Secator docs
  • GETTING STARTED
    • Introduction
    • Installation
    • CLI Usage
    • Library usage
    • Configuration
    • Examples
      • 5 minutes secator session
  • RUNNER OPTIONS
    • Global options
    • Meta options
    • Input formats
    • Output options
  • IN-DEPTH
    • Philosophy & design
    • Distributed runs with Celery
    • Concepts
      • Output types
      • Proxies
      • Exporters
      • Runners
      • Drivers
      • Profiles
    • Deployment
  • For developers
    • Development setup
    • Writing tasks
      • Integrating an external command
        • Parsing JSON lines
        • Parsing raw standard output
        • Parsing output files
        • Example: integrating ls
        • Example: cat hunters
      • Integrate custom Python code [WIP]
      • Advanced options
    • Writing workflows
    • Writing scans [WIP]
Powered by GitBook
On this page
  • Quick demo
  • Features
  • Supported tools

Was this helpful?

  1. GETTING STARTED

Introduction

... or what secator is all about.

NextInstallation

Last updated 8 months ago

Was this helpful?

secator is a task and workflow runner used for security assessments. It supports dozens of well-known security tools and is designed to improve productivity for pentesters and security researchers.


Quick demo


Features


Supported tools

secator integrates the following tools:

Name
Description
Category

Fast HTTP prober.

http

Fast crawler and endpoint secrets / api keys / tokens matcher.

http/crawler

Offline URL crawler (Alien Vault, The Wayback Machine, Common Crawl, URLScan).

http/crawler

Fast web spider written in Go.

http/crawler

Next-generation crawling and spidering framework.

http/crawler

Web path discovery.

http/fuzzer

Simple, fast, recursive content discovery tool written in Rust.

http/fuzzer

Fast web fuzzer written in Go.

http/fuzzer

Email OSINT and breach hunting tool.

osint

Fast and multi-purpose DNS toolkit designed for running DNS queries.

recon/dns

Fast and multi-purpose DNS toolkit designed for running DNS queries (bruteforce mode).

recon/dns

Fast subdomain finder.

recon/dns

Find alive hosts on local networks.

recon/ip

Expand CIDR ranges into IPs.

recon/ip

Fast port discovery tool.

recon/port

Hunt for user accounts across many websites.

recon/user

A wrapper around grep to avoid typing common patterns.

tagger

A vulnerability scanner for container images and filesystems.

vuln/code

Powerful XSS scanning tool and parameter analyzer.

vuln/http

CLI to access and work with the Metasploit Framework.

vuln/http

WordPress Security Scanner

vuln/multi

Vulnerability scanner using NSE scripts.

vuln/multi

Fast and customisable vulnerability scanner based on simple YAML based DSL.

vuln/multi


Feel free to request new tools integrations by on the repo, but please check that the tool complies with our selection criterias before doing so (read ). If it doesn't but you still want to integrate it into secator, you can plug it in (read Writing tasks).

httpx
cariddi
gau
gospider
katana
dirsearch
feroxbuster
ffuf
h8mail
dnsx
dnsxbrute
subfinder
fping
mapcidr
naabu
maigret
gf
grype
dalfox
msfconsole
wpscan
nmap
nuclei
opening an issue
Curated list of tools
Unified input options
Unified output schema
CLI and library usage
Distributed options
From simple tasks to complex workflows
Customizable
Curated list of tools
Example of running secator tasks and workflows