ATSCAN
Description:
ATSCAN
SEARCH engine
XSS scanner.
Sqlmap.
LFI scanner.
Filter wordpress and Joomla sites in the server.
Find Admin page.
Decode / Encode MD5 + Base64.
This this my first script im sure is full with mistakes!!
SEARCH engine
XSS scanner.
Sqlmap.
LFI scanner.
Filter wordpress and Joomla sites in the server.
Find Admin page.
Decode / Encode MD5 + Base64.
This this my first script im sure is full with mistakes!!
Libreries to install:
ap-get install libxml-simple-perl
aptitude install libio-socket-ssl-perl
aptitude install libcrypt-ssleay-perl
aptitude install libio-socket-ssl-perl
aptitude install libcrypt-ssleay-perl
NOTE: Works in linux platforms. Best Run on Ubuntu 14.04, Kali Linux 2.0,
Arch Linux, Fedora Linux, Centos.
if you use a windows you can download manualy
Arch Linux, Fedora Linux, Centos.
if you use a windows you can download manualy
Download & Executution:
git clone https://github.com/AlisamTechnology/ATSCAN
cd ATSCAN
chmod +x ATSCAN
./ATSCAN
OR
$chmod +x atscan.pl
Execute: perl ./atscan.pl
Execute: perl ./atscan.pl --help
cd ATSCAN
chmod +x ATSCAN
./ATSCAN
OR
$chmod +x atscan.pl
Execute: perl ./atscan.pl
Execute: perl ./atscan.pl --help
HELP:
--tor | tor proxy [DEFAULT:socks://localhost:9050] Change if needed! |
--dork | Search engine |
--mp | set number of page results to scan |
--xss | Xss scan |
--lfi | lfi scan |
-t | Target |
-l | List name |
--exp | Set exploit |
--valid | Text for validate results |
--sqlmap | Sqlmaping xss results |
--sqlmaptor | Sqlmaping xss results using tor proxy |
--lfi | local file inclusion |
--joomrfi | get joomla sites with rfi in the server |
--shell | shell link [Ex: http://www.site.com/shell.txt] |
--wpadf | get wordpress sites with arbitery file download in the server |
--admin | get site admin page |
--shost | get site subdomains |
--ports | scan server ports |
--start | start scan port |
--end | end scan port |
--tcp | tcp ports |
--udp | udp ports |
--all | complete mode |
--basic | basic mode |
--sites | sites in the server |
--wp | wordpress sites in the server |
--joom | joomla sites in the server |
--upload | get sites with upload files in the server |
--zip | get sites with zip files in the server |
--st | string |
--md5 | convert to md5 |
--encode64 | encode base64 string |
--decode64 | decode base64 string |
--isup | check http status 200 |
--httpd | print site httpd version |
EXAMPLES:
Simple search: -s DORK --mp [number of page results to scan] -s [DORK1,DORK2,DORK3..] --mp [number of page results to scan] -s [DORK.txt] --mp [number of page results to scan from list] Subscan from Serach Engine Xss: --dork DORK --mp 1 --xss Xss: --dork DORKS.TXT --mp 1 --xss Lfi: --dork DORK --mp 1 --lfi Search + Command: --dork DORK --mp VALUE --command 'curl -v' --TARGET Validation Xss: --dork DORK --mp 1 --xss --valid TEXT Lfi: --dork DORK --mp 1 --lfi --valid TEXT Xss: --dork DORK --mp 1 --xss --isup Lfi: --dork DORK --mp 1 --xss --isup Xss: --dork DORKS.TXT --mp 1 --xss --valid TEXT Lfi: --dork DORKS.TXT --mp 1 --lfi --valid TEXT Xss: --dork DORKS.TXT --mp 1 --xss --isup Lfi: --dork DORKS.TXT --mp 1 --xss --isup Use List / Target Xss: -t TARGET --xss Lfi: -l TARGET --lfi Xss + Validation: -t TARGET --xss --valid TEXT Lfi + Validation: -t TARGET --lfi --valid TEXT Xss + Validation: -l list.txt --xss --isup Lfi + Validation: -l list.txt --lfi --isup Find admin page: -t TARGET --admin Find subdomains: -t TARGET --shost Server: Get Server sites: -t IP --mp [VALUE] --sites Get Server sites: -t IP.txt --mp [VALUE] --sites Get Server wordpress sites: -t IP --mp [VALUE] --wp Get Server joomla sites: -t IP --mp [VALUE] --joom Get Server upload sites: -t IP --mp [VALUE] --upload Get Server zip sites files: -t IP --mp [VALUE] --zip WP Arbitry File Download: -t IP --mp [VALUE] --wpadf Joomla RFI: -t IP --mp <1> --joomfri --shell SHELL LINK Scan basic tcp (quick): -t IP --ports --basic --tcp Scan basic udp basic (quick): -t IP --ports --basic --udp Scan basic udp+tcp: -t IP --ports --basic --udp --tcp Scan complete tcp: -t IP --ports --all --tcp Scan complete udp: -t IP --ports --all --udp Scan complete tcp+udp: -t IP --ports --all --udp --tcp Scan rang tcp: -t IP --ports --start --end --tcp Scan rang udp: -t IP --ports --start --end --udp Scan rang udp + tcp: -t IP --ports --start VALUE --end VALUE --udp --tcp Encode / Decode: Generate MD5: -st STRING --md5 Encode base64: -st STRING --encode64 Decode base64: -st STRING --decode64 Demo: |
ATSCAN 9.6 RELEASE IS OUT >>
SOME INSTUCTIONS ARE CHANGED!!
USE HELP MENU TO SEE CHANGES!!!