@@ -156,7 +156,7 @@ SUBD_ACTV(){
156156
157157SUBD_SCND (){
158158 cat .tmp/* .list | grep -v " *" | sed ' /@\|<BR>\|\_\|*/d' | grep " $DM " | anew -q .tmp/domains
159- xargs -a .tmp/domains -P 50 -I % bash -c " assetfinder --subs-only % | anew -q .tmp/seconddomains.list" 2> /dev/null; timeout 30m xargs -a .tmp/domains -P 10 -I % bash -c " amass enum -passive -d %" 2> /dev/null | anew -q .tmp/seconddomains.list
159+ xargs -a .tmp/domains -P ` nproc ` -I % bash -c " assetfinder --subs-only % | anew -q .tmp/seconddomains.list" 2> /dev/null; timeout 30m xargs -a .tmp/domains -P ` nproc ` -I % bash -c " amass enum -passive -d %" 2> /dev/null | anew -q .tmp/seconddomains.list
160160}
161161
162162SUBD_CHCK (){
@@ -170,7 +170,7 @@ SUBD_CHCK(){
170170 # @> WEB PROBING AND SCREENSHOT
171171 naabu -retries 3 -r ~ /wordlists/resolvers.txt -l database/subdomains.txt -p " $PR " -silent -no-color 2> /dev/null | anew -q database/ports.txt
172172 cat database/ports.txt | httprobe -prefer-https | anew -q database/lives.txt
173- xargs -a database/lives.txt -P 50 -I % bash -c " echo % | aquatone -chrome-path $CHROME_BIN -out database/screenshots/ -threads 10 -silent" 2> /dev/null & > /dev/null
173+ xargs -a database/lives.txt ` nproc ` -I % bash -c " echo % | aquatone -chrome-path $CHROME_BIN -out database/screenshots/ -threads 10 -silent" 2> /dev/null & > /dev/null
174174 [ " $JO " == " False" ] || cat database/lives.txt | python3 -c " import sys; import json; print (json.dumps({'liveurls':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/liveurls.json & > /dev/null
175175 [ " $JO " == " False" ] || cat database/subdomains.txt | python3 -c " import sys; import json; print (json.dumps({'subdomains':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/subdomains.json & > /dev/null
176176 [ " $JO " == " False" ] || cat database/ports.txt | python3 -c " import sys; import json; print (json.dumps({'ports':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/ports.json & > /dev/null
@@ -192,8 +192,8 @@ WEBC_RAWL(){
192192 echo -e " ${BK} ${RT} " | tr -d ' \n' | pv -qL 6; echo -e " STARTING WEBCRAWLING ON ${BK} $DM ${RT} (${YW} it may take time${RT} )"
193193 agnee -d $DM -q -o database/dorks.txt -p 4
194194 timeout 50m gospider -S database/lives.txt -d 10 -c 20 -t 50 -K 3 --no-redirect --js -a -w --blacklist " .(eot|jpg|jpeg|gif|css|tif|tiff|png|ttf|otf|woff|woff2|ico|svg|txt)" --include-subs -q -o .tmp/gospider 2> /dev/null | anew -q .tmp/gospider.list
195- xargs -a database/lives.txt -P 50 -I % bash -c " echo % | waybackurls" 2> /dev/null | anew -q .tmp/waybackurls.list
196- xargs -a database/lives.txt -P 50 -I % bash -c " echo % | gau --blacklist eot,jpg,jpeg,gif,css,tif,tiff,png,ttf,otf,woff,woff2,ico,svg,txt --retries 3 --threads 50" 2> /dev/null | anew -q .tmp/gau.list 2> /dev/null & > /dev/null
195+ xargs -a database/lives.txt ` nproc ` -I % bash -c " echo % | waybackurls" 2> /dev/null | anew -q .tmp/waybackurls.list
196+ xargs -a database/lives.txt ` nproc ` -I % bash -c " echo % | gau --blacklist eot,jpg,jpeg,gif,css,tif,tiff,png,ttf,otf,woff,woff2,ico,svg,txt --retries 3 --threads 50" 2> /dev/null | anew -q .tmp/gau.list 2> /dev/null & > /dev/null
197197 cat .tmp/gospider.list .tmp/gau.list .tmp/waybackurls.list 2> /dev/null | sed ' /\[/d' | grep $DM | sort -u | uro | anew -q database/urls.txt # <-- Filtering duplicate and common endpoints
198198 [ " $JO " == " False" ] || cat database/urls.txt | python3 -c " import sys; import json; print (json.dumps({'endpoints':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/urls.json & > /dev/null
199199
@@ -214,11 +214,11 @@ WEBC_RAWL(){
