Garud – An Automation Tool That Scans Sub-Domains, Sub-Domain Takeover And Then Filters Out XSS, SSTI, SSRF And More Injection Point Parameters

Garud - An Automation Tool That Scans Sub-Domains, Sub-Domain Takeover And Then Filters Out XSS, SSTI, SSRF And More Injection Point Parameters

An automation software that scans sub-domains, sub-area takeover and then filters out xss, ssti, ssrf and much more injection level parameters.

Garud 2

git clone https://github.com/R0X4R/Garud.git && cd Garud/ && chmod +x garud && mv garud /usr/neighborhood/bin/
  • Use
garud -d focus on.com -f filename

About Garud

I designed this instrument to automate my recon and preserve my time. It seriously give me headache always form such command and then wait around to complete one particular command and I variety other command. So I gathered some of the tools which is widely employed in the bugbounty industry. In this script I employed Assetfinder, get-titles, httprobe, subjack, subzy, sublister, gau and gf designs.
The script to start with enumerates all the subdomains of the give target area making use of assetfinder and sublister then filters all reside domains from the whole subdomain record then it extarct titles of the subdomains applying get-title then it scans for subdomain takeover utilizing subjack and subzy. Then it employs gau to extract paramters of the offered subdomains then it use gf styles to filters xss, ssti, ssrf, sqli params from that specified subdomains. Then it’ll save all the output in a textual content file like concentrate on-xss.txt. 

Many thanks to the authors of the applications utilized in this script.

@aboul3la @tomnomnom @lc @LukaSikic @haccer

Warning: This code was initially created for personal use, it generates a considerable amount of visitors, please use with caution.

Yp2IUMGqTlg

Impression and Short article Resource website link

Study Extra on Pentesting Equipment

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: