批量多线程探测url存活
探测存活、获取基本信息(标题、ip、指纹、长度、跳转、server等)
边探测遍输出结果,当前目录下result/urlxxxxxxxxxxxx.csv
输出的csv如果直接用excel打开乱码,可以选择导入数据:数据->获取数据->从文本,然后编码格式选择utf8即可,或者使用macos的numbers直接打开
优点:
- 多线程
- 获取标题
- 识别跳转(状态码、指纹、标题、长度、server均以
->
连接标出)
> python whichalive.py -h
__ _ __ ___ ___
_ __/ /_ (_)____/ /_ / | / (_) _____
| | /| / / __ \/ / ___/ __ \/ /| | / / / | / / _ \
| |/ |/ / / / / / /__/ / / / ___ |/ / /| |/ / __/
|__/|__/_/ /_/_/\___/_/ /_/_/ |_/_/_/ |___/\___/ FAST
About: https://github.com/abelche/whichalive
usage: FAST detect alive targets
python whichalive-air.py -u url.txt
cat url.txt | python whichalive-air.py
optional arguments:
-h, --help show this help message and exit
-f [FILE], --file [FILE]
URL lists file.
--proxy PROXY Set proxy, such as http://127.0.0.1:8080 or socks5://127.0.0.1:7777
-t THREAD, --thread THREAD
Set max threads, default 20
--timeout TIMEOUT Set request timeout value, default 10s
-d, --debug print some debug information
--no-redirect Set to disallow redirect
--try-again If some error, try again scan that url once
--no-outfile Set to NOT output results to file
直接识别: 因为用了f-string,所以要 python3.6+
python whichAlive.py
cat url.txt | ./whichalive.py
python whichAlive.py -f xxx.txt
python whichAlive.py -f xxx.txt -t 20
也可以结合被动扫描工具比如xray xray 开启7777端口监听被动扫描
./xray webscan --listen 0.0.0.0:7777 --html-output scan.html
whichAlive 代理到xray
python whichAlive.py -f xxx.txt --proxy 127.0.0.1:7777
联动fofa等
echo -n 'title="管理后台"' | base64 | xargs -I '{}' curl -s 'https://fofa.info/api/v1/search/[email protected]&key=xxxxxxxxxxxxxxxxxxx&size=30&fields=host&qbase64={}' | jq -r '.results[]' | python whichalive.py --no-outfile
效果截图:
- 增加cms识别
- 增加waf识别
- 扫描ip列表、ip段等
- 识别云waf、CDN