Skip to content

User fofa api get hosts and xray to webscan.

License

Notifications You must be signed in to change notification settings

Steven1ay/fofa2Xray

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

fofa2Xray

Documentation

A tool that can combine fofa and xray for automatic batch scanning.

Coding by golang, both for windows and linux.

Introduction

Use fofa api to get target domain list, then make webscan by xray.

Demo

image-20200729095201091

Quick start

  1. Move xray to the directory where fofa2xray is located
    image-20200729093958904
  2. Vi f2Xconfig.yaml
    fofa:
      email: {fofa账户}
      key: {fofaKey}
    
      # 固定查询语句
      fixedQuerySyntexList:
        - status_code=200
        - country="CN"
    
      # 查询语法
      # 更多查询语法见https://fofa.so/
      querySyntax: host
    
      # 使用querySyntax查询语法分别查询target
      targetList:
        - .hubu.edu.cn
    #    - .hbue.edu.cn
    #    - .wust.edu.cn
    xray:
      #path没有用,必须把xray可执行文件放在脚本同一目录
      path: D:\CyberSecurityTools\xray_windows_amd64\xray_windows_amd64.exe
    
      #fofa2Xray相同目录下xray的全名
      name: xray_windows_amd64.exe
    
      #同时运行xray的最大数
      thread: 10
  3. Run fofa2Xray.
    ./fofa2Xray
    nohup ./fofa2Xray &  // 持久化
  4. Check Result.

    Fofa2Xray will create result folder for every target.

    image-20200729095822453

About

User fofa api get hosts and xray to webscan.

Resources

License

Stars

Watchers

Forks

Packages

No packages published