Bashter : Web Crawler, Scanner & Analyser Framework

Bashter is a Shell-Script based Web Crawler, Scanner, and Analyser Framework. Bashter is a tool for scanning a Web-based Application. Bashter is very suitable for doing Bug Bounty or Penetration Testing.

It is designed like a framework so you can easily add a script for detect vulnerability.

For Example

To be more powerful, You can add something script (custom) like this:

modules/form/yourscript.bash {WEB-URL} {SOURCECODE}
modules/url/yourscript.bash {WEB-URL} {SOURCECODE}

modules/header/yourscript.bash {WEB-URL} {SOURCECODE}

For the sample, you can follow existing scripts.

Also Read – EvilClippy : For Creating Malicious MS Office Documents

Disable Script

You only need to change the extension, for example .bash => .bashx.

By Default:

  • Web Crawler
  • Gather Input Form
  • Detect Missconfigured CORS
  • Detect missing X-FRAME-OPTIONS (Clickjacking Potential)
  • Detect Reflected XSS via URL
  • Detect Reflected XSS via Form
  • Detect HTTP Splitting Response via CRLF Injection
  • Detect Open Redirect

How to Run:

git clone https://github.com/zerobyte-id/Bashter.git
cd Bashter/
bash bashter.bash

Notes: This tool will consume a lot of disk usage, so don’t forget to housekeep bashter-tempdata and scan-logs.

Credits: Schopath, Suhada , Abay

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

4 hours ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

4 hours ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

2 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago