{"id":4578,"date":"2019-04-12T17:52:20","date_gmt":"2019-04-12T12:22:20","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=4578"},"modified":"2019-04-12T17:52:20","modified_gmt":"2019-04-12T12:22:20","slug":"zeebsploit-web-scanner","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/","title":{"rendered":"ZeebSploit: Web Scanner Exploitation Information Gathering"},"content":{"rendered":"\n<p>ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation &amp; Usage<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>apt-get install git<br>git clone https:\/\/github.com\/jaxBCD\/Zeebsploit.git<br>cd Zeebsploit<br>chmod +x install<br>.\/install<br>python3 zeebsploit.py<br>type &#8216;help&#8217; for show modules<br>and follow instruction<\/strong><\/p>\n\n\n\n<p><strong>Also Read &#8211;  <a href=\"https:\/\/kalilinuxtutorials.com\/pocsuite3-open-sourced-remote-vulnerability\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework (opens in a new tab)\">Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Modules<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>[Main modules]\n+----------+-------------------------------+\n| Modules  |          Description          |\n+----------+-------------------------------+\n| Exploit  |      Exploitation Modules     |\n| Scanners |        Scanners Modules       |\n|  infoga  | information Gathering Modules |\n+----------+-------------------------------+\n\n[Exploit Modules]\n+---------------------------+--------------------------------------------------+\n|          Modules          |                   Description                    |\n+---------------------------+--------------------------------------------------+\n|    wp content injection   | wordpress content injection version 4.7 or 4.7.1 |\n|        wp revslider       |  wordpress plugin revslider remote file upload   |\n|        wp learndash       |      wordpress leardash remote file upload       |\n|         wp swhobiz        |   wordpress plugin showbiz remote file upload    |\n|     joomla com fabrik     |       joomla component fabrik file upload        |\n| joomla manager get config |     joomla component manager auto get config     |\n|      joomla jdownload     |  joomla component jdownloads remote file upload  |\n|          joomla           |  Joomla ads manager component auto shell upload  |\n|     apache struts rce     |      CVE: 2017-5638 - Apache Struts2 S2-045      |\n|                           |             remote command execution             |\n|        drupal8 rce        |    drupal version 8 remote command execution     |\n|  dvr cam leak credential  |              TBK DVR4104 \/ DVR4216               |\n|                           |    - Credentials Leak (Get User and password     |\n|     webdav file upload    |                     Nothing                      |\n|         ---More---        |        Coming Soon the following version         |\n+---------------------------+--------------------------------------------------+\n\n[Scanner Module]\n+--------------------+----------------------------------------+\n|      Modules       |              Description               |\n+--------------------+----------------------------------------+\n| subdomain scanner  |         Scan Subdomain for Web         |\n|    sqli scanner    |    Scan Sql Injection Vulnerability    |\n|    xss scanner     |    Scan XSS Injection Vulnerability    |\n|    lfi scanner     | Local File Includes Scanner etc\/passwd |\n| admin login finder |         Scan Admin Login page          |\n| directory scanner  |   scan directory on web use dirhunt    |\n| subdomain takeover |      scan type subdomain takeover      |\n|     ---More---     |   Coming Soon the following version    |\n+--------------------+----------------------------------------+\n\n[Information Gathering]\n\n+--------------------+------------------------------------------+\n|      Modules       |               Description                |\n+--------------------+------------------------------------------+\n|    cms detector    |    a tool for detecting cms on a web     |\n|    port scanner    |         Scan Open Port use Nmap          |\n| information header |       response header information        |\n|   ip geolocation   |   detect the location of an ip or host   |\n|   email searcher   |         searching email from web         |\n|     traceroute     | to show the route the package has passed |\n| robot.txt detector |         Scan Robot.txt from Web          |\n| header information |         Response Header Checker          |\n|    whois lookup    |     looking for registered users or      |\n|                    |  recipients of Internet resource rights  |\n|     ---More---     |    Coming Soon the following version     |\n+--------------------+------------------------------------------+<\/code><\/pre>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/jaxBCD\/Zeebsploit\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. Installation &amp; Usage apt-get install gitgit clone https:\/\/github.com\/jaxBCD\/Zeebsploit.gitcd Zeebsploitchmod +x install.\/installpython3 zeebsploit.pytype &#8216;help&#8217; for show modulesand follow instruction Also Read &#8211; Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework Modules<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2945,3641,3868],"class_list":["post-4578","post","type-post","status-publish","format-standard","hentry","category-kali","tag-scanner","tag-web-scanner","tag-zeebsploit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ZeebSploit: Web Scanner Exploitation Information Gathering<\/title>\n<meta name=\"description\" content=\"ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. So let us have a look on how\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ZeebSploit: Web Scanner Exploitation Information Gathering\" \/>\n<meta property=\"og:description\" content=\"ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. So let us have a look on how\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-12T12:22:20+00:00\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"ZeebSploit: Web Scanner Exploitation Information Gathering\",\"datePublished\":\"2019-04-12T12:22:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/\"},\"wordCount\":58,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"keywords\":[\"Scanner\",\"Web Scanner\",\"ZeebSploit\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/\",\"name\":\"ZeebSploit: Web Scanner Exploitation Information