├── sn1per.png
├── bin
├── report.py
├── slack.sh
├── waybackurls.py
├── waybackrobots.py
├── github-subdomains.py
└── webscreenshot.js
├── loot
└── README.md
├── Dockerfile.blackarch
├── templates
├── active
│ ├── Drupal_Scanner_1.sh
│ ├── Apache_Solr_Scanner.sh
│ ├── Clear-text_Communications_HTTP.sh
│ ├── Drupal_Scanner_3.sh
│ ├── Drupal_Scanner_2.sh
│ ├── F5_BIG-IP_Scanner.sh
│ ├── Joomla_Scanner_1.sh
│ ├── PHP_Info.sh
│ ├── Clickjacking.sh
│ ├── Jenkins_Scanner.sh
│ ├── Joomla_Scanner_2.sh
│ ├── Sitemap.xml_Detected.sh
│ ├── Wordpres_Scanner_1.sh
│ ├── AvantFAX_LOGIN_Detected.sh
│ ├── Cisco_VPN_Scanner.sh
│ ├── Git_Config_Detected.sh
│ ├── JK_Status_Manager.sh
│ ├── MobileIron_Login_2.sh
│ ├── Web_Config_Detected.sh
│ ├── Wordpres_Scanner_2.sh
│ ├── cPanel_Login_Found.sh
│ ├── AWS_S3_Public_Bucket_Listing.sh
│ ├── Citrix_VPN_Scanner.sh
│ ├── Citrix_VPN_Scanner_2.sh
│ ├── Confluence_Scanner.sh
│ ├── F5_BIG-IP_Scanner_2.sh
│ ├── MobileIron_Login_1.sh
│ ├── MobileIron_Login_3.sh
│ ├── WebLogic_Scanner.sh
│ ├── Wordpres_Scanner_3.sh
│ ├── phpMyAdmin_Scanner_1.sh
│ ├── Drupal_User_Login.sh
│ ├── Jetty_Version_Disclosure.sh
│ ├── SQLiteManager_Scanner_1.sh
│ ├── cPanel_Login_Found_2.sh
│ ├── Cisco_VPN_Login_Scanner.sh
│ ├── Jaspersoft_Detected.sh
│ ├── Jira_Scanner_1.sh
│ ├── Jolokia_Version_Disclosure.sh
│ ├── Robots.txt_Detected.sh
│ ├── SolarWinds_Orion_Panel.sh
│ ├── Tiki_Wiki_CMS_Groupware_Scanner.sh
│ ├── Directory_Listing_Enabled.sh
│ ├── Jira_Scanner_2.sh
│ ├── PHP_Composer_Disclosure.sh
│ ├── TeamQuest_Login_Found.sh
│ ├── Citrix-Access-Gateway_Detected.sh
│ ├── Drupal_Install_Found.sh
│ ├── Drupal_Version_Disclosure.sh
│ ├── PulseSecure_VPN_Detected.sh
│ ├── Jira_Scanner_3.sh
│ ├── Unauthenticated_Jenkins_Dashboard_Detected.sh
│ ├── Frontpage_Service_Password_Disclosure.sh
│ ├── Mailman_Version_Disclosure.sh
│ ├── RabbitMQ_Management_Interface_Detected.sh
│ ├── Weblogic_Application_Server_Detected.sh
│ ├── Joomla_Version_Disclosure.sh
│ ├── Apache_Tomcat_Scanner.sh
│ ├── Common_Status_File_Scanner_1.sh
│ ├── MS_SQL_Reporting_Server_Scanner_2.sh
│ ├── Common_Status_File_Scanner_3.sh
│ ├── Fortigate_Pulse_Connect_Secure_Scanner.sh
│ ├── Fortinet_FortiGate_SSL_VPN_Panel_Detected.sh
│ ├── CVE-2020-7246_-_qdPM_Authenticated_Remote_Code_Execution.sh
│ ├── Common_Status_File_Scanner_2.sh
│ ├── Fortinet_FortiGate_SSL_VPN_Panel_Detected_1.sh
│ ├── MS_SQL_Reporting_Server_Scanner_1.sh
│ ├── CVE-2019-7192_-_QNAP_Pre-Auth_Root_RCE.sh
│ ├── Fortinet_FortiGate_SSL_VPN_Panel_Detected_2.sh
│ ├── Fortinet_FortiGate_SSL_VPN_Panel_Detected_3.sh
│ ├── CVE-2019-19781_-_Citrix_ADC_Directory_Traversal.sh
│ ├── CVE-2019-5418_-_Rail_File_Content_Disclosure.sh
│ ├── Palo_Alto_GlobalProtect_PAN-OS_Portal_Scanner.sh
│ ├── CVE-2020-2096_Jenkins_Gitlab_XSS_1.sh
│ ├── CVE-2020-2555_-_WebLogic_Server_Deserialization_RCE.sh
│ ├── CVE-2020-3187_-_Citrix_Unauthenticated_File_Deletion.sh
│ ├── Laraval_Environment_File_Found.sh
│ ├── Telerik_File_Upload_Web_UI.sh
│ ├── Weak_Authentication_Scanner.sh
│ ├── Wordpress_WP-File-Manager_Version_Detected.sh
│ ├── CVE-2019-1653_-_Cisco_RV320_RV326_Configuration_Disclosure.sh
│ ├── CVE-2020-2096_Jenkins_Gitlab_XSS_3.sh
│ ├── CVE-2019-11581_-_Jira_Template_Injection.sh
│ ├── CVE-2020-2096_-_Jenkins_Gitlab_Hook_XSS.sh
│ ├── CVE-2020-2096_Jenkins_Gitlab_XSS_2.sh
│ ├── CVE-2020-2096_Jenkins_Gitlab_XSS_4.sh
│ ├── CVE-2020-7473_Citrix_ShareFile_StorageZones.disabled
│ ├── CVE-2020-8163_-_Rails_5.0.1_Remote_Code_Execution.sh
│ ├── CVE-2020-2034_-_PAN-OS_GlobalProtect_OS_Command_Injection.sh
│ ├── CVE-2020-9054_-_ZyXEL_NAS_Remote_Code_Execution.sh
│ ├── CVE-2020-13167_-_Netsweeper_WebAdmin_Python_Code_Injection_2.sh
│ ├── CVE-2020-17519_-_Apache_Flink_Path_Traversal.sh
│ ├── CVE-2020-24223_-_Mara_CMS_7.5_Reflective_XSS.sh
│ ├── CVE-2020-5284_-_Next_JS_Limited_Path_Traversal.sh
│ ├── CVE-2020-25213_-_WP_File_Manager_File_Upload.sh
│ ├── CVE-2020-5902_-_F5_BIG-IP_XSS.sh
│ ├── CVE-2019-8982_-_Wavemaker_Studio_6.6_LFI_SSRF.sh
│ ├── CVE-2020-12271_-_Sophos_XG_Firewall_Pre-Auth_SQL_Injection.sh
│ ├── CVE-2020-8209_-_Citrix_XenMobile_Server_Path_Traversal.sh
│ ├── CVE-2020-8512_-_IceWarp_WebMail_XSS.sh
│ ├── Contact_Form_7_Wordpress_Plugin_Found_1.sh
│ ├── CVE-2019-8451_Jira_SSRF_1.sh
│ ├── CVE-2020-15129_-_Open_Redirect_In_Traefik.sh
│ ├── ApPHP_MicroBlog_Remote_Code_Execution_Vulnerability.sh
│ ├── CVE-2019-8451_Jira_SSRF_2.sh
│ ├── CVE-2019-8451_Jira_SSRF_3.sh
│ ├── CVE-2020-5412_-_Full-read_SSRF_in_Spring_Cloud_Netflix.sh
│ ├── CVE-2020-5902_-_F5_BIG-IP_Remote_Code_Execution_2.sh
│ ├── Contact_Form_7_Wordpress_Plugin_Found_2.sh
│ ├── RabbitMQ_Management_Default_Credentials.sh
