A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases, and dynamic default pages. First presented at SecTalks BNE in September 2017 (slidedeck). Key Benefits: - Quickly highlight unique content in catch-all scenarios - Locate the outliers in catch-all scenarios where results have dynamic content on the page (such as the time) - Identify aliases by tweaking the unique depth of matches - Wordlist supports standard words and a variable to input a base hostname (for e.g. dev.%s from the wordlist would be run as dev.BASE_HOST) - Works over HTTP and HTTPS - Ability to set the real port of the webserver to use in headers when pivoting through ssh/nc - Add simple response headers to bypass some WAF products - Identify new targets by using reverse lookups and append to wordlist Product Comparisons: - Install on docker (recommended) - git clone https://github.com/codingo/VHostScan.git - cd VHostScan - docker build -t vhostscan . - Then run application `docker run --rm -it vhostscan -t` - Install Requirements: - Install using: $ python3 setup.py install - Dependencies will then be installed and VHostScan will be added to your path. - If there is an issue regarding running py
FEATURES
SIMILAR TOOLS
A vulnerability management tool for macOS that monitors and detects vulnerabilities in over 100 apps.
A tool that detects dangling DNS records in a multi-cloud environment to prevent subdomain takeovers.
XGuardian XARA Security Scanner for OSX with URL scheme, Bundle ID, and keychain hijack checks.
Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.
A centralized vulnerability lifecycle management platform that tracks security issues from discovery to closure with real-time status updates.
List of publicly disclosed vulnerabilities with security filters and detailed advisories.
All-in-one vulnerability intelligence platform for prioritizing remediation efforts and driving security strategies.
A tool for static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers
A fully customizable, offensive security reporting solution for pentesters, red teamers, and other security professionals.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.