Skip to content
forked from OctoShadow/Webkit

A hacking tool for websites, for ClickJacking or SQL Injection Scanner or XSS Scanner or other things (BIG UPDATE)

Notifications You must be signed in to change notification settings

dataCtos/Webkit

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Logo

WEB KIT

V1.5 - ( by Fatal r00ted )

⚠️ Report Bug


⚙️ Installation

  • linux-py: sudo apt install python3
  • win-py: https://www.python.org/downloads/

❗ Disclaimers

  • No nonsense.

Languages ➜


🧵 Help

• sql <URL>             -   SQL Injection Scanner
• xss <URL>             -   XSS Scanner
• subdomain <URL>       -   Subdomain Website
• clickjacking <URL>    -   Clickjacking Scanner
• get <domain.com>      -   Website Information
• proxy <ip:port>       -   Proxy HTTP check
• portscan <domain.com> -   Port Scanner
• scrape <URL>          -   Web Scraper
• file <URL>            -   show files
• read <URL>            -   see all files
webkit:~$ sql http://google.com/
[*] Trying http://google.com/"
[*] Trying http://google.com/'
[+] Detected 1 forms on http://google.com/.

webkit:~$ xss http://google.com/
[+] Detected 1 forms on http://google.com/.
[+] Submitting malicious payload to http://google.com/search
[+] Data: {'NULL': 'Google NULL', 'NULL': 'NULL', 'NULL': 'NULL', 'source': 'NULL', 'NULL': 'NULL', 'NULL': 'NULL'}

webkit:~$ subdomain http://google.com/
[-] http://google.com/signup
[-] http://google.com/login
[-] http://google.com/logout
[-] http://google.com/database
[-] http://google.com/secret
[-] http://google.com/app
[+] http://google.com/sms
[-] http://google.com/ipv4

webkit:~$ clickjacking http://google.com/
[-] http://google.com/ is not vulnerable to clickjacking.
[*] Response Headers:
| Date:
| Expires: 
| Cache-Control:
| Content-Type: 
| Content-Security-Policy-Report-Only: 
| Content-Encoding: 
| Server: 
| Content-Length: 
| X-XSS-Protection: 0
| X-Frame-Options: 
| Set-Cookie: 

webkit:~$ get gooogle.com
[+] NULL
IP : ###.###.##.##
STATUS : success
COUNTRY :
COUNTRY CODE : 
REGION :
CITY : 
ZIP : 
LAT : 
LON : 
TIMEZONE : 
ISP NAME : Google LLC

webkit:~$ proxy 127.0.0.1:80 <--- HTTP PROXY
{
  'httpbin': '127.0.0.1'
}

webkit:~$ portscan google.com
[*] Target IP address: 
[*] Scanning ports on 
[+] Port   |   1   |   open
[+] Port   |   2   |   open
[-] Port   |   3   |   closed
[+] Port   |   4   |   open
[+] Port   |   5   |   open
[+] Port   |   6   |   open
[+] Port   |   7   |   open

webkit:~$ scrape http://google.com/
CODE HERE

webkit:~$ file http://google.com/
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  http://maps.google.nl/maps?########
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  https://www.youtube.com/#####
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED
[+] URL  |  FILE  |  CENSURED

webkit:~$ read http://google.com/
[+] URL  |  FILE  |  https://www.google.com/##############
[*] Content of https://www.google.com/##############
<h1>Hello world</h1>

📜 ChangeLog

v1.0 ⋮ 29/06/2024
v1.5 ⋮ 4/07/2024

📣 Features

+ WEBKIT Information
Subdomain
Sql Injection Scanner
XSS vulnerability scanner
Clickjacking
Get information about a site
Proxy HTTP
Port Scanner
Web Scraper
show files
see all files

Star History Chart

About

A hacking tool for websites, for ClickJacking or SQL Injection Scanner or XSS Scanner or other things (BIG UPDATE)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 97.1%
  • Shell 2.9%