│ ├── CVE-2019-11580_-_Atlassian_Crowd_Data_Center_Unauthenticated_RCE.sh
│ ├── CVE-2019-19908_-_phpMyChat-Plus_XSS.sh
│ ├── CVE-2019-8442_-_Jira_Webroot_Directory_Traversal_1.sh
│ ├── CVE-2019-8451_Jira_SSRF_4.sh
│ ├── CVE-2020-0618_-_Remote_Code_Execution_SQL_Server_Reporting_Services.sh
│ ├── CVE-2020-15920_-_Mida_eFramework_Unauthenticated_RCE.sh
│ ├── CVE-2020-5902_-_F5_BIG-IP_Remote_Code_Execution_1.sh
│ ├── CVE-2019-8442_-_Jira_Webroot_Directory_Traversal_2.sh
│ ├── CVE-2020-14181_-_User_Enumeration_Via_Insecure_Jira_Endpoint.sh
│ ├── CVE-2020-8115_-_Revive_Adserver_XSS.sh
│ ├── CVE-2020-2140_-_Jenkin_AuditTrailPlugin_XSS.sh
│ ├── CVE-2020-8209_-_XenMobile-Citrix_Endpoint_Management_Path_Traversal.sh
│ ├── CVE-2020-9757_-_SEOmatic_3.3.0_Server-Side_Template_Injection.sh
│ ├── CVE-2020-11530_-_Wordpress_Chop_Slider_3_Plugin_SQL_Injection.sh
│ ├── VMware_vCenter_Unauthenticated_Arbitrary_File_Read.sh
│ ├── CVE-2020-9484_-_Apache_Tomcat_RCE_by_deserialization.sh
│ ├── CVE-2019-8903_-_Totaljs_Unathenticated_Directory_Traversal.sh
│ ├── CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal.sh
│ ├── CVE-2018-13379_-_Fortigate_Pulse_Connect_Secure_Directory_Traversal.sh
│ ├── CVE-2019-11510_-_Pulse_Connect_Secure_SSL_VPN_Arbitrary_File_Read.sh
│ ├── CVE-2019-16662_-_rConfig_3.9.2_Remote_Code_Execution.sh
│ ├── CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal_3.sh
│ ├── CVE-2020-2551_-_Unauthenticated_Oracle_WebLogic_Server_Remote_Code_Execution.sh
│ ├── CVE-2020-5405_-_Spring_Directory_Traversal_1.sh
│ ├── SAP_NetWeaver_AS_JAVA_LM_Configuration_Wizard_Detection.sh
│ ├── CVE-2020-5405_-_Spring_Directory_Traversal_2.sh
│ ├── CVE-2020-5405_-_Spring_Directory_Traversal_3.sh
│ ├── CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal_2.sh
│ ├── CVE-2020-11738_-_WordPress_Duplicator_plugin_Directory_Traversal_4.sh
│ ├── CVE-2020-7209_-_LinuxKI_Toolset_6.01_Remote_Command_Execution.sh
│ ├── CVE-2020-14815_-_Oracle_Business_Intelligence_Enterprise_DOM_XSS.sh
│ ├── CVE-2020-8209_-_XenMobile-Citrix_Endpoint_Management_Config_Password_Disclosure.sh
│ ├── CVE-2020-7048_-_WP_Database_Reset_3.15_Unauthenticated_Database_Reset.sh
│ ├── CVE-2020-8982_-_Citrix_ShareFile_StorageZones_Unauthenticated_Arbitrary_File_Read.sh
│ ├── CVE-2020-3452_-_Cisco_ASA-FTD_Arbitrary_File_Reading_Vulnerability.sh
│ ├── Magento_2.3.0_SQL_Injection.sh
│ ├── SolarWinds_Orion_Default_Credentials_1.sh
│ ├── SolarWinds_Orion_Default_Credentials_2.sh
│ ├── CVE-2020-1147_-_Remote_Code_Execution_in_Microsoft_SharePoint_Server.sh
│ ├── CVE-2020-8772_-_IfiniteWP_Client_1.9.4.5_Authentication_Bypass_1.sh
│ ├── CVE-2019-16759_-_vBulletin_5.x_0-Day_Pre-Auth_Remote_Command_Execution.sh
│ ├── CVE-2020-8115_-_Revive_Adserver_XSS.py
│ ├── CVE-2020-8194_-_Citrix_ADC_NetScaler_Gateway_Reflected_Code_Injection.sh
│ ├── CVE-2020-10204_-_Sonatype_Nexus_Repository_RCE.sh
│ ├── CVE-2020-8191_-_Citrix_ADC_NetScaler_Gateway_Reflected_XSS.sh
│ ├── CVE-2019-16759_-_vBulletin_5.x_0-Day_Pre-Auth_Remote_Command_Execution_Bypass.sh
│ ├── XSS.py
│ ├── CVE-2019-19719_Tableau_Server_DOM_XSS.py
│ ├── CVE-2020-12720_-_vBulletin_Unauthenticaed_SQLi_1.sh
│ ├── CVE-2020-12720_-_vBulletin_Unauthenticaed_SQLi_2.sh
│ ├── CVE-2020-13167_-_Netsweeper_WebAdmin_Python_Code_Injection_1.sh
│ ├── CVE-2020-8193_-_Citrix_Unauthenticated_LFI.sh
│ ├── CVE-2019-6340_-_Drupal8_REST_RCE_SA-CORE-2019-003.disabled
│ ├── CVE-2020-12720_-_vBulletin_Unauthenticaed_SQLi_3.sh
│ ├── CVE-2020-9047_-_exacqVision_Web_Service_Remote_Code_Execution.sh
│ ├── CVE-2019-17558_-_Apache_Solr_RCE.sh
│ └── CVE-2020-6287_-_Create_an_Administrative_User_in_SAP_NetWeaver_AS_JAVA.sh
└── passive
│ ├── web
│ ├── Trace_Method_Enabled.sh
│ ├── Drupal_Detected.sh
│ ├── Autocomplete_Enabled.sh
│ ├── X-Powered-By_Header_Found.sh
│ ├── Expired_SSL_Certificate.sh
│ ├── Insecure_SSL_TLS_Connection.sh
│ ├── CORS_Policy_-_Allow-Origin_Wildcard.sh
│ ├── Insecure_Cookie_-_Secure_Not_Set.sh
│ ├── Interesting_Title_Found.sh
│ ├── Insecure_Cookie_-_HTTPOnly_Not_Set.sh
│ ├── CORS_Policy_-_Allow-Credentials_Enabled.sh
│ ├── Clear-text_Communications_HTTP.sh
│ ├── Fortinet_FortiGate_SSL_VPN_Panel_Passive_Detection.sh
│ ├── Insecure_SSL_TLS_Connection_CN_Mismatch.sh
│ ├── Strict_Tranposrt_Security_Not_Enforced.sh
│ ├── Server_Header_Disclosure.sh
│ ├── Clickjacking.sh
│ ├── CSP_Not_Enforced.sh
│ └── recursive
│ │ ├── Nikto_Vulnerability_Scan-HTTP.sh
│ │ ├── Nikto_Vulnerability_Scan-HTTPS.sh
│ │ ├── Wordpress_Vulnerability_Scan_-_HTTP_1.sh
│ │ ├── Wordpress_Vulnerability_Scan_-_HTTP_2.sh
│ │ ├── Wordpress_Vulnerability_Scan_-_HTTPS_1.sh
│ │ ├── Wordpress_Vulnerability_Scan_-_HTTPS_2.sh
│ │ ├── Arachni_Vulnerability_Scan.disabled
