Sign in to follow this  
zerodark

HawkScan v1.9.6 Cracked Tool for Reconnaissance and Information

Recommended Posts

pt.png.webp

HawkScan v1.9.6 Cracked


HawkScan v1.9.6 Cracked
HawkScan v1.9.6 Cracked Tool for Reconnaissance and Information Gathering on a website. 
(python 2.x & 3.x).This script uses “WafW00f” to detect the WAF in the first step.This 
script uses “Sublist3r” to scan subdomains.This script uses “waybacktool” to check in 
the waybackmachine.

Features

URL fuzzing and dir/file detection
Test backup/old file on all the files found (index.php.bak, index.php~ .)
Check header information
Check DNS information
Check whois information
User-agent random or personal
Extract files
Keep a trace of the scan
Check @mail in the website and check if @mails leaked
CMS detection + version and vulns
Subdomain Checker
Backup system (if the script stopped, it take again in the same place)
WAF detection
Add personal prefix
Auto or personal output of scan (scan.txt)
Check Github
Recursive dir/file
Scan with an authentication cookie
Option -profil to pass profil page during the scan
HTML report
Work it with py2 and py3
Add option rate-limit if the app is unstable (-timesleep)
Check-in waybackmachine
Response error to WAF
Check if DataBase firebaseio exists and is accessible
Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30
Search S3 buckets in the source code page
Testing bypass of waf if detected
Testing if it’s possible scanning with “localhost” host

Changelog v1.9.6
Download Link

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this