總覽
Search websites for git repos, exposed config files, and more as you browse.
Bishop is a vulnerability scanner that searches websites in the background while you browse, looking for exposed version control systems, misconfigured administrative tools, and more. With a whitelisting regex system, you can easily restrict this tool to hosts that you are authorized to scan. It works by searching for files with a given path on the current URL path and all parent paths, applying given regex to the results to check for proof positive of a vulnerable location. If the path returns 200 and matches the regex, it's flagged as vulnerable and alerts you. All rules are run on all directories in a set of time-staggered background XHR requests, so network throughput remains high at all times. Bishop comes with a set of rules that hunt for the lowest hanging fruit, but the rule system is entirely extensible - rules are regular expressions that are run on specified directories, so if you can turn it into a regex, Bishop will look for it. Bishop is intended SOLELY for legal use on web servers that you control or are permitted to scan, and the developers are not responsible for how you choose to use this software. Bishop is MIT licensed and open source; contribute at https://github.com/jkingsman/bishop.
3.8 分 (滿分 5 分)12 個評分
Google 不會驗證評論。 進一步瞭解結果與評論。
詳細資料
- 版本1.0.12
- 已更新2019年1月20日
- 提供者Jack Kingsman
- 大小198KiB
- 語言English
- 開發人員
電子郵件
jack.kingsman+chrome@gmail.com - 非交易商這位開發人員並未表明自己是交易商。歐盟地區的消費者請注意,消費者權利不適用於你和這位開發人員之間簽訂的合約。
隱私權
支援
如有疑問或建議,請使用電腦版瀏覽器開啟這個頁面