Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      GoSpider v1.1.3 - Fast web spider written in Go

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      GoSpider – Fast web spider wrote in Go

      Features

          Fast web crawling
          Brute force and parse sitemap.xml
          Parse robots.txt
          Generate and verify link from JavaScript files
          Link Finder
          Find AWS-S3 from response source
          Find subdomains from response source
          Get URLs from Wayback Machine, Common Crawl, Virus Total, Alien Vault
          Format output easy to Grep
          Support Burp input
          Crawl multiple sites in parallel
          Random mobile/web User-Agent

      Changelog v1.1.3

      c59ef01 Upgrade v1.1.3
      7b01017 Merge pull request #27 from rayhan0x01/patch-1
      20f8238 removing lower case conversion of paths and parameters
      656e12f Fix typo in -q options
      9d7a0df Update release

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. What can i do with this?
          with this software, you will be able to search your dorks in supported search engines and scan grabbed urls to find their vulnerabilities. in addition , you will be able to generate dorks, scan urls and saerch dorks separately when ever you want
          Supported search engines
              Google
              Yahoo
              Bing
          Supported vulnerabilities
              SQL Injection
              XSS
              LFI
          Whats new in version 2 (most important updates)?
          adding custom payloads
          you can edit payloads.json file which will be created when you open and close software once, and add payloads as much as you want , easier than drinking water
          adding custom error checks
          once a payload injected in url, software will looks for errors in new website source, you can also customize those errors too. what you have to do is easily edit payloadserror.json file which will be created when you open and close software once. you can also use regexes as error , with REIT|your regex here format
          multy vulnerability check
          in old version, you were not able to choose more than 1 vulnerabilites to check, but in v2, you can do this easily.
          multy search engine grabber
          in old version, you were not able to choose more than 1 saerchengines to saerch in, but in v2, you can do this easily.
          memory management
          we`ve added memory management to avoid lack of memory in your system
          dork generator
          you can generate dorks and save them very fast with your custom configurations and keywords. valid configuration format should contain {DORK} that will be replaced with each keyword in dork generation process
          updates list (all)
              new threading system based on microsoft task
              using linq technology
              dork generator part
              ability to add regexes as payloads error
              low usage
              moving from WPF to Windows form (just because my designes are bad, contact me if you can do better)
              ability to use scanner-graber separately and simultaneously
              and ....

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Understand the complete working, terminology and be able to have a complete understanding about the Deep/Dark web.
              To access the Deep web as well as the Dark web with Complete Ease and total security.
              To visit some advanced and famous websites located on the Hidden Web(Deep and Dark Web).
              Understanding Working, Trading, Buying, Selling as well as Mining CRYPTOCURRENCIES.
              About the Dangers as well as precautions to be taken care of while surfing the Web.
              Use Darknet Email services.
              Anonymously access the dark net and TOR hidden services (onion services).
          Requirements
              No particular requirements. But you should be interested in exploring the Deep/Dark web as they are the Hidden Sections of the Internet. you will only need a Computer and an Internet connection.
          Description
          Have you heard many times about the Deep/Dark Web but you never had any clue what it is?
          Have you ever thought about how the Hidden side of the web would be?
          Are you curious to explore the Hidden area of the internet but are unable to do so because of security reasons?
          Dark Web: Complete Introduction to the Deep/Dark Web 2021 is made for you! You will learn all the points related to the Deep/Dark Web Anonymity, TOR, Hidden services, TAILS, Web Security, Cryptocurrencies you name it, you learn it!
          Also a detailed guide on Cryptocurrencies is provided, points like Cryptotrading and Cryptomining are covered.
          This course is designed for anyone who wants to get started with using the Deep/Dark Web in a safe, and effective manner. So if you’re a complete newbie, or someone who has had a little experience with the Deep Web but no extensive use, then you’re in the right place.
          At the end of this cource you will be easily able to access the Deep web as well as the Dark web through the TOR browser and will be a master in web security(Anonymity) as well as Cryptocurrencies.
          Who this course is for:
              Anyone who is Curious and Interested about the Deep and the Dark Web.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Binomo Cloaker Yellow Web Edition
          Description
          Modified cloaking script for affiliate marketing found somewhere on Black Hat World.
          What is Binomo Cloaker?
          Binomo cloaker is a free cloaking script for excellent enterprise marketing that was previously shared open source on hacker forums and is still being developed by yellow web.
          What are The Advantages?
          It is no different from cloaker systems rented on the market, and I can even say the best cloaker system for me.The filtering feature features ad integration, such as Facebook and Google. It has many features that I don't count


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
          Generator Features
              Encrypt Source Code Using AES 256 Bit Encryption
              Encrypt Source Code Using Base64 Encryption
              Packing Evil Exe Using UPX Packer
              Interactive Mode [Generator Ask Required Parameter]
              Debug Mode [Can Be Used In Debugging Payload]
              Persistence Payload
              3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie)
              Built-in File Binder
              Useful Icons Inside icon Folder
          Virtual Machine Bypass Methods Includes
          Registry Check
          Processes and Files Check
          MAC Adderess Check
          Disclaimer
          💻 This project was created only for good purposes and personal use.
          THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WhatWeb identifies websites. Its goal is to answer the question, “What is that Website?”. It recognizes web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1700 plugins, each to recognize something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.
          WhatWeb can be stealthy and fast, or thorough but slow. WhatWeb supports an aggression level to control the tradeoff between speed and reliability. When you visit a website in your browser, the transaction includes many hints of what web technologies are powering that website. Sometimes a single webpage visit contains enough information to identify a website but when it does not, WhatWeb can interrogate the website further. The default level of aggression, called ‘stealthy’, is the fastest and requires only one HTTP request of a website. This is suitable for scanning public websites. More aggressive modes were developed for use in penetration tests.
          Most WhatWeb plugins are thorough and recognize a range of cues from subtle to obvious. For example, most WordPress websites can be identified by the meta HTML tag, e.g. ‘<meta name=”generator” content=”WordPress 2.6.5″>’, but a minority of WordPress websites remove this identifying tag but this does not thwart WhatWeb. The WordPress WhatWeb plugin has over 15 tests, which include checking the favicon, default installation files, login pages, and checking for “/wp-content/” within relative links.
          Features:
              Over 1800 plugins
              Control the trade-off between speed/stealth and reliability
              Performance Tuning. Control how many websites to scan concurrently.
              Multiple log formats: Brief (greppable), Verbose (human readable), XML, JSON, MagicTree, RubyObject, MongoDB, ElasticSearch, SQL.
              Proxy support including TOR
              Custom HTTP headers
              Basic HTTP authentication
              Control over webpage redirection
              IP address ranges
              Fuzzy matching
              Result certainty awareness
              Custom plugins defined on the command line
              IDN (International Domain Name) support
          Changelog v.0.5.5
              FIXES
                  #358 Fixed escape_for_sql method (@juananpe)
              NEW PLUGINS
                  Apache Flink (@juananpe)
                  Dell-OpenManage-Switch-Administrator (@themaxdavitt)
                  FLIR AX8 (@urbanadventurer)
                  Huginn (@urbanadventurer)
                  OpenResty (@urbanadventurer)
                  Telerik UI (@definity)
                  Umbraco (@definity / @ChadBrigance
                  VMware Horizon (@themaxdavitt)
              PLUGIN UPDATES
                  Joomla (@juananpe)
                  phpMyAdmin (@juananpe)
                  Microsoft IIS (@themaxdavitt)

          Hidden Content
          Give reaction to this post to see the hidden content.