• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Webbies Toolkit – Web Recon & Enumeration Tools

February 4, 2017

Views: 2,661

Webbies Toolkit is a pair of tools that enable asynchronous web recon & enumeration including SSL detection, banner grabbing and presence of login forms.

Webbies Toolkit - Web Recon & Enumeration Tools

Webbies Features

  • Respects scope (including redirects)
  • Uses same DNS resolver for enumeration and retrieval by patching aiohttp TCPConnector
  • Cached DNS requests by wrapping aiodns
  • SSLContext can be modified for specific SSL versions
  • Outputs a simple CSV for easy grep-fu of results
  • Asynchronous http(s) and dns
  • Specialized bingapi search on ip and hostname given bing key

FDB Features

  • Fast directory/web application eumeration
  • Dir bust numerous hosts simultaneously and save all results in a directory in a CSV file per host
  • Task control to limit requests per second
  • Multiple progress bars for current status on running FDB’s
  • Include word list used, target, extensions, and start and stop times in CSV file
  • 404 detection based on response structure and content

Usage

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
usage: classify.webbies.py [-h] [-A] [-b BING_KEY] [-g GNMAP] [-G GNMAPDIR]                                                                                                                                                                            
                           [-i INPUTLIST] [-n NESSUS] [-N NESSUSDIR]                                                                                                                                                                                    
                           [-o OUTPUT] [-R NAMESERVERS] [-s SCOPE]                                                                                                                                                                                      
                           [-T THREADS] [-u USERAGENTS] [-v] [-V]                                                                                                                                                                                      
                                                                                                                                                                                                                                                        
enumerate and display detailed information about web listeners                                                                                                                                                                                          
                                                                                                                                                                                                                                                        
optional arguments:                                                                                                                                                                                                                                    
  -h, --help            show this help message and exit                                                                                                                                                                                                
  -A, --analyze         analyze web listeners responses and group according                                                                                                                                                                            
                        similarity                                                                                                                                                                                                                      
  -b BING_KEY, --bing_key BING_KEY                                                                                                                                                                                                                      
                        bing API key                                                                                                                                                                                                                    
  -g GNMAP, --gnmap GNMAP                                                                                                                                                                                                                              
                        gnmap input file                                                                                                                                                                                                                
  -G GNMAPDIR, --gnmapdir GNMAPDIR                                                                                                                                                                                                                      
                        Directory containing gnmap input files                                                                                                                                                                                          
  -i INPUTLIST, --inputList INPUTLIST                                                                                                                                                                                                                  
                        input file with hosts listed http(s)://ip:port/ or                                                                                                                                                                              
                        ip:port per line                                                                                                                                                                                                                
  -n NESSUS, --nessus NESSUS                                                                                                                                                                                                                            
                        nessus input file                                                                                                                                                                                                              
  -N NESSUSDIR, --nessusdir NESSUSDIR                                                                                                                                                                                                                  
                        Directory containing nessus files                                                                                                                                                                                              
  -o OUTPUT, --output OUTPUT                                                                                                                                                                                                                            
                        Output file. Supported types are csv. default is                                                                                                                                                                                
                        lastrun.csv                                                                                                                                                                                                                    
  -R NAMESERVERS, --nameservers NAMESERVERS                                                                                                                                                                                                            
                        Specify custom nameservers to resolve IP/hostname.                                                                                                                                                                              
                        Comma delimited                                                                                                                                                                                                                
  -s SCOPE, --scope SCOPE                                                                                                                                                                                                                              
                        Scope file with IP Networks in CIDR format                                                                                                                                                                                      
  -T THREADS, --threads THREADS                                                                                                                                                                                                                        
                        Set the max number of threads.                                                                                                                                                                                                  
  -u USERAGENTS, --useragents USERAGENTS                                                                                                                                                                                                                
                        specifies file of user-agents to randomly use.                                                                                                                                                                                  
  -v, --verbosity       -v for regular output, -vv for debug level                                                                                                                                                                                      
  -V, --version         show program's version number and exit          

You can download Webbies Toolkit here:

webbies-master.zip

Or read more here.

Share
Tweet7
Share12
Buffer26
WhatsApp
Email
45 Shares

Filed Under: Hacking Tools, Networking Hacking Tools Tagged With: enumeration, network-enumeration



Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 55

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 311

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 510

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 501

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Shell3r - Powerful Shellcode Obfuscator for Offensive Security

Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Views: 693

If antivirus and EDR vendors are getting smarter, so are the tools that red teamers and penetration … ...More about Shell3r – Powerful Shellcode Obfuscator for Offensive Security

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Views: 8,640

Introduction: How Much of the Internet Can You See? You're only scratching the surface when you … ...More about Understanding the Deep Web, Dark Web, and Darknet (2025 Guide)

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (227)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (233)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,291,877)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,071)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,614)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,675)
  • Password List Download Best Word List – Most Common Passwords (933,464)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,130)
  • Hack Tools/Exploits (673,287)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,143)

Search

Recent Posts

  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025
  • Shell3r – Powerful Shellcode Obfuscator for Offensive Security May 2, 2025
  • Understanding the Deep Web, Dark Web, and Darknet (2025 Guide) April 30, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy