Crimson is a tool that automates some of the Pentester or Bug Bounty Hunter tasks.
It uses many open source tools, most of them are available for download from github.
- crimson_recon - automates the process of domain reconnaissance.
- crimson_target - automates the process of urls reconnaissance.
- crimson_exploit - automates the process of bug founding.
This module can help you if you have to test big infrastructure or you are trying to earn some bounties in *.scope.com domain. It includes many web scraping and bruteforcing tools.
This module covers one particular domain chosen by you for testing.
It uses a lot of vulnerability scanners, web scrapers and bruteforcing tools.
This module uses a number of tools to automate the search for certain bugs in a list of urls.
Tested on Linux Mint and Kali Linux.
git clone https://github.com/Karmaz95/crimson.git
cd crimson
chmod +x install.sh
./install.sh
Add below line to your .bashrc / .zshrc etc.
export GOPATH=$HOME/go
export PATH="$HOME/bin:$HOME/.local/bin:$HOME/go/bin:$HOME/tools:$PATH"
Install Burp Suite and extensions listed below in section Burp Suite extensions
.
./crimson_recon "domain.com"
- If you are interested in how this module works, I encourage you to study the source code.
- I tried to describe in the comments how the individual tools works.
- Additionally, you can learn more about
crimson_recon
module by reading my article at medium
./crimson_target -d "example.domain.com" -c "Cookie: auth1=123;"
- If you are interested in how this module works, I encourage you to study the source code.
- I tried to describe in the comments how the individual tools works.
- Additionally, you can learn more about
crimson_target
module by reading my article at medium
♦️ Third module needs subdomain name
with your collaborator
and vps ip
. You can additionally put authorization cookie
and if you want to fuzz all the urls use the -x
flag. ♦️
./crimson_exploit -D "example.domain.com" -c "Cookie: auth1=123;" -d "collaborator.com" -i "ip" -x
- If you are interested in how this module works, I encourage you to study the source code.
- I tried to describe in the comments how the individual tools works.
- Additionally, you can learn more about
crimson_exploit
module by reading my article at medium
There are some useful tools in the scripts directory that I have written that are worth checking out.
Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.
The following tools are used in
crimson
. I encourage you to study the links below, they will definitely help you in your work. Especially checkBurp Suite extensions
, because all gathered resources are proxied to Burp Suite, where they are further tested.
- waybackurls
- Paramspider
- getallurls
- wfuzz
- ffuf
- feroxbuster
- sitemap-urls
- gospider
- hakrawler
- galer
- getJS
- httpx
- zile
- relative-url-extractor
- crimson_backuper
- nikto
- wapiti
- CorsMe
- subjack
- XSRFPROBE
- DirDar
- XSStrike
- Smuggler
- hbh-header-abuse-test
- broken-link-checker
- sqlmap
- CRLFuzz
- ysoserial
- ysoserial.net
- jwt-tool
- dalfox
- metasploit
- testssl.sh
- crimson_deserializator
- crimson_oobtester
- crimson_rewriter
- crimson_templator
- qsreplace
- anew
- unfurl
- wine
- exploit-database
- Search-That-Hash
- clever_ffuf
- crimson_opener
- crimson_paramjuggler
- tldextract
- .NET Beautifier
- ActiveScan++
- Additional Scanner Checks
- Anonymous Cloud, Configuration and Subdomain Takeover Scanner
- Attack Surface Detector
- Auth Analyzer
- Autowasp
- AWS Security Checks
- Backslash Powered Scanner
- Cloud Storage Tester
- Collaborator Everywhere
- CSP-Bypass
- CSRF Scanner
- Detect Dynamic JS
- Error Message Checks
- ExifTool Scanner
- Freddy, Deserialization Bug Finder
- HTTP Request Smuggler
- InQL - Introspection GraphQL Scanner
- J2EEScan
- Java Deserialization Scanner
- JS Link Finder
- Logger++
- NGINX Alias Traversal
- NoSQLi Scanner
- Paramalyzer
- Param Miner
- PHP Object Injection Check
- Reflected Parameters
- Retire.js
- Same Origin Method Execution
- SameSite Reporter
- Similar Request Excluder
- Software Version Reporter
- Software Vulnerability Scanner
- Taborator
- Turbo Intruder
- UploadScanner
- ViewState Editor
- Wayback Machine
- Web Cache Deception Scanner
This program is free software: you can redistribute it and/or modify it under the terms of the Apache license. Crimson and any contributions are Copyright © by Karol Mazurek 2020-2021.