│ │ ├── Arachni_Vulnerability_Scan_-_HTTP.sh
│ │ ├── Arachni_Vulnerability_Scan_-_HTTPS.sh
│ │ ├── Nuclei_Vulnerability_Scan_-_HTTP.sh
│ │ └── Nuclei_Vulnerability_Scan_-_HTTPS.sh
│ └── network
│ ├── SMBv1_Enabled.sh
│ ├── Lack_of_SPF_DNS_Record.sh
│ ├── Subjack_Takeover_Detected.sh
│ ├── Subover_Takeover_Detected.sh
│ ├── SSH_Version_Disclosure.sh
│ ├── Default_Credentials_NMap.sh
│ ├── Interesting_Domain_Found.sh
│ ├── SMB_Info_Disclosure.sh
│ ├── CVE-2018-15473_-_OpenSSH_Username_Enumeration.sh
│ ├── Default_Credentials_BruteX.sh
│ ├── Possible_Takeover_Detected.sh
│ └── recursive
│ ├── Component_With_Known_Vulnerabilities_-_NMap.sh
│ └── Interesting_Ports_Found.sh
├── docker-compose.yml
├── docker-compose-blackarch.yml
├── sn1per.desktop
├── .github
└── workflows
│ └── semgrep.yml
├── uninstall.sh
├── modes
├── web.sh
├── sc0pe-active-webscan.sh
├── osint_stage_2.sh
├── sc0pe-network-scan.sh
├── bruteforce.sh
├── masswebscan.sh
├── nuke.sh
├── massportscan.sh
├── massweb.sh
├── massvulnscan.sh
├── sc0pe-passive-webscan.sh
├── airstrike.sh
├── fullportscan.sh
├── sc0pe.sh
├── javascript-analysis.sh
├── static-grep-search.sh
├── discover.sh
└── fullportonly.sh
├── Dockerfile
├── wordlists
├── vhosts.txt
├── altdns.txt
└── web-brute-stealth.txt
├── pro
└── notepad.html
└── LICENSE.md
/sn1per.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/1N3/Sn1per/HEAD/sn1per.png
--------------------------------------------------------------------------------
/bin/report.py:
--------------------------------------------------------------------------------
1 | import pdfkit
2 | pdfkit.from_url('/usr/share/sniper/loot/workspace/hulu/sniper-report.html', 'out.pdf')
3 |
--------------------------------------------------------------------------------
/loot/README.md:
--------------------------------------------------------------------------------
1 | # Sn1per - Automated Pentest Recon Scanner
2 | 
3 |
--------------------------------------------------------------------------------
/Dockerfile.blackarch:
--------------------------------------------------------------------------------
1 | FROM docker.io/blackarchlinux/blackarch:latest
2 |
3 | # Upgrade system
4 | RUN pacman -Syu --noconfirm
5 |
6 | # Install sn1per from official repository
7 | RUN pacman -Sy sn1per --noconfirm
8 |
9 | CMD ["sn1per"]
--------------------------------------------------------------------------------
/templates/active/Drupal_Scanner_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Drupal Detected 1'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH="drupal\.org"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Apache_Solr_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Apache Solr Detected'
3 | URI=''
4 | METHOD='GET'
5 | MATCH="Solr\ Admin"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Clear-text_Communications_HTTP.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Clear-Text Protocol - HTTP'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH='200 OK'
6 | SEVERITY='P2 - HIGH'
7 | CURL_OPTS="--user-agent '' -s"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Drupal_Scanner_3.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Drupal Detected 2'
3 | URI='/blog/'
4 | METHOD='GET'
5 | MATCH="drupal\.org"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/web/Trace_Method_Enabled.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='TRACE Method Enabled'
3 | FILENAME="$LOOT_DIR/web/http_options-$TARGET-*.txt"
4 | MATCH='TRACE'
5 | SEVERITY='P4 - LOW'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/active/Drupal_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Drupal Detected 3'
3 | URI='/drupal/'
4 | METHOD='GET'
5 | MATCH="drupal\.org"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/F5_BIG-IP_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='F5 BIG-IP Detected'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH='
F5 BIG-IP'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Joomla_Scanner_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Joomla Detected 1'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH='content="Joomla! '
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/PHP_Info.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='PHP Info Detected 1'
3 | URI='/phpinfo.php'
4 | METHOD='GET'
5 | MATCH='>PHP Version \<'
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-e'
--------------------------------------------------------------------------------
/templates/active/Clickjacking.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Clickjacking'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH='X-Frame-Options'
