Striker v0.9-beta releases: offensive information and vulnerability scanner

Striker

Striker 2.0 is still in the prototype phase, which means it’s not intended to be used by regular users. It has been made public for contributions to make the development faster.

Workflow

Phase 1: Attack Surface Discovery

This phase includes finding subdomains of the user-specified domain, filtering alive hosts as well scanning of 1000 most common TCP ports.

Phase 2: Sweeping

Mass scanning of misconfigured HTTP response headers, croassdomain.xml as well as checks for some sensitive files is done in this phase.

Phase 3: Agressive Information Gathering

This phase is dedicated to data gathering by crawling the subdomains. The gathered data is used to find outdated JS libraries, detect CMS and technologies in use.
HTML forms that are tested in later phases for vulnerability detection are also collected during this crawling.

Phase 4: Vulnerability Scanning

[This phase is under development]

Download

git clone https://github.com/s0md3v/Striker.git

pip install -r requirements.txt

Usage

Striker

python3 striker.py example.com

Copyright (c) 2019 s0md3v

Source: https://github.com/s0md3v/

Anastasis Vasileiadis

PC Technical || Penetration Tester || Ethical Hacker || Cyber Security Expert || Cyber Security Analyst || Information Security Researcher || Malware analyst || Malware Investigator || Reverse Engineering

SC ProDefence SRL - Cyber Security Services