bbot
bbot copied to clipboard
The recursive internet scanner for hackers. 🧡
2 very basic modules. One that uses the Builtwith Domains API (builtwithDomains.py) Another that uses the Builtwith Redirects API (builtwithRedirects.py)
smuggler running python3 https://github.com/defparam/smuggler#installation
Hi, This is not related to a bug, mostly a quick question. BBOT default config has nuclei configured mode as "**severe**", meaning that it scans only for high and critical....
vulnerability events are logged to the console in orange/red colors depending on their severity
If we get a url_unverified event for a page, normally if it turns out to be a 404 httpx wont report it as a URL event. However, if we instead...
Thanks to @j3tj3rk for finding this. At least on arch, the ansible `package` module is doing the equivalent of `pacman -S` instead of `pacman -Sy`.
Occasionally we may want to visit the actual archived pages as opposed to the live pages. This would be an option that would be disabled by default.
Add a module that will search for default credentials within an environment. Should operate after TCP ports have been enumerated. Examples Projects: * https://github.com/projectdiscovery/nuclei * https://github.com/lanjelot/patator * https://github.com/nmap/nmap