... or how you can use secator as your pentesting swiss-knife.
secator is first and foremost a command-line interface (CLI). This page describes how to use it in-depth.
Usage
secator--help# General helpsecatorx# List available taskssecatorw# List available workflowssecators# List available scanssecatoru# List available utilities
Running tasks
You can run any of the supported tasks out-of-the box using the secator x (execute) subcommand:
Find subdomains of a domain using offline sources with subfinder:
secatorxsubfinderwikipedia.org
Find information about an URL with httpx:
secatorxhttpxwikipedia.org
Fuzz URLs with ffuf with max 100 requests / second and matching select HTTP codes:
secator w url_crawl https://mydomain.com/start/crawling/from/here/
secator w url_fuzz https://mydomain.com/start/fuzzing/from/here/
secator w code_scan /path/to/code/repo
secator w user_hunt elonmusk
secator s domain example.com
secator s subdomain sub.example.com
secator s network 192.168.1.0/24
secator s url http://testphp.vulnweb.com
secator u proxy # print a random proxy
secator u proxy -n 5 --timeout 1 # print 5 proxies with 1s max timeout
secator u revshell # list all reverse shells
secator u revshell bash # show a Bash reverse shell
secator u revshell javascript -h <LHOST> -p <LPORT> # show a Javascript reverse shell to connect to LHOST / LPORT
secator u revshell javascript -h <LHOST> -p <LPORT> -l # ... also spawn a netcat listener
secator u serve
secator u record -i <RECORD_NAME> # record an interactive session
secator u record --script test.sh <RECORD_NAME> # put your commands in a script and record the execution
secator c get # get full config (with defaults)
secator c get --user # get user config
secator c get wordlists.defaults.http # get default wordlist path
secator c set wordlists.defaults.http rockyou.txt # set default wordlist
secator c edit # edit user config yaml
secator c default # get default config