VHostScan Logo

VHostScan

0
Free
Visit Website

A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases, and dynamic default pages. First presented at SecTalks BNE in September 2017 (slidedeck). Key Benefits: - Quickly highlight unique content in catch-all scenarios - Locate the outliers in catch-all scenarios where results have dynamic content on the page (such as the time) - Identify aliases by tweaking the unique depth of matches - Wordlist supports standard words and a variable to input a base hostname (for e.g. dev.%s from the wordlist would be run as dev.BASE_HOST) - Works over HTTP and HTTPS - Ability to set the real port of the webserver to use in headers when pivoting through ssh/nc - Add simple response headers to bypass some WAF products - Identify new targets by using reverse lookups and append to wordlist Product Comparisons: - Install on docker (recommended) - git clone https://github.com/codingo/VHostScan.git - cd VHostScan - docker build -t vhostscan . - Then run application `docker run --rm -it vhostscan -t` - Install Requirements: - Install using: $ python3 setup.py install - Dependencies will then be installed and VHostScan will be added to your path. - If there is an issue regarding running py

FEATURES

ALTERNATIVES

Command line interface for managing and inspecting images, policies, subscriptions, and registries with support for various operating systems and packages.

iOS application for testing iOS penetration testing skills in a legal environment.

Tool to identify and understand code-injection vulnerabilities in Windows 7 UAC whitelist system.

A VMware image for penetration testing purposes

FullHunt is a next-generation attack surface security platform that enables companies to discover, monitor, and secure their external attack surfaces.

A script that checks for common best-practices around deploying Docker containers in production.

kube-hunter hunts for security weaknesses in Kubernetes clusters.

Linux privilege escalation auditing tool for detecting security deficiencies in Linux kernels.