-
Notifications
You must be signed in to change notification settings - Fork 2
Web application scanner
License
mezgani/gomoz
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
__software__= "gomoz" __author__ = "MEZGANI Ali handrix [@] gmail [.] com" __version__ = "1.0.1" __cvsversion__ = "Revision: 1.0" __date__ = "Date: 2006" __copyright__ = "Copyright (c) native labs" __license__="GPL" __credits__ = "Thanks mam for support" __url__="http://groups.google.com/gomoz" Gomoz is an open source Web Application Security Scanner developed by Native LABS. it has more than 5,000 Web include's Attack Signature database. Gomoz will test a web server in the shortest timespan possible, and produce deeply a pentest web intrusion. It's based on backdooring technics (c99, r57, others) to inject its own exec file via POST, also spawn a shell. Gomoz is developed with python. Gomoz contains: - port scanner : which checks a machine for open ports. - http info : checks a web server for running application version. - result saver : All result are saved under the most famous format (xml or sqlite) - 4 scanning modes : Gomoz performs a multi-thread scan 1- input scan : scan one url + one exploit 2- single scan : scan one url + all exploits 3- global scan : scan all url + one exploits 4- massive scan : scan all urls + all exploits name : is the name of a scan instance. Keyword : is a constant string in the included page, its important to determine if the web server are vulnerable. If the vulnerable server does not support GET methods so, backdooring servers is indispensible for running a console.
About
Web application scanner
Topics
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published