WhoAreYou is a powerful multi-functional vulnerability testing tool developed in NET Core 9 designed to assist security researchers and penetration testers in identifying common web application vulnerabilities.
The LFI scanner helps to identify Local File Inclusion vulnerabilities in web applications. It works by appending a
series of payloads to a given URL and checking if sensitive files, such as /etc/passwd
, can be accessed. This feature
includes:
- Payload Generation: The tool can generate LFI payloads with multiple bypass techniques:
- Null byte bypass
- Current directory bypass
- Double dot (..) bypass
- Directory traversal (with configurable max depth)
- Unicode bypass (only for Linux systems)
- Testing URLs: The scanner tests the URLs and checks for the presence of sensitive files to indicate potential LFI vulnerabilities.
The RFI scanner helps to identify Remote File Inclusion vulnerabilities in web applications.
- Example Payload Generator
- Testing URLs: The scanner tests the URLs and checks for the presence of Listener to indicate potential RFI vulnerabilities.
The XSS scanner helps to identify Cross-Site Scripting vulnerabilities in web applications. It works by injecting
- Payload Generation: Generate example XSS payloads:
- Keylogger
- Session/Cookie Stealer
- Javascript Function
- Reflected XSS
- HTML Tag 1/2
- Polyglot
- Testing URLs: The scanner tests the URLs and checks for the presence of XSS payloads to indicate potential XSS vulnerabilities. (Adds the Payload to the Parameter, Mainly for reflected XSS)
The TCP Port Listener module is a simple tool that listens on a specified port and displays any incoming connections.
- Port Listening: The tool listens on the specified port and displays incoming connections.
- Connection Logging: Logs the incoming connections.
The Web Scraper module is used to extract all links from a specified webpage. It is useful for identifying additional targets for testing or simply gathering information about a web application. Features include:
- Scraping Links: Extracts all the links (internal and external) found on the page.
- Host Matching: Optionally filters links to only include those from the same domain as the input URL.
- Max Sites Limit: Allows you to set a limit on the number of links to scrape (with an option to scrape all links if
set to
0
). - HTML Fetching: Efficiently fetches the HTML content of the target URL for link extraction.
- Check for Parameters: Optionally checks for query parameters in the links and displays them.
WhoAreYou will continue to evolve and expand with new features, including:
- SSRF: For identifying SSRF vulnerabilities. (duhh)
- XSS: For identifying XSS vulnerabilities. (duhh)