Gathering\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"datePublished\":\"2019-04-12T12:22:20+00:00\",\"description\":\"ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. So let us have a look on how\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ZeebSploit: Web Scanner Exploitation Information Gathering","description":"ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. So let us have a look on how","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/","og_locale":"en_US","og_type":"article","og_title":"ZeebSploit: Web Scanner Exploitation Information Gathering","og_description":"ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. So let us have a look on how","og_url":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-04-12T12:22:20+00:00","author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"ZeebSploit: Web Scanner Exploitation Information Gathering","datePublished":"2019-04-12T12:22:20+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/"},"wordCount":58,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"keywords":["Scanner","Web Scanner","ZeebSploit"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/","url":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/","name":"ZeebSploit: Web Scanner Exploitation Information Gathering","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"datePublished":"2019-04-12T12:22:20+00:00","description":"ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. So let us have a look on how","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/"]}]},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":29315,"url":"https:\/\/kalilinuxtutorials.com\/top-5-popular-web-scanner-for-kali-linux\/","url_meta":{"origin":4578,"position":0},"title":"Top 5 popular Web Scanner for Kali Linux","author":"Aman Mishra","date":"July 3, 2023","format":false,"excerpt":"Here are five well-known Web Scanner for Kali Linux, along with their brief descriptions, installation, and usage examples: Kali Linux is a popular distribution for penetration testing and ethical hacking, and it comes with a wide range of tools for web application scanning. 1. Nikto: Nikto is a powerful web\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":20960,"url":"https:\/\/kalilinuxtutorials.com\/cumulus\/","url_meta":{"origin":4578,"position":1},"title":"Cumulus : Web Application Weakness Monitoring, It Would Be Working By Add Just 3 Codelines","author":"R K","date":"December 27, 2021","format":false,"excerpt":"Cumulus is a service that helps you monitor and fix security weakness in realtime. The issues will be reported on web dashboard. It's very simple and powerful. Key features Just install SDK to web front, can be found security weakness on service SDK detect weakness from Inner Layer, dynamically (ex_\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj30Mh8RBVHhefwm4icubzdxl7FUH5exuRrwBAgg0Gz6tZbW7AsUjUs4BnmfTjAJQZa-EI6_XqW2wsQjuTRvxNOL7YDictSmvBT7NeQTuSRwVaJ6pin9v-MRSZDxgk_why-IAVPWDfAaiW3qwhkNfJXC901TxrAbfG-3oL4APcGrFhstB1f8wsNdt6h=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj30Mh8RBVHhefwm4icubzdxl7FUH5exuRrwBAgg0Gz6tZbW7AsUjUs4BnmfTjAJQZa-EI6_XqW2wsQjuTRvxNOL7YDictSmvBT7NeQTuSRwVaJ6pin9v-MRSZDxgk_why-IAVPWDfAaiW3qwhkNfJXC901TxrAbfG-3oL4APcGrFhstB1f8wsNdt6h=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj30Mh8RBVHhefwm4icubzdxl7FUH5exuRrwBAgg0Gz6tZbW7AsUjUs4BnmfTjAJQZa-EI6_XqW2wsQjuTRvxNOL7YDictSmvBT7NeQTuSRwVaJ6pin9v-MRSZDxgk_why-IAVPWDfAaiW3qwhkNfJXC901TxrAbfG-3oL4APcGrFhstB1f8wsNdt6h=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj30Mh8RBVHhefwm4icubzdxl7FUH5exuRrwBAgg0Gz6tZbW7AsUjUs4BnmfTjAJQZa-EI6_XqW2wsQjuTRvxNOL7YDictSmvBT7NeQTuSRwVaJ6pin9v-MRSZDxgk_why-IAVPWDfAaiW3qwhkNfJXC901TxrAbfG-3oL4APcGrFhstB1f8wsNdt6h=s728 2x"},"classes":[]},{"id":6062,"url":"https:\/\/kalilinuxtutorials.com\/w13scan-passive-security-scanner\/","url_meta":{"origin":4578,"position":2},"title":"W13Scan : Passive Security Scanner Linux\/Windows\/Mac Systems","author":"R K","date":"August 4, 2019","format":false,"excerpt":"W13scan is a proxy-based web scanner that runs on Linux\/Windows\/Mac systems. If you want w13scan to support https, similar to BurpSuite, first need to set up a proxy server (default 127.0.0.1:7778), then go to\u00a0http:\/\/w13scan.ca\u00a0to download the root certificate and trust it. Install pip3 install w13scan Usage #helpw13scan -h#runningw13scan -s 127.0.0.1:7778\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/zBgfnY-qSTU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":5187,"url":"https:\/\/kalilinuxtutorials.com\/h2buster\/","url_meta":{"origin":4578,"position":3},"title":"H2Buster : A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP\/2","author":"R K","date":"May 31, 2019","format":false,"excerpt":"H2Buster is a threaded, recursive, web directory brute-force scanner over HTTP\/2 using hyper, inspired by Gobuster. Following are the features; Fast and portable - install\u00a0hyper\u00a0and run.Multiconnection scanning.Multithreaded connections.Scalable: scans can be as docile or aggressive as you configure them to be.h2 and h2c support.Configurable directory recursion depth.Multiplatform: works on both\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6288,"url":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/","url_meta":{"origin":4578,"position":4},"title":"Hacktronian : All in One Hacking Tool for Linux &#038; Android","author":"R K","date":"August 23, 2019","format":false,"excerpt":"Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation Install The Hacking Tool Google Dorks Information Gathering: Nmap Setoolkit Port Scanning\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12056,"url":"https:\/\/kalilinuxtutorials.com\/xss-scanner\/","url_meta":{"origin":4578,"position":5},"title":"XSS-Scanner : Scanner That Detects Cross-Site Scripting Vulnerabilities In Website","author":"R K","date":"January 8, 2021","format":false,"excerpt":"XSS-Scanner is a cross-site scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP Top 10 project and it is a highly chased vulnerability in bug bounty programs. The scanner gets a link from the user and scan the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=4578"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4578\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=4578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=4578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=4578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}