Garud v1.5 releases: automation tool that scans sub-domains, sub-domain takeover
Garud
An automation tool that scans sub-domains, sub-domain takeover, and then filters out xss, ssti, ssrf, and more injection point parameters.
- Requirements: Go Language, Python 2.7, or Python 3.
- System requirements: Recommended to run on vps with 1VCPU and 2GB ram.
- Tools used – You must need to install these tools to use this script
- SubFinder
- Sublist3r
- GF Patterns
- Get Title
- Takeover.py: echo “alias takeover.py=’python3 $HOME/tools/takeover/takeover.py’ >> ~/.bashrc
- Gau
- Subzy
- Subjack: save fingerprints.json file into ~/tools/ directory.
- Assetfinder
- HTTPX
- Waybackurls
- Kxss
- QSreplace
- FFuF
- Dalfox
Changelog v1.5
- Added some new features and fixed some bugs which exist in the previous version.
Installation
Usage
About Garud
I made this tool to automate my recon and save my time. It really gives me a headache always type such command and then wait to complete one command and I type other commands. So I collected some of the tools which are widely used in the bugbounty field. In this script, I used Assetfinder, get-titles, httprobe, subjack, subzy, sublister, gau, and gf patterns.
The script first enumerates all the subdomains of the given target domain using assetfinder and sublister then filters all live domains from the whole subdomain list then it extracts titles of the subdomains using get-title then it scans for subdomain takeover using subjack and subzy. Then it uses gau to extract parameters of the given subdomains then it uses gf patterns to filters xss, ssti, ssrf, sqli params from that given subdomains. Then it’ll save all the output in a text file like target-xss.txt.
Copyright (c) 2020 Eshan Singh