https://github.com/zan8in/afrog
What is it for?
afrog is a high-performance vulnerability scanner designed for security testing, bug bounty, pentesting, and red teaming. It detects known vulnerabilities (CVE, CNVD, default passwords, information leaks, unauthorized access, command execution, etc.) using customizable Proof of Concepts (PoCs) and generates detailed HTML reports.
Installation
Prerequisites
- Go 1.19 or higher
Quick installation (binary)
- Download the latest binary from: https://github.com/zan8in/afrog/releases/latest
- Unzip and give execution permissions:
chmod +x afrog ./afrog -h
Install from source
git clone https://github.com/zan8in/afrog.git
cd afrog
go build cmd/afrog/main.go
./afrog -hInstall with Go
go install -v github.com/zan8in/afrog/v3/cmd/afrog@latestBasic usage
Scan a single target:
afrog -t https://example.comScan multiple URLs:
afrog -T urls.txtScan using custom PoCs:
afrog -t https://example.com -P my_pocs_folder/Filter by keyword in PoCs:
afrog -t https://example.com -s weblogic,jbossFilter by severity:
afrog -t https://example.com -S high,criticalGenerate JSON report:
afrog -t https://example.com -json result.jsonUsage examples
-
Scan a site and generate an HTML report:
afrog -t https://victim.comThe report is automatically saved in the current folder.
-
Scan several sites from a file:
afrog -T targets.txt -
Use web mode to view results in your browser:
afrog -web # Then open http://localhost:16868 in your browser
Notes
- The first use creates the configuration file
afrog-config.yamlin~/.config/afrog/. - For PoCs that require interaction with external services (like ceye.io), configure the keys in the YAML file.
- Legal use: Only use on your own systems or with explicit authorization.