OpenDoor OWASP WEB Directory Scanner
OpenDoor OWASP WEB Directory Scanner

OpenDoor: OWASP WEB Directory Scanner

OpenDoor OWASP is console multifunctional web sites scanner. This application find all possible ways to login, index of/ directories, web shells, restricted access points, subdomains, hidden data and large backups. The scanning is performed by the built-in dictionary and external dictionaries as well. Anonymity and speed are provided by means of using proxy servers. Software is written for informational purposes and is open source product under the GPL license.

(Due to the incorrect operation of “SSL” the support for “Python 2.7” is terminated)

  • Current 4.0.1-beta (23.02.2021)
    • Directories – 37019
    • Subdomains – 181018

Legal

Testing of the software on the live commercial systems and organizations is prohibited!

OpenDoor OWASP
OpenDoor OWASP

Implements

  •  multithreading control
  •  scan’s reports
  •  directories scanner
  •  subdomains scanner
  •  HTTP(S) (PORT) support
  •  Keep-alive long pooling
  •  HTTP(S)/SOCKS proxies
  •  dynamic request header
  •  custom word-lst’s prefixes
  •  custom word-lists, proxies, ignore lists
  •  debug levels (-1 (silent), 1-3)
  •  extensions filter
  •  custom reports directory
  •  custom config wizard (use random techniques)
  •  analyze techniques
    • detect redirects
    • detect an index of/ Apache
    • detect large files
    • heuristic detect invalid web pages
    • blank success page filter
    • certificate required pages
  •  randomization techniques
    • random user-agent per request
    • random proxy per request
    • word-lists shuffling
    • word-lists filters

Install and Use

Install PIP

curl https://bootstrap.pypa.io/get-pip.py -o get-pip.py

Local installation and run

git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor/
pip3 install -r requirements.txt
chmod +x opendoor.py

python3 opendoor.py --host http://www.example.com

Global installation (Preferably for OS distributions)

git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor/
python3 setup.py build && python3 setup.py install

opendoor --host http://www.example.com

Updates

 python3 opendoor.py --update
 opendoor --update

Help

usage: opendoor.py [-h] [--host HOST] [-p PORT] [-m METHOD] [-t THREADS]
                   [-d DELAY] [--timeout TIMEOUT] [-r RETRIES]
                   [--accept-cookies] [--debug DEBUG] [--tor]
                   [--torlist TORLIST] [--proxy PROXY] [-s SCAN] [-w WORDLIST]
                   [--reports REPORTS] [--reports-dir REPORTS_DIR]
                   [--random-agent] [--random-list] [--prefix PREFIX]
                   [-e EXTENSIONS] [-i IGNORE_EXTENSIONS] [--sniff SNIFF]
                   [--update] [--version] [--examples] [--docs]
                   [--wizard [WIZARD]]

optional arguments:
  -h, --help            show this help message and exit

required named options:
  --host HOST           Target host (ip); --host http://example.com

Application tools:
  --update              Update from CVS
  --version             Get current version
  --examples            Examples of usage
  --docs                Read documentation
  --wizard [WIZARD]     Run wizard scanner from your config

Debug tools:
  --debug DEBUG         Debug level -1 (silent), 1 - 3

Reports tools:
  --reports REPORTS     Scan reports (json,std,txt,html)
  --reports-dir REPORTS_DIR
                        Path to custom reports dir

Request tools:
  -p PORT, --port PORT  Custom port (Default 80)
  -m METHOD, --method METHOD
                        Request method (use HEAD as default)
  -d DELAY, --delay DELAY
                        Delay between requests threading
  --timeout TIMEOUT     Request timeout (30 sec default)
  -r RETRIES, --retries RETRIES
                        Max retries to reconnect (default 3)
  --accept-cookies      Accept and route cookies from responses
  --tor                 Using built-in proxylist
  --torlist TORLIST     Path to custom proxylist
  --proxy PROXY         Custom permanent proxy server
  --random-agent        Randomize user-agent per request

Sniff tools:
  --sniff SNIFF         Response sniff plugins
                        (indexof,collation,file,skipempty)

Stream tools:
  -t THREADS, --threads THREADS
                        Allowed threads

Wordlist tools:
  -s SCAN, --scan SCAN  Scan type scan=directories or scan=subdomains
  -w WORDLIST, --wordlist WORDLIST
                        Path to custom wordlist
  --random-list         Shuffle scan list
  --prefix PREFIX       Append path prefix to scan host
  -e EXTENSIONS, --extensions EXTENSIONS
                        Force use selected extensions for scan session -e
                        php,json e.g
  -i IGNORE_EXTENSIONS, --ignore-extensions IGNORE_EXTENSIONS
                        Ignore extensions for scan session -i aspx,jsp e.g
More Stories
AD Enum Exploit Misconfiguration through the Protocol LDAP
AD Enum: Exploit Misconfiguration through the Protocol LDAP