项目作者: SecurityKnights

项目描述 :
A Directory Scanner, Sub-Domain Scanner, Port Scanner and Network Sniffer written in Go
高级语言: Go
项目地址: git://github.com/SecurityKnights/CXplorer.git
创建时间: 2021-01-13T08:09:31Z
项目社区:https://github.com/SecurityKnights/CXplorer

开源协议:Apache License 2.0

下载


CXplorer

CXplorer is an reconnaissance tool written in Go which is capable of scanning directories, sub domains, open ports and sniff network traffic. For scanning it uses inbuilt net library and for network sniffing it uses gopacket. It is meant to find potential vulnerabilities and loopholes to help the user in improving web and network security.

Installation

  1. git clone https://github.com/SecurityKnights/CXplorer
  2. cd CXplorer
  3. ./INSTALL.sh

Note: If you get any error related to ‘Unable to Create Directories’, do the same manually and then run the ‘./INSTALL.sh’ command again. This can happen due to lack of permissions.

Usage

  1. CXplorer <options> <target>

Features

  • Directory and sub directory scanning
  • Port Scanning
  • Sub domain scanning
  • Network Sniffing

Help Menu

  1. Usage: CXplorer <options> <target URL|IP>
  2. Commom Flags
  3. -h Print Help Menu
  4. -o Get Output to a file
  5. Scanning Directories
  6. -u Target URL
  7. [Add the http:// or https:// as prefix and / as suffix]
  8. [You can enter the IP address or domain list]
  9. -w Wordlist to use
  10. [Default wordlist is loaded]
  11. -f File extensions to specify seperated by comma
  12. [Default: html,php,txt]
  13. Scanning SubDomains
  14. -s Domain to scan
  15. [Eg: http://www.google.com/ or https://www.google.com]
  16. -w Wordlist to use
  17. [Default wordlist is loaded]
  18. Scanning Ports
  19. -p Target IP Address
  20. -protocol Specify the protocol
  21. [Default: tcp]
  22. -ports Specify the start and end port with hyphen(-)
  23. [Default:1-1000]
  24. [Eg: -ports 1-1000]
  25. Network Sniffer
  26. -net Mandatory flag for network sniffing
  27. [Usage: -net <options>]
  28. Options
  29. list List all devices
  30. cap To start capturing
  31. write To capture and save data in a pcap file
  32. read[file] To read a pcap file
  33. filter To capture data with given filter
  34. filterWrite To capture data and save data in pcap file with filter
  35. packetInfo To print data of packets at Ethernet,TCP,IPv4/v6 layers
  36. create To create your own packet and send it
  37. decode To print source and destination data of packets

License

You can check the License here

Issues and Bugs

If you find any bugs or want to add some features to improve the code. Feel free to raise an issue regarding the same.

Happy Hacking :)