diff --git a/README.md b/README.md index ee7f8b2a..276ccb44 100644 --- a/README.md +++ b/README.md @@ -1,721 +1,712 @@ - - -

ATSCAN SCANNER

-

- - - - - - - - - - - - - - - - -

-

Advanced Mass Search / Dork / Exploitation Scanner

- - - - - -
Alisam Technology is not responsible for any misuse, damage caused by this script or attacking targets without prior mutual consent! It is your responsibility to obey laws! -
- - - - - - - - - - -
Codename:4n0n4t
AUTHOR:Ali MEHDIOUI
GROUP:Alisam@Technology
- - - ★ Description: - - - - - -

- ● Engines: [Google apis cache] Bing Ask Yandex Sogou Exalead Shodan
- ● Mass Dork Search
- ● Multiple instant scans.
- ● Mass Exploitation
- ● Use proxy.
- ● Random user agent.
- ● Random engine.
- ● Mass Extern commands execution.
- ● Exploits and issues search.
- ● XSS / SQLI / LFI / AFD scanner.
- ● Filter wordpress & Joomla sites.
- ● Wordpress theme and plugin detection.
- ● Find Admin page.
- ● Decode / Encode Base64 / MD5
-

- ● Ports scan.
- ● Collect IPs
- ● Collect E-mails.
- ● Auto detect errors.
- ● Auto detect forms.
- ● Auto detect Cms.
- ● Post data.
- ● Auto sequence repeater.
- ● Validation.
- ● Post and Get method
- ● IP Localisation
- ● Issues and Exploit search
- ● Interactive and Normal interface.
- ● And more... -

