Metadata-Version: 2.1
Name: nemesis-scan
Version: 1.0.0
Summary: A tool for scanning urls
Home-page: https://github.com/machinexa2/Nemesis
Author: Machine Yadav
Author-email: machinexa@gmail.com
License: MIT
Download-URL: https://github.com/machinexa2/Nemesis/archive/refs/tags/v3.0.tar.gz
Description: # Nemesis
        ![Nemesis](pics/Nemesis.png)
        [![Code Grade](https://www.code-inspector.com/project/15087/status/svg)](https://frontend.code-inspector.com/public/project/15087/JScanner/dashboard)
        [![Code Quality](https://www.code-inspector.com/project/15087/score/svg)](https://frontend.code-inspector.com/public/project/15087/JScanner/dashboard)
        
        ## Description
        A simple tool for scanning urls for vulnerabilites and sensitive information. It has lot of pre defined regexes for dom xss possibility detection, secrets leakage, hidden parameters, extra links and much more. 
        
        ## Features
        1. Supports scanning of both html and javascript urls
        2. Pre defined regexes for dom xss (sinks & sources), web services, hidden parameters, endpoints and a lot more are already present. 
        3. Shannon entropy helps to find additional suspicious data that can be missed by regexes but may generate false positive so disabled by default.
        
        ## Usage
        ```
        usage: Nemesis.py [-h] [--- | -w WORDLIST | -u URL] [-o OUTPUT] [-e] [-t THREADS] [-b]
        
        Nemesis
        
        optional arguments:
          -h, --help            show this help message and exit
          ---, ---              Stdin
          -w WORDLIST, --wordlist WORDLIST
                                Absolute path of wordlist
          -u URL, --url URL     url to scan
          -o OUTPUT, --output OUTPUT
                                Output file
          -e, --enable-entropy  Enable entropy search
          -t THREADS, --threads THREADS
                                Number of threads
          -b, --banner          Print banner and exit
        
        Enjoy bug hunting
        ```
        
        ## Example
        1. Scan a single URL/Domain/Subdomain  
         - ```JScanner -d google.com``` or ```JScanner -u https://google.com/closurelibrary.js```
        2. Scan from URLs
         - ```JScanner -w hakrawler.txt -oD `pwd` -t 10 -d domain.com```
        3. Scan from stdin (subdomains) with entropy check
         - ```assetfinder google.com | JScanner --- -o results.txt -e```
        4. Scan from stdin (hakrawler, gau)
         - ```echo "uber.com" | tee >(hakrawler | JScanner --- -o hakrawler.txt -t 10) >(gau | JScanner --- -o gau.txt -t 10)```
        
        ## Limitations
        * Output maybe repeated such as same links again and again
        * Output to file saving is in work
        * Additional logical errors and false positivies from faulty regex
        
        
Keywords: tool,url,scan,hacking
Platform: UNKNOWN
Classifier: Programming Language :: Python :: 3
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Requires-Python: >=3.8
Description-Content-Type: text/markdown
