secator – The Security Pentester Swiss Knife

secator is a task and workflow runner used for security pentester assessments. It supports dozens of well-known security tools and it is designed to improve productivity for pentesters and security researchers.

Curated list of commands

  • Unified input options
  • Unified output schema
  • CLI and library usage
  • Distributed options with Celery
  • Complexity from simple tasks to complex workflows
  • Customizable

Installation

Installing secator

  • Pipx
  • Pip
  • Bash
  • Docker
  • