Vulnerability Scanning
Created bymhmdiaa-trickest
Last updated8/12/2024
Scan for Sensitive Files
Description
Scan for exposed files that may leak sensitive information, including logs, configuration files, and development artifacts.Features
- Scans for a wide range of sensitive files.
- Validates the content to minimize false positives.
- Can scan thousands of web servers simulataneously.
Inputs
Required
- urls: a list of URLs
Optional
- header: Header(s) to include in HTTP requests
- header-file: File with header(s) to include in HTTP requests
- rate-limit: Maximum number of requests to send per second per machine (default: 300)
Outputs
- findings: JSONLines records of finding details.
Changelog
- v1.0.0
- Initial release
- v1.1.0
- Added
header-file
input
- Added
- v1.2.0
- Added recursive scanning to detect vulnerabilities at every level of the input URL paths
- v1.2.1
- Included the HTTP request that triggered each finding in the
request
field of thefindings
output
- Included the HTTP request that triggered each finding in the