- - - - - - - -
★ Libreries to install:
- Perl Required.
- Works in all platforms. - Disponible in Blackarch and Dracos Linux. -
- - - - - - - -
Download:
- ● git clone https://github.com/AlisamTechnology/ATSCAN
- ● direct link: https://github.com/AlisamTechnology/ATSCAN -
- - - - - - - -
Permissions:
- cd ATSCAN
- chmod +x ./atscan.pl -
- - - - - - - -
Installation:
chmod +x ./install.sh
./install.sh
- - - - - - - - -
Execution:
- Portable Execution: perl ./atscan.pl
- Installed Tool Execution: atscan
- Menu: Applications > Web Application analysis > atscan
- - - - - - - -
Repair Tool:
- atscan --repair
-
- - - - - - - -
Uninstall Tool:
- atscan --uninstall
-
- - - - - - - -
Commands:
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
--help / -h Help.
--proxy - Set tor proxy for scans [EX: --proxy "socks4://localhost:9050"]
- Set proxy [EX: --proxy "http://12.45.44.2:8080"]
- Set proxy list [EX: --proxy file]
--prandomRandom proxy [EX: --prandom file] or --prandom "socks://localhost:9050"]
--motor / -mbing google ask yandex sogou exalead googleapis googlecache or all
--apikeyApikey
--cxGoogleapis ID
--mrandomRandom of given engines
--brandomRandom all disponibles agents
--freqRandom time frequency (in seconds)
--timeset browser time out
--dork / -d Dork to search [Ex: house [OTHER]cars [OTHER]hotel] -
--target / -tTarget
--level / -l Scan level (Number of results pages to scan)
--zone Search engine country.
--param / -p Set test parameter EX:id,cat,product_ID
--save / -s Output.
--source Html output file
--bugtraq Serach exploits and issues
--content Print request content
--data Post and Get forms. See examples
--vshell Validate by url ex: --HOST/shell.php or file
--post Use post method
--get Use get method
--header Set headers
--fullHeaders Print full request headers
--host Domain name [Ex: site.com]
--nobanner Hide tool banner
--beep Produce beep sound if positive scan found.
--ifend Produce beep sound when scan process is finished.
--noverbose No scan verbose.
--ping Host ping.
--limit Limit max positive scan results.
--valid / -v Validate by string at least 1 is matching
--validAll Validate all given strings
--status Validate by http header status
--server Validate by server
--ifinurl Get targets with exact string matching
--sregex Get targets with exact regex matching
--exclude Get targets where strings do not exist in html
--excludeAll Get targets where all strings do not exist in html
--unique Get targets with exact dork matching
--replace Replace exact string
--replaceFROM Replace from string to the end of target
--exp / -e Exploit/Payload will be added to full target
--expHost Exploit will be added to the host
--expIp Exploit will be added to the host ip
--xss Xss scan
--sql Sqli scan
--lfi Local file inclusion
--joomrfi Scan for joomla local file inclusion.
--shell Shell link [Ex: http://www.site.com/shell.txt]
--wpafd Scan wordpress sites for arbitrary file download
--admin Get site admin page
--shost Get site subdomains
--port port
--tcp TCP port
--udp UDP port
--getlinks Get target html links
--wp Wordpress site
--joom Joomla site
--zip Get zip files
--md5 Convert to md5
--encode64 Encode base64 string
--decode64 decode base64 string -
--TARGET Will be replaced by target in extern command
--HOST Will be replaced by host in extern command
--HOSTIP Will be replaced by host IP in extern command
--PORT Will be replaced by open port in extern command
--ips Collect Ips
--geoloc Ip geolocalisation
--regex Crawl to get strings matching regex
--noquery Remove string value from Query url [ex: site.com/index.php?id=string]
--command / -c Extern Command to execute
--popup Execute Extern Command in new terminal window
--zoneH Upload to Zone-H
--saveCookieCookies output file
--setCookiesCookie file
--email Collect emails
rang(x-y) EX: --expHost "/index.php?id=rang(1-9)" --sql OR -t "site.com/index.php?id=rang(1-9)" --sql
- site.com/index.php?id=1 -> 9.
