✨Assaulter is an Automated Vulnerability scanner, that detects many Web Application Vulnerabilities, using a simple hacker's methodology.✨
Assaulter requires Python v3.5+ to run. Install the dependencies using following commands:
git clone https://github.com/17h4ck3r11/Assaulter.git
cd Assaulter
chmod +x *
sudo bash setup.sh
- Enumerate Subdomains.
- Scans IP addresses.
- Technology Stack, Operating System, and Versions detection.
- Scanning for various Vulnerabilities, and Exposures.
Assaulter uses a number of open source projects to work properly:
- Nmap - For network discovery and security scanning.
- Nikto - To perform comprehensive tests against web servers.
- Subfinder - Subdomain discovery tool.
- Sublist3r - Enumerate subdomains of websites using OSINT.
- Assetfinder - Subdomain Enumeration Tool.
- HTTPX - Fast and multi-purpose HTTP toolkit that allows running multiple probes.
- Amass - Performs network mapping of attack surfaces and external asset discovery.
- Nuclei - Fast and customisable vulnerability scanner.
- Subzy - Subdomain takeover tool.
- Dirsearch - An advanced web path brute-forcer.
And of course Assaulter itself is open source with a Public Repository Assaulter on GitHub.
Assaulter is currently using multiple Python modules, to work properly. Instructions on how to use them in your own application are linked below:
MODULES | DOCUMENTATION |
---|---|
requests | Link |
bs4 | Link |
termcolor | Link |
urllib.parse | Link |
sys | Link |
This program is free software: you can redistribute it and/or modify it under the terms of the MIT LICENSE.
Before making any contribution, read the Contribution Guide.