File | Date | Author | Commit |
---|---|---|---|
LICENSE | 2024-11-26 |
![]() |
[d44433] Initial commit |
README.md | 2024-11-26 |
![]() |
[73a74a] Update README.md |
dir-aka.zip | 2024-11-26 |
![]() |
[d8ed9b] Add files via upload |
diraka.py | 2024-11-26 |
![]() |
[488095] Update diraka.py |
The Dir-aka Vulnerability Scanner is a Python-based security tool designed for cybersecurity professionals and system administrators to analyze and secure web servers against unauthorized access. This tool identifies sensitive files and folders on a target web server, filters content by file extensions, and highlights potential misconfigurations or vulnerabilities in publicly accessible directories.
By scanning for directory indexing, probing for commonly targeted paths, and analyzing HTTP responses, the scanner helps professionals preemptively mitigate risks such as data exposure, credential leaks, and unauthorized access.
Automatically detects directory indexing if enabled.
File Extension Filtering:
Filters results based on user-defined file extensions (e.g., .php
, .html
, .txt
) for precise discovery.
Probing for Common Paths:
Tests predefined paths like /admin/
, /uploads/
, .git/
, and config.php
for potential vulnerabilities.
Authentication Support:
Supports HTTP Basic Authentication for scanning protected resources.
Error Handling:
Parses custom error pages (404
responses) for hidden links or misconfigured error handling.
Flexible Deployment:
To run the Directory Vulnerability Scanner, ensure the following:
- Python: Version 3.6 or higher.
- Libraries:
- requests
for HTTP requests.
- BeautifulSoup
(from bs4
) for HTML parsing.
- requests.auth
for handling HTTP Basic Authentication.
Install the dependencies using for linux:
pip install requests beautifulsoup4
The tool operates in three stages:
The user provides the target URL, optional authentication credentials, and file extensions for filtering.
Processing:
Filters links by file extensions if specified.
Output:
403 Forbidden
, 404 Not Found
) and parses custom error pages for useful links.git clone https://github.com/diraka/dir-aka.git
cd dir-aka
python diraka.py
```
https://example.com/some-directory/
).File Extensions: Specify file extensions to filter results (e.g., .php,.html
) or leave blank to display all files.
Example Input:
Enter the remote directory URL: https://example.com/
Enable authentication? (yes/no): no
Enter file extensions to search (comma-separated, e.g., .html,.php,.txt) or press Enter to skip: .php,.html
Output:
The tool displays:
```
Server Header: Apache/2.4.41 (Ubuntu)
X-Powered-By: PHP/7.4.3
Target IP: 93.184.216.34
Detected TTL: 64
OS Guess: Linux/Unix
Files and Directories:
index.php
contact.php
login.php
Successfully accessed: https://example.com/index.html
index.html
Failed to access https://example.com/.git/. HTTP Status: 404
Common Paths:
Modify the common_paths
list to add or remove frequently targeted files/directories.
Example:
python
common_paths = [
"login.php",
"admin/",
"backup.sql",
"private/"
]
Error Handling:
Enhance the error handling to capture specific HTTP statuses or implement retries for unstable networks.
While using this tool:
- Authorization: Use the tool only on servers you own or have explicit permission to test.
- Rate Limiting: Avoid overloading servers; use delays if necessary.
- Data Storage: Ensure that scanned data is stored securely and deleted after use.
Identify misconfigured directories exposing sensitive files.
Penetration Testing:
Integrate with broader penetration testing workflows to probe for sensitive endpoints.
Incident Response:
Quickly locate potential data leaks during incident response activities.
DevOps Security:
find the windows version https://diraka.github.io
This tool is a starting point for assessing directory vulnerabilities. Use it responsibly to enhance your server’s security posture.