repeat(txt-y) EX: --expHost "/index.php?id=repeat(../-9)wp-config.php" --status 200 OR -t "site.com/index.php?id=../wp-config.php"
- In site.com/index.php?id=../wp-config.php then site.com/index.php?id=../../wp-config.php 9 times
[OTHER]To separate values ex: dork1 [OTHER]DORK2 [OTHER]DORK3
--googleapiGoogle Apis
--shodanShodan search
--countSearch Shodan without Results
--countSearch Shodan
--dnsreversetShodan Reverse DNS Lookup
--dnsresolveShodan Resolve DNS Lookup
--tokensString filters and parameters
--querysearchSearch the directory of saved Shodan search queries
--queryList the saved Shodan search queries
--querytagsList the most popular Shodan tags
--myipList all services that Shodan crawls
--servicesList all services that Shodan crawls
--apinfoMy Shodan API Plan Information
--ports List of port numbers that the crawlers are looking for
--protocols List all protocols that can be used when performing on-demand Internet scans via Shodan.
--honeyscore Calculates honeypot score ranging from 0 (not a honeypot) to 1.0 (is a honeypot) in shodan
--facetsShodan search facets
--update Update tool
--repairRepair or force tool update.
--tool / -?Tool info.
--configUser configuration.
--interactive / -iInteractive mode interface.
--uninstallUninstall Tool.
- - - - - - - -
Examples:
-
- ● PROXY:
- Tor: --proxy [proxy] [Ex: --proxy socks://localhost:9050].
- Proxy: --proxy [proxy] Ex: --proxy http://12.32.1.5:8080
- or --proxy file Ex: --proxy my_proxies.txt
-
- ● RANDOM:
- Random proxy: --prandom [proxy file]
- Random browser: --brandom
- Random engine: --mrandom [ENGINES]
-
- ● SET HEADERS:
- atscan --dork [dork / dorks.txt] --level [level] --header "Authorization => 'Basic YWRtaW46YWRtaW4', keep_alive => '1'"
- atscan -t target --data "name=>username, email=>xxxxxx, pass=>xxxxx" --post --header "Authorization => 'Basic YWRtaW46YWRtaW4', keep_alive => '1'"
-
- ● SEARCH ENGINE:
- Search: atscan --dork [dork] --level [level]
- Search: atscan -d [dork] -l [level] --getlinks
- Set engine: atscan --dork [dork] --level [level] -m bing or google,ask,yandex or all
- Set selective engines: atscan -d [dork] -l [level] -m google,bing,..
- Search with many dorks: atscan --dork dork1 [OTHER]dork2 [OTHER]dork3] --level [level]
- Get Server wordpress sites: atscan -t [target] --wp
- Search + output: atscan --dork [dorks.txt] --level [level] --save
- Search + get emails: atscan -d [dorks.txt] -l [level] --email
- Search + get site emails: atscan --dork site:site.com --level [level] --email
- Search + get ips: atscan --dork [dork] --level [level] --ips
-
- ● REGULAR EXPRESSIONS:
- Regex use: atscan [--dork [dork> / -t [target]] --level [level] --regex [regex]
- IP: ((?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){ 3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))
- E-mails: '((([A-Za-z0-9]+_+)|([A-Za-z0-9]+\-+)|([A-Za-z0-9]+\.+)|([A-Za-z0-9]+\++))*[A-Za-z0-9]+@((\w+\-+)|(\w+\.))*\w{1,63}\.[a-zA-Z]{2,6})'
-
- ● REPEATER:
- atscan -t site.com?index.php?id=rang(1-10) --sql
- atscan -t [target] --expHost "/index.php?id=rang(1-10)" --sql
- atscan -t [target] --expHost "/index.php?id=repeat(../-9)wp-config.php"
-
- ● PORTS
- atscan -t [ip] --port [port] [--udp / --tcp]
- atscan -t (ip start)-(ip end) --port [port] [--udp / --tcp]
- atscan -t [ip] --port (port start)-(port end) [--udp / --tcp] --command "your extern command"
-
- ● ENCODE / DECODE:
- Generate MD5: --md5 [string]
- Encode base64: --encode64 [string]
- Decode base64: --decode64 [string]
-
- ● DATA:
- Data: atscan -t [target] --data "field1=>value1, field2=>value2, field3=>value3" [--post / --get /]
- Exploit: --exp/expHost --data "field1=>value1, field2=>value2, field3=>value3" --vshell [shell path] -v [string] / --status [code] [--post / --get / --upload]
- Wordlist: --data "field1=>value1, field2=>WORDLIST:" --vshell [shell path] -v [string] / --status [code] [--post / --get]
-
- ● EXTERNAL COMMANDS:
- atscan --dork [dork / dorks.txt] --level [level] --command "curl -v --TARGET"