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -I"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
10 | SEARCH="negative"
--------------------------------------------------------------------------------
/templates/active/Jenkins_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Jenkins Detected'
3 | URI='/login?from=%2F'
4 | METHOD='GET'
5 | MATCH="\[Jenkins\]"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Joomla_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Joomla Detected 1'
3 | URI='/joomla/'
4 | METHOD='GET'
5 | MATCH='content="Joomla! '
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Sitemap.xml_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Sitemap.xml Detected'
3 | URI='/sitemap.xml'
4 | METHOD='GET'
5 | MATCH=''
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="-L --user-agent '' -s --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Wordpres_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Wordpress Detected 2'
3 | URI='/blog/'
4 | METHOD='GET'
5 | MATCH="content\=\"WordPress"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/cPanel_Login_Found.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='cPanel Login Found'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH="cPanel\ Login"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS=''
10 |
--------------------------------------------------------------------------------
/templates/active/AWS_S3_Public_Bucket_Listing.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='AWS S3 Public Bucket Listing'
3 | URI=''
4 | METHOD='GET'
5 | MATCH="listbucket"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Citrix_VPN_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Citrix VPN Detected'
3 | URI='/vpn/index.html'
4 | METHOD='GET'
5 | MATCH="Netscaler\ Gateway"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Citrix_VPN_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Citrix VPN Detected 2'
3 | URI='/vpn/index.html'
4 | METHOD='GET'
5 | MATCH="NetScaler "
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Confluence_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Atlassian Confluence Detected'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH="Atlassian\ Confluence"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/F5_BIG-IP_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='F5 BIG-IP Detected 2'
3 | URI='/tmui/login.jsp'
4 | METHOD='GET'
5 | MATCH='F5 BIG-IP'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/MobileIron_Login_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='MobileIron Login 1'
3 | URI='/mifs/user/login.jsp'
4 | METHOD='GET'
5 | MATCH="MobileIron"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/MobileIron_Login_3.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='MobileIron Login 3'
3 | URI='/mifs/c/d/android.html'
4 | METHOD='GET'
5 | MATCH="MobileIron"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/WebLogic_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='WebLogic Detected'
3 | URI='/console/login/LoginForm.jsp'
4 | METHOD='GET'
5 | MATCH='WebLogic'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Wordpres_Scanner_3.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Wordpress Detected 3'
3 | URI='/wordpress/'
4 | METHOD='GET'
5 | MATCH="content\=\"WordPress"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/phpMyAdmin_Scanner_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='phpMyAdmin Detected'
3 | URI='/phpmyadmin/'
4 | METHOD='GET'
5 | MATCH='phpMyAdmin '
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/web/Autocomplete_Enabled.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Autocomplete Enabled'
3 | FILENAME="$LOOT_DIR/web/websource-htt*-$TARGET-*.txt"
4 | MATCH='autocomplete=\"on\"'
5 | SEVERITY='P4 - LOW'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/passive/web/X-Powered-By_Header_Found.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='X-Powered-By Header Found'
3 | FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
4 | MATCH='X-Powered-By'
5 | SEVERITY='P5 - INFO'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/active/Drupal_User_Login.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Drupal User Login'
3 | URI='/user/login?destination=/'
4 | METHOD='GET'
5 | MATCH='user-login-form'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Jetty_Version_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Jetty Version Disclosure Detected'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH='Powered by Jetty'
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/SQLiteManager_Scanner_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='SQLiteManager Detected'
3 | URI='/sqlite/'
4 | METHOD='GET'
