CTF web enumeration tool
___________ .__ __________
\_ _____/____ | | ____ ____ ____ \______ \ ____ ____ ____ ____
| __) \__ \ | | _/ ___\/ _ \ / \ | _// __ \_/ ___\/ _ \ / \
| \ / __ \| |_\ \__( <_> ) | \ | | \ ___/\ \__( <_> ) | \
\___ / (____ /____/\___ >____/|___| / |____|_ /\___ >\___ >____/|___| /
\/ \/ \/ \/ \/ \/ \/ \/
usage: falcon.py [-h] [-u URL] [-r REGEXPATTERN] [-b] [--burp-port BURPPORT] [-w WORDLIST]
CTF web enumeration tool
options:
-h, --help show this help message and exit
-u URL, --url URL target url
-r REGEXPATTERN, --regex REGEXPATTERN
Set a flag regex
-b, --burp Use burpsuite as a proxy
--burp-port BURPPORT burp default port
-w WORDLIST, --wordlist WORDLIST
Wordlist for enumeration
-t THREADS, --threads THREADS
Num of threads
- Server fingerprinting
- Directory bruteforce
- Flag regex matching
- Threading! (NEW)
git clone https://github.com/casco-di/FalconRecon
cd FalconRecon
pip install -r requirements.txt
python3 falcon.py -u <target>