- atscan --dork [dork / dorks.txt] --level [level] --command "file"
- atscan --dork [dork / dorks.txt] --level [level] --command "curl -v --HOST"
- atscan --dork [dork / dorks.txt] --level [level] --command "nmap -sV -p 21,22,80 --HOSTIP"
- atscan -d "index of /lib/scripts/dl-skin.php" -l 2 -m bing --command "php WP-dl-skin.php-exploit.php --TARGET"
- atscan --shodan --search [string] --apikey [API KEY] -command [extern_command]
-
- ● MULTIPLE SCANS:
- atscan --dork [dork> --level [10] --sql --lfi --wp ..
- atscan --dork [dork> --level [10] --replace [string => new_string] --exp/expHost [payload] [--sql / --lfi / --wp /...]
- atscan -t [ip] --level [10] [--sql / --lfi / --wp /...]
- atscan -t [target] [--sql / --lfi / --wp /...]
-
- ● IP LOCALISATION:
- atscan -t [ip/target] --geoloc
-
- ● SEARCH VALIDATION:
- atscan -d [dork / dorks.txt] -l [level] --status [code] / --valid [string/file]
- atscan -d [dork / dorks.txt] -l [level] --status [code] / --valid [string/file]
- atscan -d [dork / dorks.txt] -l [level] --status [code] / --exclude [string/file]
- atscan -d [dork / dorks.txt] -l [level] --ifinurl [string]
- atscan -d [dork / dorks.txt] -l [level] --sregex [regex] --valid [string]
- atscan -d [dork / dorks.txt] -l [level] --regex [regex] --valid [string]
- atscan -d [dork / dorks.txt] -l [level] --unique
- atscan -t [target / targets.txt] [--status [code] / --valid [string]
- atscan -t [target / targets.txt] --vshell [file path]
- atscan -d [dork / dorks.txt] -l [level] --exp/expHost [payload] --status [code] / --valid [string]
- atscan -d [dorks.txt] -l [level] --replace [string => new_string] --status [code] / --valid [string]
- atscan -d [dork / dorks.txt] -l [level] [--admin / --sql ..] --status [code] / --valid [string]
- atscan -d [dorks.txt] -l [level] --replace [string => new_string] --status [code] / --valid [string]
- atscan -d [dorks.txt] -l [level] --replaceFROM [string => new_string] --status [code] / --valid [string]
- atscan -d [dorks.txt] -l [level] --replace [string => new_string] --exp/expHost [payload] --status [code] / --valid [string]
- atscan -d [dork / dorks.txt] -l [level] [--sql / --shost ..] --status [code] / --valid [string]
- atscan -t [target / targets.txt] --valid [string] --exclude [string]
-
- ● ZONE-H:
- atscan -t [target / targets.txt] -v [string] --zoneH "notifier => --HOST/index.php"
-
- ● SEARCH EXPLOITS:
- atscan --bugtraq -d [string] -l 1 EX: atscan --bugtraq -d wordpress -l 1
- atscan --bugtraq -d file.txt -l 1
- atscan --bugtraq -d [string] -l 1--limit 10
-
- ● GOOGLEAPIS SEARCH
- atscan --dork [string or file] -l 1 --apikey [API KEY] --cx [ID]
- atscan --dork [string or file] -l 1 --apikey [API KEY] --cx [ID] -v [string]
- atscan --dork [string or file] -l 1 --apikey [API KEY] --cx [ID] --exp [exploit]
- atscan --dork [string or file] -l 1 --apikey [API KEY] --cx [ID] [ANY APTION]
-
- ● SHODAN SEARCH
- atscan --shodan --targget [ip or host or file] --apikey [API KEY]
- atscan --shodan --dork [string or file] --apikey [API KEY]
- atscan --shodan --dnsresolve [ip or host or file] --apikey [API KEY]
- atscan --shodan --dnsrevese [ip or host or file] --apikey [API KEY]
- atscan --shodan --count [query or file] --apikey [API KEY]
- atscan --shodan --query --apikey [API KEY]
- atscan --shodan --querysearch [query or file] --apikey [API KEY]
- atscan --shodan --querytags --apikey [API KEY]
- atscan --shodan --myip --apikey [API KEY]
- atscan --shodan --apinfo --apikey [API KEY]
- atscan --shodan --services --apikey [API KEY]
- atscan --shodan --ports --apikey [API KEY]
- atscan --shodan --tokens [string or file] --apikey [API KEY]
-
- ● UPDATE TOOL:
- atscan --update
-
- ● UNINSTALL TOOL:
- atscan --uninstall -
- ● THANKS TO:
- Blackarch linux & Dragos Os developers to incorporate my project in their systems. -
-
- +![dorking](https://github.com/user-attachments/assets/c89a214c-6e9d-4282-9e5a-28d683925bf9) + +
+ + +

