Pen Hunter is a powerful tool for vulnerability scanning, including XSS, SQL Injection, Local File Inclusion, Open Redirect, Server-Side Request Forgery, Cross-Site Request Forgery, and Remote Code Execution. This tool automates the process of collecting subdomains and URLs, and testing them for various vulnerabilities.
- XSS (Cross-Site Scripting)
- SQL Injection
- Local File Inclusion
- Open Redirect
- Server-Side Request Forgery
- Cross-Site Request Forgery
- Remote Code Execution
To install Pen Hunter, follow these steps:
-
Clone the repository:
git clone https://github.com/cc1a2b/PenHunter.git cd penhunter
-
Run the install script:
chmod +x install.sh ./install.sh
-
Make the Pen Hunter script executable:
chmod +x penhunter.sh
-
create directory for one and subdomains:
mkdir penhunter/one && mkdir penhunter/subdomains
Run Pen Hunter with the following command:
chmod +x penhunter.sh