DeepSearch is a simple command line tool for bruteforce directories and files in websites. you can also use Dark web browser to surf anonymously.
$ git clone https://github.com/m4ll0k/DeepSearch.git deepsearch
$ cd deepsearch
$ pip3 install requests
$ python3 deepsearch.py
Also ReadInvisi-Shell : Hide Your Powershell Script In Plain Sight(Bypass all Powershell security features)
Basic:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt
Force extension for every wordlist entry (support one extension):
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -f
Make a request by hostname (ip):
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -b
Force lowercase for every wordlist entry:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -l
Force uppercase for every wordlist entry:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -p
Show only status code separated by comma:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -o 200,301,302
Exclude status code separated by comma:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -x 501,502,503,401
URL Injection Point (%word%):
python3 deepsearch.py -u http://testphp.vulnweb.com/test%1%.php -e php -w wordlist.txt
URL Injection Point (%%):
python3 deepsearch.py -u http://testphp.vulnweb.com/id/%%/index.html -e php -w wordlist.txt
URL Injection Point in Parameters:
python3 deepsearch.py -u http://testphp.vulnweb.com/index.php?id=%2%&user=1 -e php -w wordlist.txt
python3 deepsearch.py -u http://testphp.vulnweb.com/index.php?%id%=1&user=2 -e php -w wordlist.txt
Add Headers:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -H "Content-Type:text/html\nETag:1234"
Proxy:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -P 127.0.0.1:8080
URLs by list:
python3 deepsearch.py -U my_urls.txt -e php -w wordlist.txt
Other Options:
python3 deepsearch.py -u http://testphp.vulnweb.com/ -e php -w wordlist.txt -t 10 -T 3 -d 2 -R -c "test=test" --random-agent
ParadeDB is an Elasticsearch alternative built on Postgres. We're modernizing the features of Elasticsearch's product…
Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.…
This is a simulation of attack by the Wicked Panda group (APT-41) targeting U.S. state…
A simple application that extracts your IoCs from garbage input and checks their reputation using…
Flutter Mobile Application Reverse Engineering Tool by Compiling Dart AOT Runtime. Currently, the application supports…
Welcome to FLARE-VM - a collection of software installations scripts for Windows systems that allows…