Categories: Kali Linux

Owasp D4n155 : Intelligent & Dynamic Wordlist Using Osint

OWASP D4N155 is an intelligent and dynamic wordlist using OSINT. It’s an information security audit tool that creates intelligent wordlists based on the content of the target page.

Install

Need to: Python3.6Bash (GNU Bourne-Again SHell)
OptionalGitGroff

Source

git clone https://github.com/owasp/D4N155.git
cd D4N155
pip3 install -r requirements.txt
bash main

Or without git

wget -qO- https://github.com/owasp/D4N155/archive/master.zip | bsdtar -xf-
cd D4N155-master
pip3 install -r requirements.txt
bash main

Also Read – CVE-API : Unofficial API for CVE.MITRE.ORG

Docker

In image:

FROM docker.pkg.github.com/owasp/d4n155/d4n155:latest

Cli:

docker pull docker.pkg.github.com/owasp/d4n155/d4n155:latest
docker run -it d4n155

Manual

D4N155: Tool for smart audit security

Usage: bash main
All options are optionals

Options:

-w, –wordlist Make the smartwordlist based in information
on website.
-t, –targets Make the smart-wordlist based in your passed
source informations in urls.
-b, –based Analyze texts to generate the
custom wordlist
-r, –rate Defines time interval between requests
-o, –output For to store the all wordlist.
-?a, –aggressive Aggressive reading with headless
-h, –help Show this mensage.

Value:
URL URL target, example: scanme.nmap.org
IP IP address
TIME Time, example: 2.5. I.e: 00:00:02:30.. 0 are default
FILE File, for save the result, get urls or using in
wordlist

R K

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

11 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

13 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

14 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

14 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

14 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

1 day ago