5 | MATCH='SQLiteManager'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/cPanel_Login_Found_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='cPanel Login Found 2'
3 | URI=':2083/'
4 | METHOD='GET'
5 | MATCH="cPanel\ Login"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS=''
10 |
--------------------------------------------------------------------------------
/templates/passive/web/Expired_SSL_Certificate.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Expired SSL Certificate'
3 | FILENAME="$LOOT_DIR/web/curldebug-$TARGET-*.txt"
4 | MATCH='certificate has expired'
5 | SEVERITY='P3 - MEDIUM'
6 | GREP_OPTIONS=''
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/active/Cisco_VPN_Login_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Cisco VPN Login Detected'
3 | URI='/+CSCOE+/logon.html'
4 | METHOD='GET'
5 | MATCH="CSCO_Format"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Jaspersoft_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Jaspersoft Detected'
3 | URI='/jasperserver/login.html?error=1'
4 | METHOD='GET'
5 | MATCH="Jaspersoft"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Jira_Scanner_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Jira Detected 1'
3 | URI='/secure/Dashboard.jspa'
4 | METHOD='GET'
5 | MATCH='Project Management Software'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Jolokia_Version_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Jolokia Version Disclosure'
3 | URI='/jolokia/version'
4 | METHOD='GET'
5 | MATCH="\"agent\"\:"
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Robots.txt_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Robots.txt Detected'
3 | URI='/robots.txt'
4 | METHOD='GET'
5 | MATCH='Disallow\:|Allow\:|Sitemap\:'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/SolarWinds_Orion_Panel.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='SolarWinds Orion Panel'
3 | URI='/Orion/Login.aspx'
4 | METHOD='GET'
5 | MATCH="SolarWinds\ Orion"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Tiki_Wiki_CMS_Groupware_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Tiki Wiki CMS Groupware'
3 | URI='/tiki-login.php'
4 | METHOD='GET'
5 | MATCH="Groupware"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Directory_Listing_Enabled.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Directory Listing Enabled'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH="Index\ of|To\ Parent\ Directory"
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Jira_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Jira Detected 2'
3 | URI='/jira/secure/Dashboard.jspa'
4 | METHOD='GET'
5 | MATCH='Project Management Software'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/PHP_Composer_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='PHP Composer Disclosure'
3 | URI='/composer.json'
4 | METHOD='GET'
5 | MATCH='repositories|require-dev'
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/TeamQuest_Login_Found.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='TeamQuest Login Found'
3 | URI='/teamquest/cgi-bin/login'
4 | METHOD='GET'
5 | MATCH="TeamQuest\ \-\ Login"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/network/Lack_of_SPF_DNS_Record.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Lack of SPF DNS Record'
3 | FILENAME="$LOOT_DIR/nmap/email-$TARGET.txt"
4 | MATCH="\[\+\]\ Spoofing\ possible"
5 | SEVERITY='P4 - LOW'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
9 | TYPE='network'
--------------------------------------------------------------------------------
/templates/passive/network/Subjack_Takeover_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Subjack Takeover Detected'
3 | FILENAME="$LOOT_DIR/nmap/subjack-$TARGET.txt"
4 | MATCH="\[Vulnerable\]"
5 | SEVERITY='P2 - HIGH'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
9 | TYPE="network"
--------------------------------------------------------------------------------
/templates/active/Citrix-Access-Gateway_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Citrix-Access-Gateway Detected'
3 | URI='/vpn/index.html'
4 | METHOD='GET'
5 | MATCH='Netscaler Gateway'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Drupal_Install_Found.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Drupal Install Found'
3 | URI='/install.php?profile=default'
4 | METHOD='GET'
5 | MATCH='Choose language | Drupal'
6 | SEVERITY='P3 - MEDIUM'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Drupal_Version_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Drupal Version Disclosure'
3 | URI='/core/install.php?profile=default'
4 | METHOD='GET'
5 | MATCH='site-version'
