当前位置:网站首页>Fvuln automated web vulnerability detection tool
Fvuln automated web vulnerability detection tool
2022-07-29 05:42:00 【adeylinux】
F-vuln Introduce :
F-vuln( Full name :Find-Vulnerability) It is an automatic tool specially written for the convenience of your work , It is mainly applicable to daily safety services 、 Penetration tester and RedTeam Red team personnel , Its functions include : Survive IP Probe 、 Open port detection 、web Service detection 、web Vulnerability scanning 、smb Blast 、ssh Blast 、ftp Blast 、mssql Blasting and other database blasting work, as well as a large number of web Vulnerability detection module . It can perform specific operations according to the target open services , Don't do useless work . Suitable for Intranet environment 、 Internet , For the safety problems found , Automatically generate and save useful content in txt table , In order to facilitate the security personnel to complete the test of the authorized project .
F-vuln There are many vulnerabilities supported :

Project address :
https://github.com/d3ckx1/Fvuln/releases

Fvuln Parameters of :
-t , --target TARGETS Input target IP perhaps IP paragraph
-u , --url www.qq.com Input target URL Perform a separate scan
-us , --urls url.txt Enter batch URL The goal is txt file , Such as :url.txt
-fofa , --fofa " Pan micro Cloud Bridge " Enter the keyword you want to search
-f , --file FILE Input target txt file , Such as :ip.txt
-h , --help View help information
-l , --list View the list of supported vulnerabilities
-v , --version Check the software version and update time Fvuln Use :
scanning IP Address :
Fvuln.exe -t 192.168.10.104
During the scan F-vuln Recognize the target IP What services have been opened . If on Mysql.SMB Wait for service .
F-vuln It will explode .( This point F-vuln Do well .)
After scanning F-vuln Will be generated with the name Fvuln_report.txt Of txt Text .
Scan website :
Fvuln.exe -u http://www.zzfls.com.cn/
scanning IP paragraph :
Fvuln.exe -t 192.168.10.1/24
F-vuln The scanning shows that there are loopholes :

OK ah . you 're right 192.168.10.1 It's my router . It's over. There seems to be a loophole .
Yes, let's repeat it today . Think about it sometime PASSWORDPandora v7.0NG Remote code execution after authentication
Batch scan website :
Fvuln.exe -us url.txturl.txt It was created by myself .url The contents are as follows :
http://www.zzfls.com.cn/
http://lovewyt.co/
Batch scan IP Address :
Fvuln.exe -f ip.txt
FoFa Search for :
notes : Then create under the same directory “key.txt” file , The first line in the file writes the email address ; The second line writes your key.
Fvuln.exe -fofa " Pan micro Cloud Bridge "
summary :
F-vuln It's a small tool . It has a powerful vulnerability scanner . Supported platforms :windows,linux,F-vuln He is very friendly to me . I'm a bad person . Lai's open Kali Linux. So my Windows Deployed a lot of Windows Penetration testing tools .
Everybody : Pay attention to my official account . Thank you very much .

边栏推荐
- Abstract classes and interfaces
- How does the MD editor of CSDN input superscripts and subscripts? The input method of formula and non formula is different
- 公众号不支持markdown格式文件编写怎么办?
- 弹性盒子flex
- Solve the problem that the prompt information of form verification does not disappear and the assignment does not take effect
- Three handshakes and four waves for the interview summary
- Detailed explanation of GPIO input and output
- Masscan使用教程.
- [C language series] - storage of deep anatomical data in memory (I) opening of summer vacation
- ANSI C type qualifier
猜你喜欢

MySQL解压版windows安装

ClickHouse学习(二)ClickHouse单机安装

Detailed installation and use tutorial of MySQL (nanny installation with pictures and texts)

QPalette学习笔记

【TypeScript】深入学习TypeScript函数

Solve the problem that the prompt information of form verification does not disappear and the assignment does not take effect

Pyqt5: Chapter 1, Section 1: creating a user interface using QT components - Introduction

shell基本操作(下)

Global components component registration

表格与表单相关知识点总结
随机推荐
Longest string without duplicate characters
Database operation day 6
·Let's introduce ourselves to the way of programming·
[untitled]
link与@import的关系
ClickHouse学习(十)监控运行指标
Common shortcut keys for Ad
移动端-flex项目属性
字符类型转换
Liang Yuqi, founder of aitalk: the link between image and virtual reality
【JS题解】牛客网JS篇1-10题
redis的基本使用
Summary of knowledge points related to forms and forms
Basic concepts of MySQL + database system structure + extended application + basic command learning
Qtcreator+cmake compiler settings
TXT 纯文本操作
365 day challenge leetcode 1000 questions - day 035 one question per day + two point search 13
组件传参与生命周期
Day 5
Terminal shell common commands