214214NUCL_SCAN (){
215215 echo -e " ${BK} ${RT} " | tr -d ' \n' | pv -qL 6; echo -e " STARTING NUCLEI VULNERABILITY SCANNING ON ${BK} $DM ${RT} (${YW} it may take time${RT} )"
216216 nuclei -update-templates 2> /dev/null & > /dev/null
217- xargs -a database/lives.txt -P 50 -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s info -c 10 -silent" 2> /dev/null | anew -q vulns/nuclei.txt
218- xargs -a database/lives.txt -P 50 -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s low -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
219- xargs -a database/lives.txt -P 50 -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s medium -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
220- xargs -a database/lives.txt -P 50 -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s high -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
221- xargs -a database/lives.txt -P 50 -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s critical -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
217+ xargs -a database/lives.txt ` nproc ` -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s info -c 10 -silent" 2> /dev/null | anew -q vulns/nuclei.txt
218+ xargs -a database/lives.txt ` nproc ` -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s low -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
219+ xargs -a database/lives.txt ` nproc ` -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s medium -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
220+ xargs -a database/lives.txt ` nproc ` -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s high -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
221+ xargs -a database/lives.txt ` nproc ` -I % bash -c " nuclei -target % -t ~/nuclei-templates/ -nc -s critical -c 10 -silent" 2> /dev/null | anew vulns/nuclei.txt | notify -silent & > /dev/null
222222 [ " $JO " == " False" ] || cat vulns/nuclei.txt | python3 -c " import sys; import json; print (json.dumps({'nuclei_info':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/nuclei.json & > /dev/null
223223 [ " $SL " == " False" ] && cat vulns/nuclei.txt
224224}
@@ -234,19 +234,19 @@ VULN_SCAN(){
234234 cat database/urls.txt | cut -d"?" -f1 | cut -d"=" -f1 | grep -iaE "([^.]+)\.zip$|([^.]+)\.zip\.[0-9]+$|([^.]+)\.zip[0-9]+$|([^.]+)\.zip[a-z][A-Z][0-9]+$|([^.]+)\.zip\.[a-z][A-Z][0-9]+$|([^.]+)\.rar$|([^.]+)\.tar$|([^.]+)\.tar\.gz$|([^.]+)\.tgz$|([^.]+)\.sql$|([^.]+)\.db$|([^.]+)\.sqlite$|([^.]+)\.pgsql\.txt$|([^.]+)\.mysql\.txt$|([^.]+)\.gz$|([^.]+)\.config$|([^.]+)\.log$|([^.]+)\.bak$|([^.]+)\.backup$|([^.]+)\.bkp$|([^.]+)\.crt$|([^.]+)\.dat$|([^.]+)\.eml$|([^.]+)\.java$|([^.]+)\.lst$|([^.]+)\.key$|([^.]+)\.passwd$|([^.]+)\.pl$|([^.]+)\.pwd$|([^.]+)\.mysql-connect$|([^.]+)\.jar$|([^.]+)\.cfg$|([^.]+)\.dir$|([^.]+)\.orig$|([^.]+)\.bz2$|([^.]+)\.old$|([^.]+)\.vbs$|([^.]+)\.img$|([^.]+)\.inf$|([^.]+)\.sh$|([^.]+)\.py$|([^.]+)\.vbproj$|([^.]+)\.mysql-pconnect$|([^.]+)\.war$|([^.]+)\.go$|([^.]+)\.psql$|([^.]+)\.sql\.gz$|([^.]+)\.vb$|([^.]+)\.webinfo$|([^.]+)\.jnlp$|([^.]+)\.cgi$|([^.]+)\.tmp$|([^.]+)\.ini$|([^.]+)\.webproj$|([^.]+)\.xsql$|([^.]+)\.raw$|([^.]+)\.inc$|([^.]+)\.lck$|([^.]+)\.nz$|([^.]+)\.rc$|([^.]+)\.html\.gz$|([^.]+)\.gz$|([^.]+)\.env$|([^.]+)\.yml$" | httpx -silent -follow-host-redirects | anew -q vulns/files.txt &> /dev/null
235235 [ " $JO " == " False" ] || cat vulns/files.txt 2> /dev/null | python3 -c " import sys; import json; print (json.dumps({'sensitive':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/files.json & > /dev/null
236236