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/PulseSecure_VPN_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='PulseSecure VPN Detected'
3 | URI='/dana-na/auth/url_admin/welcome.cgi'
4 | METHOD='GET'
5 | MATCH='SSL'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/network/Subover_Takeover_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Subover Takeover Detected'
3 | FILENAME="$LOOT_DIR/nmap/subover-$TARGET.txt"
4 | MATCH="Takeover\ Possible"
5 | SEVERITY='P2 - HIGH'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
9 | TYPE="network"
--------------------------------------------------------------------------------
/docker-compose.yml:
--------------------------------------------------------------------------------
1 | version: '3.9'
2 |
3 | x-logging: &default-logging
4 | options:
5 | max-size: "40m"
6 | max-file: "10"
7 | driver: json-file
8 |
9 | services:
10 | kali-linux:
11 | container_name: kali-linux
12 | build:
13 | context: .
14 | dockerfile: Dockerfile
15 |
--------------------------------------------------------------------------------
/templates/active/Jira_Scanner_3.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Jira Detected'
3 | URI='/secure/ContactAdministrators!default.jspa'
4 | METHOD='GET'
5 | MATCH='Project Management Software'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Unauthenticated_Jenkins_Dashboard_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Unauthenticated Jenkins Dashboard Detected'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH="\[Jenkins\]"
6 | SEVERITY='P2 - HIGH'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/network/SSH_Version_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='SSH Version Disclosure'
3 | FILENAME="$LOOT_DIR/output/msf-$TARGET-*-ssh_version.txt"
4 | MATCH="\[\+\]"
5 | SEVERITY='P4 - LOW'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
9 | TYPE="network"
10 |
--------------------------------------------------------------------------------
/templates/passive/web/Insecure_SSL_TLS_Connection.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Weak SSL TLS Protocols'
3 | FILENAME="$LOOT_DIR/web/sslscan-$TARGET.txt $LOOT_DIR/web/sslscan-$TARGET-*.txt"
4 | MATCH="SSLv* enabled"
5 | SEVERITY='P2 - HIGH'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/active/Frontpage_Service_Password_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Frontpage Service Password Disclosure'
3 | URI='/_vti_pvt/service.pwd'
4 | METHOD='GET'
5 | MATCH=' Frontpage'
6 | SEVERITY='P2 - HIGH'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Mailman_Version_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Mailman Version Disclosure'
3 | URI='/mailman/listinfo'
4 | METHOD='GET'
5 | MATCH="Delivered\ by\ Mailman"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS=''
10 |
--------------------------------------------------------------------------------
/templates/active/RabbitMQ_Management_Interface_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='RabbitMQ Management Interface Detected'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH="RabbitMQ Management"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Weblogic_Application_Server_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Weblogic Application Server Detected'
3 | URI='/'
4 | METHOD='GET'
5 | MATCH="Weblogic\ Application\ Server"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/web/CORS_Policy_-_Allow-Origin_Wildcard.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CORS Policy - Allow-Origin Wildcard'
3 | FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
4 | MATCH='Access-Control-Allow-Origin: *'
5 | SEVERITY='P4 - LOW'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/passive/web/Insecure_Cookie_-_Secure_Not_Set.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Insecure Cookie - Secure Not Set'
3 | FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
4 | MATCH='Set-Cookie'
5 | SEVERITY='P3 - MEDIUM'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=' | egrep -iv secure'
--------------------------------------------------------------------------------
/templates/passive/web/Interesting_Title_Found.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Interesting Title Found'
3 | FILENAME="$LOOT_DIR/web/title-htt*-$TARGET-*.txt"
4 | MATCH='admin|dev|portal|login|sign|signup|registration|account'
5 | SEVERITY='P5 - INFO'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/active/Joomla_Version_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Joomla Version Disclosure'
3 | URI='/administrator/manifests/files/joomla.xml'
4 | METHOD='GET'
5 | MATCH="Joomla\ version\ "
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/web/Insecure_Cookie_-_HTTPOnly_Not_Set.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Insecure Cookie - HTTPOnly Not Set'
