Bonjour a tous,
Nouvelle version d'INURLBR 2.1 dispo, Script PHP pouvant être utilisé pour la collecte de renseignements.
Moteur supporté:
GOOGLE / (CSE) GENERIC RANDOM / API
BING
YAHOO BR
ASK
HAO123 BR
GOOGLE (API)
LYCOS
UOL BR
YAHOO US
SAPO
DMOZ
GIGABLAST
NEVER
BAIDU BR
ANDEX
ZOO
HOTBOT
ZHONGSOU
HKSEARCH
EZILION
SOGOU
DUCK DUCK GO
BOOROW
GOOGLE(CSE) GENERIC RANDOM
Moteur avancé:
TOR FIND
ELEPHANT
TORSEARCH
WIKILEAKS
OTN
EXPLOITS SHODAN
Possibilités:
Possibility generate IP ranges or random_ip and analyze their targets.
Customization of HTTP-HEADER, USER-AGET, URL-REFERENCE.
Execution external to exploit certain targets.
Generator dorks random or set file dork.
Option to set proxy, file proxy list, http proxy, file http proxy.
Set time random proxy.
It is possible to use TOR ip Random.
Debug processes urls, http request, process irc.
Server communication irc sending vulns urls for chat room.
Possibility injection exploit GET / POST => SQLI, LFI, LFD.
Filter and validation based regular expression.
Extraction of email and url.
Validation using http-code.
Search pages based on strings file.
Exploits commands manager.
Paging limiter on search engines.
Beep sound when trigger vulnerability note.
Use text file as a data source for urls tests.
Find personalized strings in return values of the tests.
Validation vulnerability shellshock.
File validation values wordpress wp-config.php.
Execution sub validation processes.
Validation syntax errors database and programming
Data encryption as native parameter.
Random google host.
Scan port.
Error Checking & values:
JAVA INFINITYDB,
LOCAL FILE INCLUSION,
ZIMBRA MAIL,
ZEND FRAMEWORK,
ERROR MARIADB,
ERROR MYSQL,
ERROR JBOSSWEB,
ERROR MICROSOFT,
ERROR ODBC,
ERROR POSTGRESQL,
ERROR JAVA INFINITYDB,
ERROR PHP,
CMS WORDPRESS,
SHELL WEB,
ERROR JDBC,
ERROR ASP,
ERROR ORACLE,
ERROR DB2,
JDBC CFM,
ERROS LUA,
ERROR INDEFINITE
https://github.com/googleinurl/SCANNER-INURLBR
Nouvelle version d'INURLBR 2.1 dispo, Script PHP pouvant être utilisé pour la collecte de renseignements.
Moteur supporté:
GOOGLE / (CSE) GENERIC RANDOM / API
BING
YAHOO BR
ASK
HAO123 BR
GOOGLE (API)
LYCOS
UOL BR
YAHOO US
SAPO
DMOZ
GIGABLAST
NEVER
BAIDU BR
ANDEX
ZOO
HOTBOT
ZHONGSOU
HKSEARCH
EZILION
SOGOU
DUCK DUCK GO
BOOROW
GOOGLE(CSE) GENERIC RANDOM
Moteur avancé:
TOR FIND
ELEPHANT
TORSEARCH
WIKILEAKS
OTN
EXPLOITS SHODAN
Possibilités:
Possibility generate IP ranges or random_ip and analyze their targets.
Customization of HTTP-HEADER, USER-AGET, URL-REFERENCE.
Execution external to exploit certain targets.
Generator dorks random or set file dork.
Option to set proxy, file proxy list, http proxy, file http proxy.
Set time random proxy.
It is possible to use TOR ip Random.
Debug processes urls, http request, process irc.
Server communication irc sending vulns urls for chat room.
Possibility injection exploit GET / POST => SQLI, LFI, LFD.
Filter and validation based regular expression.
Extraction of email and url.
Validation using http-code.
Search pages based on strings file.
Exploits commands manager.
Paging limiter on search engines.
Beep sound when trigger vulnerability note.
Use text file as a data source for urls tests.
Find personalized strings in return values of the tests.
Validation vulnerability shellshock.
File validation values wordpress wp-config.php.
Execution sub validation processes.
Validation syntax errors database and programming
Data encryption as native parameter.
Random google host.
Scan port.
Error Checking & values:
JAVA INFINITYDB,
LOCAL FILE INCLUSION,
ZIMBRA MAIL,
ZEND FRAMEWORK,
ERROR MARIADB,
ERROR MYSQL,
ERROR JBOSSWEB,
ERROR MICROSOFT,
ERROR ODBC,
ERROR POSTGRESQL,
ERROR JAVA INFINITYDB,
ERROR PHP,
CMS WORDPRESS,
SHELL WEB,
ERROR JDBC,
ERROR ASP,
ERROR ORACLE,
ERROR DB2,
JDBC CFM,
ERROS LUA,
ERROR INDEFINITE
https://github.com/googleinurl/SCANNER-INURLBR