237- xargs -a .tmp/xss.txt -P 50 -I % bash -c " curl -s -L -H \" X-Bugbounty: Testing\" -H \" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36\" --insecure '%' | grep \" <svg/onload=confirm(document.domain)>\" && echo -e \" [POTENTIAL XSS] - % \n \" " 2> /dev/null | grep " POTENTIAL XSS" | anew vulns/xss.txt | notify -silent & > /dev/null
237+ xargs -a .tmp/xss.txt ` nproc ` -I % bash -c " curl -s -L -H \" X-Bugbounty: Testing\" -H \" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36\" --insecure '%' | grep \" <svg/onload=confirm(document.domain)>\" && echo -e \" [POTENTIAL XSS] - % \n \" " 2> /dev/null | grep " POTENTIAL XSS" | anew vulns/xss.txt | notify -silent & > /dev/null
238238 [ " $SL " == " False" ] && cat vulns/xss.txt 2> /dev/null
239239 [ " $JO " == " False" ] || cat vulns/xss.txt 2> /dev/null | python3 -c " import sys; import json; print (json.dumps({'vuln_xss':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/xss.json & > /dev/null
240240
241- xargs -a database/.gf/ssrf.list -P 50 -I % bash -c " curl -ks -H \" X-Bugbounty: Testing\" -H \" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36\" --insecure '%' | grep \" compute.internal\" && echo -e \" [POTENTIAL SSRF] - % \n \" " 2> /dev/null | grep " POTENTIAL SSRF" | anew vulns/ssrf.txt | notify -silent & > /dev/null
241+ xargs -a database/.gf/ssrf.list ` nproc ` -I % bash -c " curl -ks -H \" X-Bugbounty: Testing\" -H \" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36\" --insecure '%' | grep \" compute.internal\" && echo -e \" [POTENTIAL SSRF] - % \n \" " 2> /dev/null | grep " POTENTIAL SSRF" | anew vulns/ssrf.txt | notify -silent & > /dev/null
242242 [ " $SL " == " False" ] && cat vulns/ssrf.txt 2> /dev/null
243243 [ " $JO " == " False" ] || cat vulns/ssrf.txt 2> /dev/null | python3 -c " import sys; import json; print (json.dumps({'vuln_ssrf':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/ssrf.json & > /dev/null
244244
245- xargs -a database/.gf/redirect.list -P 50 -I % bash -c " curl -s -iL -H \" X-Bugbounty: Testing\" -H \" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36\" --insecure '%' | grep \" Evil.Com - We get it...Daily\" && echo -e \" [POTENTIAL REDIRECT] - % \n \" " 2> /dev/null | grep " POTENTIAL REDIRECT" | anew vulns/redirect.txt | notify -silent & > /dev/null
245+ xargs -a database/.gf/redirect.list ` nproc ` -I % bash -c " curl -s -iL -H \" X-Bugbounty: Testing\" -H \" User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36\" --insecure '%' | grep \" Evil.Com - We get it...Daily\" && echo -e \" [POTENTIAL REDIRECT] - % \n \" " 2> /dev/null | grep " POTENTIAL REDIRECT" | anew vulns/redirect.txt | notify -silent & > /dev/null
246246 [ " $SL " == " False" ] && cat vulns/redirect.txt 2> /dev/null
247247 [ " $JO " == " False" ] || cat vulns/redirect.txt 2> /dev/null | python3 -c " import sys; import json; print (json.dumps({'vuln_redirect':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/redirect.json & > /dev/null
248248
249- timeout 50m xargs -a database/.gf/sqli.list -P 50 -I % bash -c " echo % | jeeves --payload-time 5" | grep " Vulnerable To" | anew vulns/sqli.txt | notify -silent 2> /dev/null & > /dev/null
249+ timeout 50m xargs -a database/.gf/sqli.list ` nproc ` -I % bash -c " echo % | jeeves --payload-time 5" | grep " Vulnerable To" | anew vulns/sqli.txt | notify -silent 2> /dev/null & > /dev/null
250250 [ " $SL " == " False" ] && cat vulns/sqli.txt 2> /dev/null
251251 [ " $JO " == " False" ] || cat vulns/sqli.txt 2> /dev/null | python3 -c " import sys; import json; print (json.dumps({'vuln_redirect':list(sys.stdin)}))" | sed ' s/\\n//g' | tee .json/redirect.json & > /dev/null
252252
290290 MAKDR
291291 VAULT
292292 exit
293- done
293+ done
0 commit comments