3 | FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
4 | MATCH='Set-Cookie'
5 | SEVERITY='P3 - MEDIUM'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=' | egrep -iv httponly'
--------------------------------------------------------------------------------
/templates/active/Apache_Tomcat_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Apache Tomcat Detected'
3 | URI='/404_DOES_NOT_EXIST'
4 | METHOD='GET'
5 | MATCH="Apache\ Tomcat\/[0-9]?[0-9]\.[0-9]?[0-9]\.[0-9]?[0-9]"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-o'
--------------------------------------------------------------------------------
/templates/active/Common_Status_File_Scanner_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Common Status File Detected 1'
3 | URI='/.perf'
4 | METHOD='GET'
5 | MATCH="Current\ Time|nginx\ vhost\ traffic|ConnectionQueue"
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/MS_SQL_Reporting_Server_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='MS SQL Reporting Server Detected 2'
3 | URI='/Reports/Pages/Folder.aspx'
4 | METHOD='GET'
5 | MATCH='Microsoft\.Reporting'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/docker-compose-blackarch.yml:
--------------------------------------------------------------------------------
1 | version: '3.9'
2 |
3 | x-logging: &default-logging
4 | options:
5 | max-size: "40m"
6 | max-file: "10"
7 | driver: json-file
8 |
9 | services:
10 | blackarch:
11 | container_name: blackarch
12 | build:
13 | context: .
14 | dockerfile: Dockerfile.blackarch
15 |
--------------------------------------------------------------------------------
/templates/active/Common_Status_File_Scanner_3.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Common Status File Detected 3'
3 | URI='/status.html'
4 | METHOD='GET'
5 | MATCH="Current\ Time|nginx\ vhost\ traffic|ConnectionQueue"
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Fortigate_Pulse_Connect_Secure_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Fortigate Pulse Connect Secure Detected'
3 | URI='/remote/login?lang=en'
4 | METHOD='GET'
5 | MATCH='Please Login'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Fortinet_FortiGate_SSL_VPN_Panel_Detected.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Fortinet FortiGate SSL VPN Panel Detected'
3 | URI='/remote/login?lang=en'
4 | METHOD='GET'
5 | MATCH="launchFortiClient"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/CVE-2020-7246_-_qdPM_Authenticated_Remote_Code_Execution.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CVE-2020-7246 - qdPM Authenticated Remote Code Execution'
3 | URI="/"
4 | METHOD='GET'
5 | MATCH='qdPM 9.'
6 | SEVERITY='P1 - CRITICAL'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Common_Status_File_Scanner_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Common Status File Detected 2'
3 | URI='/server-status'
4 | METHOD='GET'
5 | MATCH="Current\ Time|nginx\ vhost\ traffic|ConnectionQueue"
6 | SEVERITY='P4 - LOW'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Fortinet_FortiGate_SSL_VPN_Panel_Detected_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Fortinet FortiGate SSL VPN Panel Detected 1'
3 | URI='/remote/login?lang=en'
4 | METHOD='GET'
5 | MATCH="launchFortiClient"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/MS_SQL_Reporting_Server_Scanner_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='MS SQL Reporting Server Detected 1'
3 | URI='/ReportServer/pages/ReportViewer.aspx'
4 | METHOD='GET'
5 | MATCH='Microsoft\.Reporting'
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/web/CORS_Policy_-_Allow-Credentials_Enabled.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CORS Policy - Allow-Credentials Enabled'
3 | FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
4 | MATCH='Access-Control-Allow-Credentials: true'
5 | SEVERITY='P4 - LOW'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/templates/active/CVE-2019-7192_-_QNAP_Pre-Auth_Root_RCE.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CVE-2019-7192 - QNAP Pre-Auth Root RCE'
3 | URI='/photo/p/api/video.php'
4 | METHOD='GET'
5 | MATCH="\[\ 401\ Unauthorized\ \]"
6 | SEVERITY='P1 - CRITICAL'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Fortinet_FortiGate_SSL_VPN_Panel_Detected_2.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Fortinet FortiGate SSL VPN Panel Detected 2'
3 | URI=':10443/remote/login?lang=en'
4 | METHOD='GET'
5 | MATCH="launchFortiClient"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Fortinet_FortiGate_SSL_VPN_Panel_Detected_3.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Fortinet FortiGate SSL VPN Panel Detected 3'
