Spaghetti is a web application security scanner tool. It is designed to find various default and insecure files, configurations and misconfigurations. Spaghetti is built on python2.7 and can run on any platform which has a Python environment.
Installation
$ git clone https://github.com/m4ll0k/Spaghetti.git
$ cd Spaghetti
$ pip install -r requirements.txt
$ python spaghetti.py --help
Features
- Fingerprints
- Server
- Web Frameworks (CakePHP,CherryPy,Django,...)
- Web Application Firewall (Waf) (Cloudflare,AWS,Barracuda,...)
- Content Management System (CMS) (Drupal,Joomla,Wordpress,Magento)
- Operating System (Linux,Unix,Windows,...)
- Language (PHP,Ruby,Python,ASP,...)
Dicovery:
- Apache
- Apache (mod_userdir)
- Apache (mod_status)
- Apache multiviews
- Apache xss
- Broken Auth./Session Management
- Admin Panel
- Backdoors
- Backup Directory
- Backup File
- Common Directory
- Common File
- Log File
- Disclosure
- Emails
- IP
- Injection
- HTML
- SQL
- LDAP
- XPath
- XSS
- RFI
- PHP Code
- Other
- Allow Methods
- HTML Object
- Multiple Index
- Robots Paths
- Cookie Security
- Vulns
- ShellShock
- Struts-Shock
Usage:
python spaghetti.py --url target.com --scan 0 --random-agent --verbose
python spaghetti.py --url target.com --scan 1 --random-agent --verbose