldername /gau_output .txt | gf xss | qsreplace -a | httpx -silent -threads 500 -mc 200 | dalfox pipe -S | tee ./$domain /$foldername /xss_raw_result.txt
221229 cat ./$domain /$foldername /xss_raw_result.txt | cut -d ' ' -f2 | tee ./$domain /$foldername /xss_result.txt; notify -bulk -data ./$domain /$foldername /xss_result.txt -silent
222230}
223231
232+
233+ CORS_Scanner (){
234+ echo -e " ${green} find CORS vulnerability ...${reset} "
235+ # echo https://google.com | hakrawler -u | httpx -silent | CorsMe
236+ cat ./$domain /$foldername /gau_output.txt | qsreplace -a | httpx -silent -threads 500 -mc 200 | CorsMe - t 70 -output ./$domain /$foldername /cors_result.txt
237+ }
238+
239+
240+ Prototype_Pollution_Scanner (){
241+ echo -e " ${green} find Prototype Pollution vulnerability ...${reset} "
242+ cat ./$domain /$foldername /gau_output.txt | qsreplace -a | httpx -silent -threads 500 -mc 200 | ppmap | tee ./$domain /$foldername /prototype_pollution_result.txt
243+ }
244+
245+
246+
224247# echo -e "${green}find sql injection with wayback ...${reset}"
225248# python3 paramspider.py -d $domain -s TRUE -e woff,ttf,eot,css,js,png,svg,jpg | deduplicate --sort | httpx -silent | sqlmap
226249
227- # echo -e "${green}find open redirect vulnerability ...${reset}"
228- # cat ./$domain/$foldername/waybackurls.txt | gf redirect | qsreplace -a | httpx -silent | while read domain; do python3 oralyzer.py -u $domain; done
229250
230- # echo -e "${green}find CORS vulnerability ...${reset}"
231- # echo https://google.com | hakrawler -u | httpx -silent | CorsMe
232251
233- # echo -e "${green}find Prototype Pollution vulnerability ...${reset}"
234- # echo https://google.com | hakrawler -u | httpx -silent | ppmap
235252
236- # echo -e "${green}find dom xss with parameter pollution vulnerability ...${reset}"
237- # cat ./$domain/$foldername/waybackurls .txt | httpx -silent | ppmap
253+ # echo -e "${green}find open redirect vulnerability ...${reset}"
254+ # cat ./$domain/$foldername/gau_output .txt | gf redirect | qsreplace -a | httpx -silent | while read domain; do python3 oralyzer.py -u $domain; done
238255
239256
240257
401418 touch ./$domain /$foldername /interesting.txt
402419 touch ./$domain /$foldername /directory.txt
403420 touch ./$domain /$foldername /xss_raw_result.txt
421+ touch ./$domain /$foldername /gau_output.txt
404422 touch ./$domain /$foldername /html_report.html
405423
406424 cleantemp
414432 subdomain_takeover $domain
415433 checkhttprobe $domain
416434 screenshots $domain
417- interesting $domain
435+ getgau $domain
436+ get_interesting $domain
418437 if [[ -n " $brute " ]]; then
419438 directory_bruteforce $domain
420439 fi
427446 if [[ -n " $xss " ]]; then
428447 XSS_Scanner $domain
429448 fi
449+ # if [[ -n "$cors" ]]; then
450+ # CORS_Scanner $domain
451+ # fi
452+ # if [[ -n "$prototype" ]]; then
453+ # Prototype_Pollution_Scanner $domain
454+ # fi
455+
456+
430457 report $domain
431458 echo " ${green} Scan for $domain finished successfully${reset} " | notify -silent
432459 duration=$SECONDS
0 commit comments