Eagle: vulnerability scanner

Project Eagle is one vulnerabilities and for the detection of low-risk errors on a massive scale.

Specifications

CRLF
Sensitive files eg (.git, info.php ..)
Subdomain takeover
Anonymous FTP login
S3 buckets misconfiguration including automatic takeover and upload
HTTP Request Smuggling
Firebase database misconfiguration
Sensitive information disclosure eg (API Keys, Secrets ..) including JS files and HTML pages
Missing SPF Records
Path Traversal
PHP-CGI - CVE_2012_1823
Shell Shock - CVE_2014_6271
Struts RCE - CVE_2018_11776
WebLogic RCE - CVE_2019_2725
Confluence LFI - CVE_2019_3396
Ruby on Rails LFI - CVE_2019_5418
Atlassian SSRF - CVE_2019_8451
Apache Httpd mod_rewrite - CVE_2019_1009

Installation

git clone https://github.com/BitTheByte/Eagle.git

CD Eagle

python3 -m pip install -r requirements.txt

Use

$ python3 main.py -f domains.txt

$ python3 main.py -f domains.txt –ping

$ python3 main.py -f domains.txt -w 10 –db output.db.json

$ python3 main.py… args -v *?

Application snapshots

 

You can download the program from here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).