| I've been working on a recon tool called Specter to speed up my initial scans on larger scopes. It's written in Python using asyncio to handle concurrent TCP connections. I benchmarked it against nmap for raw port discovery and it's consistently about 9.4x faster. To be clear, it isn't meant to replace nmap's scripts or OS detection. It's just built to be a lot more efficient at the "find what is open" phase by stripping away the extra weight and focusing on high concurrency. The tool handles a few different parts of the recon process: - Subdomain enumeration through passive sources like crt.sh, alienvault, and hackertarget. - Active bruteforcing if you want to use a wordlist. - Automatic IP resolution and port scanning for any discovered hosts. - Scrapes page titles and server headers so you can see what is actually running. I set up a web version so you can try it out without installing anything: https://scan.x3r0day.me The full source is on GitHub here: https://github.com/X3r0Day/X3r0Day-Specter It is free and open source. If you use it for bug bounties or pentesting, let me know how it performs for you. I'm looking for feedback on any bugs or features you think are missing. [link] [comments] |
from hacking: security in practice https://ift.tt/YtE41pv
Comments
Post a Comment