Skip to content

Site / Server / Dork Scanner أبسط أداة لفحص المواقع و الخوادم - عتاد الهاكر المحترف

Notifications You must be signed in to change notification settings

cckchy/ATSCAN

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 

Repository files navigation

ATSCAN

Search / Site / Server Scanner

Alisam Technology is not responsible for any misuse, damage caused by this script or attacking targets without prior mutual consent!
AUTHOR:Alisam@Technology
FACE:facebook.com/Forces.des.tempetes.marocaines
YOUTUBE:youtube.com/c/AlisamTechnology
WITTER:twitter.com/AlisamTechno
PLUS:plus.google.com/+AlisamTechnology
Description:
ATSCAN version 6.3
SEARCH engine
XSS scanner.
Sqlmap.
LFI scanner.
Filter wordpress and Joomla sites in the server.
Find Admin page.
Decode / Encode MD5 + Base64.
Ports scan.
Scan E-mails in sites.
Use proxy.
Random user agent.
Fandom search engine.
Scan errors.
Detect Cms.
Multiple instant scan.
Brute force.
Disponible on BlackArch Linux Platform.
Libreries to install:
ap-get install libxml-simple-perl
aptitude install libio-socket-ssl-perl
aptitude install libcrypt-ssleay-perl
NOTE: Works in linux platforms. Best Run on Ubuntu 14.04, Kali Linux 2.0, Arch Linux, Fedora Linux, Centos | if you use a windows you can download manualy.
Download & Executution:
git clone https://github.com/AlisamTechnology/ATSCAN
cd ATSCAN
chmod +x ATSCAN
OR
$chmod +x atscan.pl
Execute: perl ./atscan.pl
Help: perl ./atscan.pl --help
Update: perl ./atscan.pl --update
Screenshots:








Help:
  <tr>
    <td width="200px" class="main">--TARGET</td>
    <td class="main">Captured Target</td>
  </tr>
  <tr>
    <td width="200px" class="main">--FULL_TARGET</td>
    <td class="main">Captured Full Target</td>
  </tr>
  <tr>
    <td width="200px" class="main">--exp</td>
    <td class="main">Set exploit</td>
  </tr>
  <tr>
    <td width="200px" class="main">--valid</td>
    <td class="main">Text to validate results</td>
  </tr>
  <tr>
    <td width="200px" class="main">--sqlmap</td>
    <td class="main">Sqlmaping xss results</td>
  </tr>
  <tr>
    <td width="200px" class="main">--lfi</td>
    <td class="main">local file inclusion</td>
  </tr>
  <tr>
    <td width="200px" class="main">--joomrfi</td>
    <td class="main">get joomla sites with rfi</td>
  </tr>
  <tr>
    <td width="200px" class="main">--shell</td>
    <td class="main">shell link [Ex: http://www.site.com/shell.txt]</td>
  </tr>
  <tr>
    <td width="200px" class="main">--wpadf</td>
    <td class="main">get wordpress sites with arbitery file download</td>
  </tr>
  <tr>
    <td width="200px" class="main">--admin</td>
    <td class="main">get site admin page</td>
  </tr>
  <tr>
    <td width="200px" class="main">--shost</td>
    <td class="main">get site subdomains</td>
  </tr>
  <tr>
    <td width="200px" class="main">--ports</td>
    <td class="main">scan server ports</td>
  </tr>
  <tr>
    <td width="200px" class="main">--start</td>
    <td class="main">start scan port</td>
  </tr>
  <tr>
    <td width="200px" class="main">--end</td>
    <td class="main">end scan port</td>
  </tr>
  <tr>
    <td width="200px" class="main">--all</td>
    <td class="main">complete mode</td>
  </tr>
  <tr>
    <td width="200px" class="main">--basic</td>
    <td class="main">basic mode</td>
  </tr>
  <tr>
    <td width="200px" class="main">--select</td>
    <td class="main">Select mode you can set rang of ports</td>
  </tr>
  <tr>
    <td width="200px" class="main">--sites</td>
    <td class="main">sites in the server</td>
  </tr>
  <tr>
    <td width="200px" class="main">--wp</td>
    <td class="main">get wordpress sites</td>
  </tr>
  <tr>
    <td width="200px" class="main">--joom</td>
    <td class="main">Getjoomla sites</td>
  </tr>
  <tr>
    <td width="200px" class="main">--upload</td>
    <td class="main">get sites with upload files</td>
  </tr>
  <tr>
    <td width="200px" class="main">--zip</td>
    <td class="main">get sites with zip files</td>
  </tr>
  <tr>
    <td width="200px" class="main">--save</td>
    <td class="main">file prefix to save results (if not set tool sets one)</td>
  </tr>
  <tr>
    <td width="200px" class="main">--md5</td>
    <td class="main">convert to md5</td>
  </tr>
  <tr>
    <td width="200px" class="main">--encode64</td>
    <td class="main">encode base64 string</td>
  </tr>
  <tr>
    <td width="200px" class="main">--decode64</td>
    <td class="main">decode base64 string</td>
  </tr>
  <tr>
    <td width="200px" class="main">--isup</td>
    <td class="main">check http status 200</td>
  </tr>
  <tr>
    <td width="200px" class="main">--email</td>
    <td class="main">Extract e-mails</td>
  </tr> 
  <tr>
    <td width="200px" class="main">--command</td>
    <td class="main">External Command</td>
  </tr>
  <tr>
    <td width="200px" class="main">--replace</td>
    <td class="main">string to replace</td>
  </tr>
  <tr>
    <td width="200px" class="main">--with</td>
    <td class="main">string to replace with</td>
  </tr>
  <tr>
    <td width="200px" class="main">--save</td>
    <td class="main">Set prefix to saved files</td>
  </tr>
  <tr>
    <td width="200px" class="main">--rang</td>
    <td class="main">Set range of ip</td>
  </tr>
  <tr>
  <tr>
    <td width="200px" class="main">--wpbf</td>
    <td class="main">Wordpress admin login brute force</td>
  </tr>
  <tr>
    <td width="200px" class="main">--joombf</td>
    <td class="main">Joomla admin login brute force</td>
  </tr>
  <tr>
    <td width="200px" class="main">--user</td>
    <td class="main">Set username Wordpress/Joomla login brute force</td>
  </tr>
  <tr>
    <td width="200px" class="main">--pass</td>
    <td class="main">Set password list Wordpress/Joomla login brute force</td>
  </tr>
  
