Created by ViperFSFA "Hack the planet!"
THRONE is a pentesting toolkit intended strictly for authorized security testing and educational use. You must have explicit permission from the owner of any system, network, or domain you test. The creator and contributors are not responsible for any misuse, damage, or unauthorized activity.
THRONE is a Python-based command-line pentesting toolkit designed to provide a wide variety of reconnaissance and scanning utilities — all in a single, interactive CLI.
It’s built using libraries like:
requests,socket, andsslfor network operationsBeautifulSoupfor HTML parsingrichandcoloramafor beautiful terminal output
THRONE includes a diverse set of modules for reconnaissance and web security testing:
| Category | Tools |
|---|---|
| Domain Intelligence | Domain scan, WHOIS lookup, subdomain enumeration |
| Network Analysis | Reverse IP lookup, IP/GeoIP lookup |
| Web Recon | Directory scanning, spider crawler |
| Protocol Tests | HTTP methods scan, DNS zone transfer |
| Fingerprinting | Banner grabbing, technology fingerprinting |
| Security Checks | WAF detection, XSS parameter scanning |
THRONE requires Python 3.8+ and the following dependencies:
pip install rich colorama requests beautifulsoup4 python-whois dnspythonOptional dependencies:
geoip2(for advanced GeoIP support)aiohttp/aiodns(for async modules in future updates)
-
Clone the repository
git clone https://github.com/ViperFSFA/THRONE.git cd THRONE -
Install dependencies
pip install -r requirements.txt
(Or manually install the modules listed above.)
-
Run THRONE
python3 User_Main.py
Once launched, you’ll be greeted by the THRONE banner and an interactive prompt:
user@throne> help| Command | Description |
|---|---|
help |
Show all commands |
scan <domain> |
Perform a general domain scan (ports, SSL, headers) |
geoip <domain> |
Lookup GeoIP information for a domain |
iplookup <ip> |
Lookup details about an IP address |
dirscan <domain> [wordlist] |
Directory scan with optional custom wordlist |
whois <domain> |
WHOIS lookup |
spider <domain> |
Web crawler to discover links |
subdomain <domain> [wordlist] |
Subdomain enumeration |
reverseip <domain> |
Reverse IP lookup (find hosted domains) |
httpmethods <domain> |
Enumerate supported HTTP methods |
zonetransfer <domain> |
Test for DNS zone transfer vulnerabilities |
bannergrab <domain> <port> |
Grab service banners from open ports |
techfinger <domain> |
Detect technologies (headers, frameworks, etc.) |
wafdetect <domain> |
Detect Web Application Firewalls |
findxss <domain> |
Detect potential XSS injection points |
about |
Display information about THRONE |
exit / quit |
Exit the CLI |
user@throne> scan example.comuser@throne> whois example.comuser@throne> geoip example.comuser@throne> dirscan example.com ./wordlists/common.txt[cyan]DNS:[/cyan] example.com resolves to [bold]93.184.216.34[/bold]
[green]http://example.com : UP (Status 200)[/green]
[bold magenta]Port Scan:[/bold magenta]
[green]80 OPEN (HTTP)[/green]
[red]22 CLOSED (SSH)[/red]
[bold blue]SSL:[/bold blue] Subject: example.com, Issuer: Let's Encrypt
Author: ViperFSFA Website: ViperFSFA.com