ATSCAN

+

+ + + + + + + + + + + + +

+

AdvancedSearch / Dorking / MetaScan

+ + + + + +
Alisam Technology is not responsible for any misuse or damage caused by this script or attacking targets without prior mutual consent! It is your responsibility to obey laws! +
+ + + + + + + + + + +
Codename:4n0n4t
AUTHOR:Ali MEHDIOUI
GROUP:Alisam@Technology
+ + + ★ Features: + + + + + +

+ ● Engines: Google, Bing, Ask, Yandex, Sogou, Exalead, Shodan, etc.)
+ ● Dorking
+ ● MultiSearch and instant reverse-proxy.
+ ● Randomize engine and agent.
+ ● External Commands.
+ ● XSS / SQLI / LocalFileInclusion with Advanced Format Drivers including port swiggers with socks vendors.
+ ● Filters Wordpress and Joomla sites.
+ ● Detects plugins.
+ ● Hosts our Find The Admin page with decrypted search.
+ ● Decoder plugins with Encoded Basedx64 Subsytems with MD5 encryption subprocessors.
+

+ ● Pre-filters Content Management Systems.
+ ● 4n0n4t - auto sequence repeater.
+ ● Built-in Key Validation.
+ ● Built-in SQLI with issues and exploitation results with interactive UI, HUD and modified interface.
+