3 | URI=':4443/remote/login?lang=en'
4 | METHOD='GET'
5 | MATCH="launchFortiClient"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/network/Default_Credentials_NMap.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Default Credentials - NMap'
3 | FILENAME="$LOOT_DIR/output/nmap-$TARGET.txt $LOOT_DIR/output/nmap-$TARGET-*.txt"
4 | MATCH="Valid\ credentials"
5 | SEVERITY='P1 - CRITICAL'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
9 | TYPE="network"
--------------------------------------------------------------------------------
/templates/passive/network/Interesting_Domain_Found.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Interesting Domain Found'
3 | echo "$TARGET" > /tmp/target
4 | FILENAME="/tmp/target"
5 | MATCH="admin|dev|portal|stage|prod|tst|test"
6 | SEVERITY='P5 - INFO'
7 | GREP_OPTIONS='-i'
8 | SEARCH='positive'
9 | SECONDARY_COMMANDS=''
10 | TYPE='network'
--------------------------------------------------------------------------------
/templates/passive/network/SMB_Info_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='SMB Info Disclosure'
3 | FILENAME="$LOOT_DIR/output/msf-$TARGET-port139.txt $LOOT_DIR/output/msf-$TARGET-port445.txt"
4 | MATCH="\[\+\]"
5 | SEVERITY='P4 - LOW'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
9 | TYPE="network"
10 |
--------------------------------------------------------------------------------
/templates/passive/web/Clear-text_Communications_HTTP.sh:
--------------------------------------------------------------------------------
1 | if [ "$SSL" = "false" ]; then
2 | AUTHOR='@xer0dayz'
3 | VULN_NAME='Clear-Text Protocol - HTTP'
4 | FILENAME="$LOOT_DIR/web/headers-http-$TARGET-*.txt"
5 | MATCH="200\ OK"
6 | SEVERITY='P2 - HIGH'
7 | GREP_OPTIONS='-i'
8 | SEARCH='positive'
9 | SECONDARY_COMMANDS=''
10 | fi
--------------------------------------------------------------------------------
/templates/passive/web/Fortinet_FortiGate_SSL_VPN_Panel_Passive_Detection.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Fortinet FortiGate SSL VPN Panel Passive Detection'
3 | FILENAME="$LOOT_DIR/web/headers-htt*-$TARGET-*.txt"
4 | MATCH="Server\:\ xxxxxxxx-xxxxx"
5 | SEVERITY='P5 - INFO'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
--------------------------------------------------------------------------------
/sn1per.desktop:
--------------------------------------------------------------------------------
1 | [Desktop Entry]
2 | Name=sn1per
3 | Encoding=UTF-8
4 | Exec=bash-wrapper "sudo sniper"
5 | Icon=/usr/share/pixmaps/sn1per.png
6 | StartupNotify=false
7 | Terminal=true
8 | Type=Application
9 | Categories=08-exploitation-tools;02-vulnerability-analysis;01-info-gathering;
10 | X-Kali-Package=sn1per
11 | Comment=
12 | Path=
13 |
--------------------------------------------------------------------------------
/templates/active/CVE-2019-19781_-_Citrix_ADC_Directory_Traversal.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CVE-2019-19781 - Citrix ADC Directory Traversal'
3 | URI='/vpn/../vpns/cfg/smb.conf'
4 | METHOD='GET'
5 | MATCH='\[global\]'
6 | SEVERITY='P1 - CRITICAL'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/passive/network/CVE-2018-15473_-_OpenSSH_Username_Enumeration.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CVE-2018-15473 - OpenSSH Username Enumeration'
3 | FILENAME="$LOOT_DIR/output/msf-$TARGET-*-ssh_enumusers.txt"
4 | MATCH="\[+\]"
5 | SEVERITY='P3 - MEDIUM'
6 | GREP_OPTIONS='-i'
7 | SEARCH='positive'
8 | SECONDARY_COMMANDS=''
9 | TYPE="network"
--------------------------------------------------------------------------------
/templates/active/CVE-2019-5418_-_Rail_File_Content_Disclosure.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CVE-2019-5418 - File Content Disclosure on Rails'
3 | URI="/../../../../../../../../etc/passwd\{\{"
4 | METHOD='GET'
5 | MATCH="root:*:"
6 | SEVERITY='P2 - HIGH'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/Palo_Alto_GlobalProtect_PAN-OS_Portal_Scanner.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='Palo Alto GlobalProtect PAN-OS Portal Detected'
3 | URI='/global-protect/login.esp'
4 | METHOD='GET'
5 | MATCH="GlobalProtect"
6 | SEVERITY='P5 - INFO'
7 | CURL_OPTS="--user-agent '' -s -L --insecure"
8 | SECONDARY_COMMANDS=''
9 | GREP_OPTIONS='-i'
--------------------------------------------------------------------------------
/templates/active/CVE-2020-2096_Jenkins_Gitlab_XSS_1.sh:
--------------------------------------------------------------------------------
1 | AUTHOR='@xer0dayz'
2 | VULN_NAME='CVE-2020-2096 Jenkins Gitlab XSS 1'
3 | URI="/git/build_now/a'\">%3Csvg/onload=alert(1337)%3E"
4 | METHOD='GET'
5 | MATCH="