WAES is nothing but Web Auto Enum & Scanner. Doing HTB or other CTFs enumeration against targets with HTTP(S) can become trivial. It can get tiresome to always run the same script/tests on every box eg. nmap, nikto, dirb and so on.
A one-click on target with automatic reports coming solves the issue. Furthermore, with a script the enum process can be optimised while saving time for hacker. This is what CPH:SEC WAES or Web Auto Enum & Scanner is created for. WAES runs 4 steps of scanning against target (see more below) to optimise the time spend scanning.
While multi core or multi-threaded scanning could be implemented it will almost surely get boxes to hang and so is undesirable.
$> git clone https://github.com/Shiva108/WAES.git
$> cd WAES
$> sudo ./install.sh
Make sure directories are set correctly in supergobuster.sh. Should be automatic with Kali & Parrot Linux.
Web Auto Enum & Scanner – Auto enums website(s) and dumps files as result.
################################################################ Web Auto Enum & Scanner
Auto enums website(s) and dumps files as result ################################################################
Usage: waes.sh -u {IP} waes.sh -h
-h shows this help
-u IP to test eg. 10.10.10.123
-p port nummer (default=80)
Example: ./waes.sh -u 10.10.10.130 -p 8080
Also Read – Skadi : Collect, Process & Hunt With Host Based Data From MacOS, Windows & Linux
Step 0 – Passive scan – (disabled in the current version)
Step 1 – Fast scan
Step 2 – Scan – in-depth
Step 3 – Fuzzing
.. against target while dumping results files in report/ folder.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…