killchain
Raccoon
killchain | Raccoon | |
---|---|---|
2 | 4 | |
199 | 2,993 | |
- | - | |
2.6 | 0.0 | |
10 months ago | over 1 year ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
killchain
Raccoon
-
What paths are the most common ones to find the file system on a webserver. ?
add these in too https://github.com/evyatarmeged/Raccoon/blob/master/raccoon_src/wordlists/fuzzlist
-
I wrote a blazing fast subdomain enumerator! (100.000 domains checked under 10 minutes!)
This + Raccoon seems like it would be a great first recon scan.
- Finding โsecretโ directories on local servers
-
Automatic target scanning
There are also dir scanners like Raccoon, https://github.com/evyatarmeged/Raccoon
What are some alternatives?
CamRaptor - CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.
rapidscan - :new: The Multi-Tool Web Vulnerability Scanner.
dirsearch - Web path scanner
HackVault - A container repository for my public web hacks!
Lockdoor-Framework - ๐ Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
evillimiter - Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
reconspider - ๐ Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.
PhoneSploit-Pro - An all-in-one hacking tool to remotely exploit Android devices using ADB and Metasploit-Framework to get a Meterpreter session.
recon - Enumerate a target Based off of Nmap Results
DumpsterFire - "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
peafl64 - Static Binary Instrumentation tool for Windows x64 executables