flan
amass
flan | amass | |
---|---|---|
4 | 21 | |
4,029 | 11,273 | |
0.2% | 1.8% | |
0.0 | 6.9 | |
3 months ago | about 1 month ago | |
Python | Go | |
BSD 3-clause "New" or "Revised" License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
flan
-
Researchers Discover 40k-Strong EOL Router, IoT Botnet
This problem is only worsening. I recommend running nmap vulners or flan on a cron at home against your network.
I found multiple CVEs in my brand new (2023) router. They were running old versions of dropbear SSH, dnsmasq that had vulns.
Most routers are just cobbled together from years-old OpenWRT releases or worse.
I also found vulns on a brother printer, a smart plug, wifi-enabled air filter.
Everything in your house that has wifi probably has a vuln on it.
https://github.com/vulnersCom/nmap-vulners
https://github.com/cloudflare/flan
I urge everyone to check you'll definitely find a CVE
- What Do You Use to Test For Vulnerabilities and Unsecured Systems/Ports?
-
Clarification on Black Box Pentesting
Just adding to the answer, use flan for better visualization of nmap vulners https://github.com/cloudflare/flan
- Is Flan Scan deprecated?
amass
-
OWASP Amass
The Amass tool is a perfect fit for the sub-techniques in the Search Open Technical Databases category which is part of the reconnaissance phase from the matrix above.
-
amass VS dmut - a user suggested alternative
2 projects | 29 Nov 2023
-
findomain VS amass - a user suggested alternative
2 projects | 24 Nov 2023
- In-depth attack surface mapping and asset discovery
- 10. 使用工具帮你进行开源情报收集
-
Looking for Recommendations for New Vulnerability & PHI/PII Scanner
OWASP Zap, OWASP Amass, OpenVAS Scanner
-
Can authenticated internet-facing web app be discovered if not indexed by search engines?
My main source is Certificate Transparency, which is kind of a database of TLS certs created so far. But use external tools like Subfinder or Amass.
-
Millions of .git folders exposed publicly by mistake
Scan our domains and infrastructure to reveal if we have exposed.git repositories and other critical infrastructure. You can scan your domains and subdomains with many tools such as Amass or dirsearch to name a couple.
-
Tools for subdomain brute forcing
Amass = https://github.com/OWASP/Amass
- RustScan/RustScan: 🤖 The Modern Port Scanner 🤖
What are some alternatives?
subfinder - Fast passive subdomain enumeration tool.
assetfinder - Find domains and subdomains related to a given domain
masscan - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.
theHarvester - E-mails, subdomains and names Harvester - OSINT
nuclei - Fast and customizable vulnerability scanner based on simple YAML based DSL.
spiderfoot - SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Network-segmentation-cheat-sheet - Best practices for segmentation of the corporate network of any company
ZAP - The ZAP core project
SQLMap - Automatic SQL injection and database takeover tool
dnstwist - Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
seekr - A multi-purpose OSINT toolkit with a neat web-interface.
dnstake - DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover