IMCAFS

Home

id/bashter: web vulnerability scanner using shell script

Posted by fierce at 2020-02-27
all

Web Crawler, Scanner, and Analyzer Framework (Shell-Script based) About: Bashter is a tool for scanning a Web-based Application. Bashter is very suitable for doing Bug Bounty or Penentration Testing. It is designed like a framework so you can easily add a script for detect vulnerability. For Example To be more powerful, You can add something script (custom) like this: modules/form/yourscript.bash {WEB-URL} {SOURCECODE} modules/url/yourscript.bash {WEB-URL} {SOURCECODE} modules/header/yourscript.bash {WEB-URL} {SOURCECODE} For the sample, you can follow existing scripts. Disable Script You only need to change the extension, for example .bash => .bashx.

.bash .bashx

by Default: Web Crawler Gather Input Form Detect Missconfigured CORS Detect missing X-FRAME-OPTIONS (Clickjacking Potential) Detect Reflected XSS via URL Detect Reflected XSS via Form Detect HTTP Splitting Response via CRLF Injection Detect Open Redirect Tested on: How to Run: git clone https://github.com/zerobyte-id/Bashter.git

git clone https://github.com/zerobyte-id/Bashter.git

CD Bashter/

cd Bashter/

bash bashter. bash

bash bashter.bash

Notes: This tool will consume a lot of disk usage, so don't forget to housekeep bashter-tempdata and scan-logs.

bashter-tempdata scan-logs

Contributor: Schopath (@panophan) Suhada (@suhada99) Abay (@abaykan) EOF www.zerobyte.id