+ + + + + + + +
★ All you need for Dorking:
+ Perl is required.
+ Disponible in Blackarch and Dracos Linux. +
+ +![ProgrammingRepublic](https://github.com/user-attachments/assets/dc3d644b-5666-46f5-aadf-851ecb697df8) + + + + + + + + +
Download:
+ ● git clone https://github.com/AlisamTechnology/ATSCAN
+ ● direct link: https://github.com/AlisamTechnology/ATSCAN +
+ + + + + + + +
Permissions:
+ cd ATSCAN
+ chmod +x ./atscan.pl +
+ + + + + + + +
Installation:
chmod +x ./install.sh
./install.sh
+ + + + + + + + +
Execution:
+ Portable Execution: perl ./atscan.pl
+ Installed Tool Execution: atscan
+ Menu: Applications > Web application analysis > ATSCAN
+ + + + + + + +
Repair Tool:
+ atscan --repair
+
+ + + + + + + +
Uninstall Tool:
+ atscan --uninstall
+
+ + + + + + + +
Commands:
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
--help / -h Help.
--proxy + Set tor proxy for scans [EX: --proxy "socks4://localhost:9050"]
+ Set proxy [EX: --proxy "http://12.45.44.2:8080"]
+ Set proxy list [EX: --proxy file]
--prandomRandom proxy [EX: --prandom file] or --prandom "socks://localhost:9050"]
--motor / -mbing, google, ask, yandex, sogou, exalead, googleapis, googlecache or all
--apikeyAn API Key (Application Programming Interface).
--cxGoogleapis ID.
--mrandomRandomize given engines.
--brandomRandomize all disponible agents.
--freqA random time frequency (in seconds).
--timeSet browser time out.
--dork / -dDork Search [Ex: house [OTHER]cars [OTHER]hotel] +
--target / -tTargets user machine.
--level / -lScan level (number of results and pages to scan).
--zoneSearch engine's country.
--param / -pSet test parameters (UID's, cats, a products_ID).
--save / -sOutputs.
--sourceHTML outputs file.
--bugtraqSearch exploits and an issue.
--contentPrints Request Content.
--dataPOST and GET forms (SQLI).
--vshellValidate by url (--HOST/shell.php or file).
--postUses POST method.
--getUses GET method.
--headerSet headers.
--fullHeadersPrints full request headers.
--hostDomain's name [Ex: site.com]
--nobannerHides tool banner.
--beepProduces a beep sound if a positive scan is found.
--ifendProduces a beep sound when a scan process is finished.
--noverboseNo scan verbose.
--pingHost's ping.
--limitLimits max positive scan results.
--valid / -vValidate a string (at least 1 is matching).
--validAll Validates all given strings.
--statusValidate via http-header-status.
--serverValidates server.
--ifinurl Get targets with exact string matching.
--sregex Get targets with exact regex matching<./td> +
--exclude Get targets where strings do not exist in html.
--excludeAll Get targets where all strings do not exist in html.
--unique Get targets with exact dork matching.
--replace Replaces an exact string.
--replaceFROM Replaces from a string to the end of a target.
--exp / -e Exploit/Payload will be added to a full target.
--expHost Exploit will be added to the host.
--expIp Exploit will be added to the host's ip.
--xssXSS scan.
--sqlSQLI scan.
--lfi(Local File Inclusion).
--joomrfiScans for joomla (local file inclusion).
--shellShell Link - [http://www.site.com/shell.txt]
--wpafdScans wordpress sites for arbitrary file downloads.
--adminGets HOST's site - Admin Page.
--shostGets HOST's site - subdomains.
--portUser's [ports]
--tcpA User's Transmission Control Protocol (port).
--udpA User's Datagram Protocol (port).
--getlinksGets a Target's HTML link.
--wpFilters a Wordpress site.
--joomFilters a Joomla site.
--zipGets a zip file.
--md5Converts to MD5.
--encode64Encodes Base64 strings (Bitmasking).
--decode64Decodes a Base64 string. +
--TARGETDefault: Target is in an external command.
--HOSTDefault: Host's are in external commands.
--HOSTIPDefault: Host's IP is in an external command.
--PORTDefault: Open ports are in an external command.
--ipsThis will collect All IP's (Internet Protocol).
--geolocGeolocalization.
--regexCrawls GET strings that are matching regex (Regular Expressions).
--noqueryRemoves the string value from a server's Query url (Uniform Reference Link) - [http://www.domain.site.server/index.php?id=string].
--command / -cExternal Commands Developers execute.
--popupExecutes External Command (exe.ext.cmd) in a new terminal window.
--zoneHUploads to Zone-H(dmz).
--saveCookieThe cookies output filesystem.
--setCookiesA cookie file.
--emailCollect all emails.
