OWASP / D4N155

OWASP D4N155 - Intelligent and dynamic wordlist using OSINT

Home Page:https://owasp.org/www-project-d4n155/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

OWASP D4N155

made-with-bash GPLv3 license OWASP project

It's an information security audit tool that creates intelligent wordlists based on the content of the target page.

asciicast

Help us, See some calculations used

Ongoing projects 👷: D4N155 in docker 🎁, Web API D4N155 ☁️, Telegram bot 🤖

Install

Need to: Python3.6, Bash (GNU Bourne-Again SHell), Go

Optional: Git

Source

git clone https://github.com/owasp/D4N155.git
cd D4N155
pip3 install -r requirements.txt
bash main

Or whithout git

wget -qO- https://github.com/owasp/D4N155/archive/master.zip | bsdtar -xf-
cd D4N155-master
pip3 install -r requirements.txt
bash main

Docker

In image:

FROM docker.pkg.github.com/owasp/d4n155/d4n155:latest

Cli:

docker pull docker.pkg.github.com/owasp/d4n155/d4n155:latest
docker run -it d4n155

Manual

    D4N155: Tool for smart audit security

    Usage: bash main <option> <value>
    All options are optionals

    Options:
	-w, --wordlist	<url|ip>	Make the smartwordlist based in informations
					on website.
	-t, --targets	<file>  	Make the smart-wordlist based in your passed
					source informations in urls.
	-b, --based	<file>		Analyze texts to generate the
					custom wordlist
	-r, --rate	<time>		Defines time interval between requests
	-o, --output	<file>		For to store the all wordlist.
  	-?a, --aggressive      Aggressive reading with headless
	-h, --help			Show this mensage.

     Value: <url | ip | source | file | time>
	URL				URL target, example: scanme.nmap.org
	IP				IP address
	TIME				Time, example: 2.5. I.e: 00:00:02:30.. 0 are default
	FILE				File, for save the result, get urls or using in
					wordlist

About

OWASP D4N155 - Intelligent and dynamic wordlist using OSINT

https://owasp.org/www-project-d4n155/

License:GNU General Public License v3.0


Languages

Language:Shell 76.9%Language:Go 19.2%Language:Python 3.8%