Thanks to visit codestin.com
Credit goes to Github.com

Skip to content

gotr00t0day/Gsec

Repository files navigation

Gsec

Web Security Scanner & Exploitation.

Based on custom vulnerability scanners & Nuclei

Python Version Issues Stars Twitter

FeaturesKeysInstallUsageKeyWordsJoin Discord


Features

  • Passive Scan

    • Find assets with shodan
    • RapidDNS to get subdomains
    • Certsh to enumerate subdomains
    • DNS enumeration
    • Waybackurls to fetch old links
    • Find domains belonging to your target
  • Normal / Agressive Scan

    • Domain http code
    • Web port scanning
    • Server information
    • HTTP security header scanner
    • CMS security identifier / misconfiguration scanner
    • Technology scanner
    • Programming Language check
    • Path Traversal scan
    • Web Crawler
    • OS detection
    • Nuclei vulnerability scanning
    • SSRF, XSS, Host header injection and Cors Misconfiguration Scanners
    • Session Management Security Analysis (fixation, hijacking, timeout, concurrent sessions)
    • SSL/TLS Security Analysis (certificate validation, protocol support, cipher suites)
    • API Security Testing Suite (BOLA/IDOR, authentication bypass, verb tampering, mass assignment, GraphQL security, rate limiting)
    • Cloud Misconfiguration Scanner (AWS S3, Azure Storage, GCP buckets, exposed files, Docker/Kubernetes, metadata endpoints)
    • HTTP Request Smuggling Detection (CL.TE, TE.CL, TE.TE, desync attacks, response queue poisoning)
    • GraphQL Security Testing (introspection, depth DoS, batch queries, authorization bypass, injection attacks)

🏆 Feature Comparison

Gsec vs Popular Security Scanners:

Feature Nikto OWASP ZAP Burp Free Burp Pro Gsec v3.8
API Security Suite ⚠️ Basic ⚠️ Basic Advanced
Cloud Misconfigurations ⚠️ Limited Complete
Request Smuggling Pro-Level
GraphQL Testing ⚠️ Basic 10+ Tests
S3 Bucket Enumeration 25+ patterns
BOLA/IDOR Detection 🔧 Manual 🔧 Manual ⚠️ Semi-Auto Automated
Exposed Files Scanner ⚠️ Basic ⚠️ Basic 🔧 Manual 🔧 Manual 50+ files
GraphQL DoS Testing 3 types
TE.TE Detection ⚠️ Limited 7 obfuscations
GraphQL Auth Bypass 🔧 Manual Automated
Traditional Web Vuln Scanning
Price Free Free Free $💰💰💰 Free

Legend: ✅ Full Support | ⚠️ Partial/Basic | 🔧 Manual Testing Required | ❌ Not Available


Installation

Make sure you have GoLang installed, with out it you won't be able to install nuclei.

git clone https://github.com/gotr00t0day/Gsec.git

cd Gsec

pip3 install -r requirements.txt

# Make sure that nuclei-templates is cloned in the / directory. Gsec fetches the templates from ~/nuclei-templates
python3 install.py

Keys

Gsec will fetch the shodan API key from the core directory, the passive recon script supports scanning with shodan,
please save your shodan key in core/.shodan for the scan to be able to work.

OUTPUT

Some outputs that are too large will be saved in a file in the output folder / directory.

Usage

# normal (passive and aggresive scans)

python3 gsec.py -t https://domain.com

# Passive Recon

python3 gsec.py -t https://domain.com --passive_recon

# Ultimate Scan (Scan for High and Severe CVEs and Vulnerabilities with nuclei)

python3 gsec.py --ultimatescan https://target.com

Anonimity

ProxyChains

You can use Proxychains with tor for anonimity.

proxychains -q python3 gsec.py -t https://target.com

Keywords

If Gsec finds a vulnerability and it has the POSSIBLE! keyword in the output that means it could be a false positive and you need to manually test the vulnerability to make sure it's actually vulnerable.

Coming Soon...

I'm working on adding proxy support for Gsec, it will be added in future releases.

Issues

In python3.10+ you might get an SSL error while running Gsec. To fix this issue just pip3 install ceritifi and then do /Applications/Python\ 3.10/Install\ Certificates.command and the issue will be fixed.