rang(x-y)--expHost "/index.php?id=rang(1-9)" --sql OR -t "site.com/index.php?id=rang(1-9)" --sql
+ site.com/index.php?id=1 -> 9.
repeat(txt-y) --expHost "/index.php?id=repeat(../-9)wp-config.php" --status 200 OR -t "site.com/index.php?id=../wp-config.php"
+ in site.com/index.php?id=../wp-config.php then site.com/index.php?id=../../wp-config.php for 9 times
[OTHER]To separate values (dork1 [OTHER]DORK2 [OTHER]DORK3).
--googleapiGoogle's API.
--shodanShodan's Search.
--countSearch Shodan without results.
--dnsreversetShodan's Reverse DNS Lookup (Domain Name Registration).
--dnsresolveShodan Resolver - DNS Lookup.
--tokensStringify filters and parameters.
--querysearchDirectory Search of Saved Shodan Search Query.
--queryLists Saved Shodan Search Queries.
--querytagsLists Most Popular Shodan Tags.
--myipLists All services that Shodan crawls.
--servicesShodan crawler.
--apinfoMy Shodan API Plan Information.
--portsAnother list of port numbers that Shodan crawlers are looking up.
--protocolsA pre-generated list of all the protocols that can be used when performing an on-demand internet scan via Shodan.
--honeyscoreCalculates the honeypot score of a ranging 0 (Brought to you by Shodan) to 1.0 (which IS a honeypot).
--facetsShodan Search Facet.
--update(Updater).
--repair(Repairer).
--tool / -?(Informant)
--config(usr_conf).
--interactive / -i(UI, UFI, etc).
--uninstallDeletes the API - (Not the program).
+ + + + + + + +
Examples:
+
+ ● VPN: (Antivirus)
+ Onion: --proxy [SOCKS] [I.E. --dsearch http://localhost:9050.abc123.onion/server]
+ Google: [API] [I.E. --proxy http://12.32.1.5:8080/dsearch?=example%20&addon=4n0n47]
+ OR --proxy /user/ --proxy 4n0n47_proxies.txt
+
+ ● RANDOM:
+ Randomize proxy: --prandom [proxy_file]
+ Randomize browser: --brandom
+ Randomize engine: --mrandom [ENGINER]
+
+ ● SET HEADER:
+ atscan --dork [dork / dorks.txt] --level [level] --header "OAuth => 'Unrestricted YWRtaW46YWRtaW4', keep_alive ?=> '1'"
+ atscan -t USRxMACHINE --data "name=>usrn, email=>xxxxx@xxx.com, pass=>xxxxx" --post --header "2FA ? => 'True YWRtaW46YWRtaW4', keep_alive => '0'"
+
+ ● SEARCH ENGINE:
+ Search: atscan --dork [dork] --level [level]
+ Search: atscan -d [dork] -l [level] --getlinks
+ Set Engine: atscan --dork [dork] --level [level] -m Bing or Google, Ask, Yandex; or All
+ Set Selective Engine: atscan -d [dork] -l [level] -m Google, Bing, ..
+ Search Dorks: atscan --dork dork1 [OTHER]dork2 [OTHER]dork3] --level [level]
+ Get Server Wordpress Sites: atscan -t [target] --wp
+ Search + output: atscan --dork [dorks.txt] --level [level] --save
+ Search + get emails: atscan -d [dorks.txt] -l [level] --email
+ Search + get site emails: atscan --dork site:site.com --level [level] --email
+ Search + get ips: atscan --dork [dork] --level [level] --ips
+
+ ● REGEX:
+ Regular Expression Usage: atscan [--dork [dork> / -t [target]] --level [level] --regex [regex]
+ Protocols IoT: ((?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){ 3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))
+ Netscape: '((([A-Za-z0-9]+_+)|([A-Za-z0-9]+\-+)|([A-Za-z0-9]+\.+)|([A-Za-z0-9]+\++))*[A-Za-z0-9]+@((\w+\-+)|(\w+\.))*\w{1,63}\.[a-zA-Z]{2,6})'
+
+ ● 4n0n47 REPEATER:
+ atscan -t site.com?index.php?id=rang(1-10) --sql
+ atscan -t [target] --expHost "/index.php?id=rang(1-10)" --sql
+ atscan -t [target] --expHost "/index.php?id=repeat(../-9)wp-conf.php"
+
+ ● PORTS
+ atscan -t [ip] --port [port] [--udp / --tcp]
+ atscan -t (ip start)-(ip end) --port [port] [--udp / --tcp]
+ atscan -t [ip] --port (port start)-(port end) [--udp / --tcp] --command "user's extern cmd"
+
+ ● ENCODER / DECODER / HASHER:
+ Generate Hash: --md5 [string]
+ Encode base64 bits: --encode64 [string]
+ Decode base64 bits: --decode64 [string]
+
+ ● DAT:
+ Data: atscan -t [target] --data "field1=>value1, field2=>value2, field3=>value3" [--post / --get /]
+ Xploit: --exp/exposed%Host --data "field1=>value1, field2=>value2, field3=>value3" --vshell [shell path] -v [string] / --status [code] [--post / --get / --upload]
+ HashCat: --data "field1=>value1, field2=>WORDLIST:" --vshell [shell path] -v [string] / --status [code] [--post / --get]
+
+ ● EXTERNAL COMMANDS:
+ atscan --dork [dork / dorks.txt] --level [level] --command "curl -v --TARGET"
+ atscan --dork [dork / dorks.txt] --level [level] --command "file"
+ atscan --dork [dork / dorks.txt] --level [level] --command "curl -v --HOST"
