A tool for finding vulnerabilities.
❤️PoC [455]
🐸Like please tag stars🌟⭐
afrog is a tool for finding vulnerabilities. If you want to finding vulnerabilities such as SQL injection, XSS, file inclusion, etc., AWVS does a better job. Otherwise, you can try afrog.
- Based on xray kernel, not like xray (afrog template syntax)
- Great performance, least requests, best results
- Real-time display, scanning progress
- View
request
andresponse
packets of scan results - Start the program to automatically update the local PoC library
- Long-term maintenance, update PoC (afrog-pocs )
- API interface, easy access to other projects
Scan a single target.
afrog -t http://example.com -o result.html
Scan multiple targets.
afrog -T urls.txt -o result.html
For example: urls.txt
http://example.com
http://test.com
http://github.com
Test a single PoC file
afrog -t http://example.com -P ./testing/poc-test.yaml -o result.html
Test multiple PoC files
afrog -t http://example.com -P ./testing/ -o result.html
Output html report
This tool is only for legally authorized enterprise security construction behavior. If you need to test the usability of this tool, please build a target environment by yourself.
In order to avoid malicious use, all PoCs included in this project are theoretical judgments of vulnerabilities, there is no vulnerability exploitation process, and no real attacks or exploits will be launched on the target.
When using this tool for detection, you should ensure that the behavior complies with local laws and regulations and has obtained sufficient authorization. **Do not scan unauthorized targets. **
If you have any illegal behavior in the process of using this tool, you shall bear the corresponding consequences by yourself, and we will not bear any legal and joint responsibility.
Before installing and using this tool, please must read carefully and fully understand the contents of each clause. Restrictions, disclaimers or other clauses involving your significant rights and interests may be bolded or underlined to remind you to pay attention . Unless you have fully read, fully understood and accepted all the terms of this agreement, please do not install and use this tool. Your use behavior or your acceptance of this agreement in any other express or implied manner shall be deemed that you have read and agreed to be bound by this agreement.