    <td width="200px" class="main">--nobanner</td>
    <td class="main">Hide tool banner</td>
  </tr>    
  <tr>
    <td width="200px" class="main">--beep</td>
    <td class="main">Produce beep sound if positive scan found</td>
  </tr>    
</table></td>
--proxy Set tor proxy [Ex: socks://localhost:9050]
--dork dork to search [Ex: house,cars,hotel]
--level Scan level (+- Number of page results to scan)
--xss Xss scan
--joomrfi joomla local file inclusion scan
-t Target

Examples:
Simple search:
Search: --dork [dork] --level [level]
Search with many dorks: --dork [dork1,dork2,dork3] --level [level]
Search + set save file: --dork [dorks.txt] --level [level] --save myfile.txt
Search + Replace + Exploit: --dork [dorks.txt] --level [level] --replace [string] --with [string] --valid [string]
Search + Extract e-mails: --dork [dorks.txt] --level [level] --email
Search + Brute Force: --dork [dorks.txt] --level [10] --wpbf/--joombf --user [username] --pass [list.txt]

Subscan from Serach Engine:
Search + Exploitation: --dork [dork] --level [10] --xss/--lfi/--wp ...
Search + xss + sqlmap: --dork [dork] --level [10] --xss --sqlmap
Search + Server Exploitation: -t [ip] --level [10] --xss/--lfi/--wp ...
Search + Server Exploitation: --rang 133.21.10.155-19.102.25.14 --level [10] --xss/--lfi/--wp ...
Search + Server Exploitation: -t [ip] --level [10] --wpbf/--joombf --user [username] --pass [list.txt]
Search + Replace + Exploit: --dork [dork] --level [10] --replace [string] --with [string] --exp [exploit] --xss/--lfi/--wp ...

Validation:
Search + Exploit + Validation: --dork [dork] --level [10] --exp --isup/--valid [string]
Search + Server Exploit + Validation: -t [ip] --level [10] --exp --isup/--valid [string]
Search + Replace + Exploit: --dork [dork] --level [10] --replace [string] --with [string] --isup/--valid [string]

Use List / Target:
-t [target/targets.txt] --exp --isup/--valid [string]
-t [target/targets.txt] --xss/--lfi ..

Server:
Get Server sites: -t [ip] --level [value] --sites
Get Server wordpress sites: -t [ip] --level [value] --wp
Get Server joomla sites: -t [ip] --level [value] --joom
Get Server upload sites: -t [ip] --level [value] --upload
Get Server zip sites files: -t [ip] --level [value] --zip
WP Arbitry File Download: -t [ip] --level [value] --wpadf
Joomla RFI: -t [ip] --level [1] --joomfri --shell [shell link]
Scan basic tcp (quick): -t [ip] --ports --basic tcp
Scan basic udp basic (quick): -t [ip] --ports --basic udp
Scan basic udp+tcp: -t [ip] --ports --basic udp+tcp
Scan complete tcp: -t [ip] --ports --all tcp
Scan complete udp: -t [ip] --ports --all udp
Scan complete udp+tcp: -t [ip] --ports --all udp+tcp
Scan rang tcp: -t [ip] --ports --select tcp --start [value] --end [value]
Scan rang udp: -t [ip] --ports --select udp--start [value] --end [value]
Scan rang udp + tcp: -t [ip] --ports --select udp+tcp --start [value] --end [value]

Encode / Decode:
Generate MD5: --md5 [string]
Encode base64: --encode64 [string]
Decode base64: --decode64 [string]

External Command:
--dork [dork/dorks.txt] --level [level] --command "curl -v --TARGET"
--dork [dork/dorks.txt] --level [level] --command "curl -v --FULL_TARGET"
-t [target/targets.txt] --level [level] --command "curl -v --TARGET"
-t [target/targets.txt] --command "curl -v --FULL_TARGET"

Multiple Scan:
--dork [dork] --level [10] --xss/--lfi/--wp ...
--dork [dork] --level [10] --replace [string] --with [string] --exp [exploit] --xss --lfi --wp ...
-t [ip] --level [10] --xss --lfi --wp ...
-t [targets] --xss --lfi --wp ...

.....

Check for updates:
--update

Support us:

About

Site / Server / Dork Scanner أبسط أداة لفحص المواقع و الخوادم - عتاد الهاكر المحترف

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Perl 100.0%