+ atscan --dork [dork / dorks.txt] --level [level] --command "nmap -sV -p 21,22,80 --HOSTIP"
+ atscan -d "index of /lib/scripts/dl-skin.php" -l 2 -m bing --command "php WP-dl-skin.php-exploit.php --TARGET"
+ atscan --shodan --search [string] --apikey [8a3a2b907e9035baca964c4a0aeec1be] -command [extern_command]
+
+ ● MULTI SCAN:
+ atscan --dork [dork> --level [10] --sql --lfi --wp ..
+ atscan --dork [dork> --level [10] --replace [string => new_string] --exp/exposedHost [AWS] [--sql / --lfi / --wp /...]
+ atscan -t [ip] --level [10] [--sql / --lfi / --wp /...]
+ atscan -t [target] [--sql / --lfi / --wp /...]
+
+ ● IoT LOCALISATION:
+ atscan -t [ip/target] --geoloc
+
+ ● SEARCHERXVALIDATOR:
+ atscan -d [dork / dorks.txt] -l [level] --status [code] / --valid [string/file]
+ atscan -d [dork / dorks.txt] -l [level] --status [code] / --valid [string/file]
+ atscan -d [dork / dorks.txt] -l [level] --status [code] / --exclude [string/file]
+ atscan -d [dork / dorks.txt] -l [level] --ifinurl [string]
+ atscan -d [dork / dorks.txt] -l [level] --sregex [regex] --valid [string]
+ atscan -d [dork / dorks.txt] -l [level] --regex [regex] --valid [string]
+ atscan -d [dork / dorks.txt] -l [level] --unique
+ atscan -t [target / targets.txt] [--status [code] / --valid [string]
+ atscan -t [target / targets.txt] --vshell [file path]
+ atscan -d [dork / dorks.txt] -l [level] --exp/expHost [payload] --status [code] / --valid [string]
+ atscan -d [dorks.txt] -l [level] --replace [string => new_string] --status [code] / --valid [string]
+ atscan -d [dork / dorks.txt] -l [level] [--admin / --sql ..] --status [code] / --valid [string]
+ atscan -d [dorks.txt] -l [level] --replace [string => new_string] --status [code] / --valid [string]
+ atscan -d [dorks.txt] -l [level] --replaceFROM [string => new_string] --status [code] / --valid [string]
+ atscan -d [dorks.txt] -l [level] --replace [string => new_string] --exp/expHost [payload] --status [code] / --valid [string]
+ atscan -d [dork / dorks.txt] -l [level] [--sql / --shost ..] --status [code] / --valid [string]
+ atscan -t [target / targets.txt] --valid [string] --exclude [string]
+
+ ● ZONE-H:
+ atscan -t [target / targets.txt] -v [string] --zoneH "notifier => --HOST/index.php"
+
+ ● HONEYPOT VULNERABILITIES:
+ atscan --bugtraq -d [string] -l 1 EX: atscan --bugtraq -d wordpress -l 1
+ atscan --bugtraq -d file.txt -l 1
+ atscan --bugtraq -d [string] -l 1--limit 10
+
+ ● GOOGLEAPI:
+ atscan --dork [string or file] -l 1 --apikey [8a3a2b907e9035baca964c4a0aeec1be] --cx [ID]
+ atscan --dork [string or file] -l 1 --apikey [8a3a2b907e9035baca964c4a0aeec1be] --cx [ID] -v [string]
+ atscan --dork [string or file] -l 1 --apikey [8a3a2b907e9035baca964c4a0aeec1be] --cx [ID] --exp [exploit]
+ atscan --dork [string or file] -l 1 --apikey [8a3a2b907e9035baca964c4a0aeec1be] --cx [ID] [ANY APTION]
+
+ ● SHODAN SEARCH
+ atscan --shodan --targget [ip or host or file] --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --dork [string or file] --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --dnsresolve [ip or host or file] --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --dnsrevese [ip or host or file] --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --count [query or file] --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --query --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --querysearch [query or file] --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --querytags --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --myip --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --apinfo --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --services --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --ports --apikey [8a3a2b907e9035baca964c4a0aeec1be]
+ atscan --shodan --tokens [string or file] --apikey [8a3a2b907e9035baca964c4a0aeec1be
+
+ ● TOOL:
+ atscan --update
+
+ ● DELETE:
+ atscan --uninstall +
+ ● CREDIT:
+ @Blackarch linux & Dragos Os developers for incorporating The 4n0n47 Project into their systemsâť— +
+
+ + ____ ____ _ _ ___ _ _ _____ + / __ \/ ___| ___ __ _ _ __ | || | _ __ / _ \ _ __ | || |___ | + / / _` \___ \ / __/ _` | '_ \ | || |_| '_ \| | | | '_ \| || |_ / / +| | (_| |___) | (_| (_| | | | ||__ _| | | | |_| | | | |__ _/ / + \ \__,_|____/ \___\__,_|_| |_|___|_| |_| |_|\___/|_| |_| |_|/_/ + \____/ |_____| + +