Rex is an an all-in-one recon and vuln scanner.
It's designed to be fast, simple, yet comprehensive.
It was first created with bug bounty needs in mind, replacing multi-tool workflows with a single command, and using only a readable YAML file per hunt.
- Full parallelism
- Scan common ports
- Discover URL paths
- Search for subdomains (use flag
-d
) - Scan for common vulnerabilities (XSS, CRLF, …) (use flag
-s
) - Save interesting HTTP responses for manual inspection
- Integrates a manually-filtered and high-quality wordlist (2200+)
- Pretty print (use subcommand
p
)
Download the latest release in /usr/local/bin
.
Rex also depends on these external commands:
-
Run
rex
to create a base file in the current directory:rex
-
Add your scope to
hunt.yml
(a list of domain names, IP addresses or CIDR ranges):scope: - example.com - 111.111.111.111 - 10.0.0.0/29
-
Run
rex
to parse the scope fromhunt.yml
and start hunting.
⚠️ Rex sends a lot of parallel requests, so don't use your home IP address. -
When scan is complete, get your results in
hunt.yml
.
For a more compact and readable output, there is therex p
command. -
50% of the job is done.
Now, move onto the 50% manual work to find P1 and P2 vulns.
You can start by analysing HTTP responses saved in thehttp
directory.
Since Rex doesn't include every conceivable scanner, use these tools for a more thorough check:
# S3 recon
# github.com/sa7mon/s3scanner
s3scanner -bucket -enumerate -file <BUCKET_LIST_FILE>
# Google dorks search
# github.com/six2dez/dorks_hunter
./dorks_hunter.py -d <DOMAIN>
# GitHub dorks search
# github.com/obheda12/gitdorker
# github.com/damit5/gitdorks_go
# GitHub leaks
# github.com/gitleaks/gitleaks
# github.com/trufflesecurity/trufflehog)
# Generic secrets
# github.com/securing/dumpsterdiver
./DumpsterDiver.py -p <FOLDER>
# 40x bypass
# github.com/lobuhi/byp4xx
byp4xx <URL>
# CORS
# github.com/s0md3v/corsy
./corsy.py -u <URL>
# Open redirect
# github.com/r0075h3ll/oralyzer
./oralyzer.py -u <URL>
# Prototype pollution
# github.com/dwisiswant0/ppfuzz
ppfuzz -l <URL_LIST_FILE>
# SQL injection
# github.com/sqlmapproject/sqlmap
./sqlmap.py -u <URL>
# github.com/r0oth3x49/ghauri
ghauri -u <URL>
# SSL
# github.com/drwetter/testssl.sh
./testssl.sh <DOMAIN>
# Cache poisoning
# github.com/hackmanit/web-cache-vulnerability-scanner
wcvs -u <URL>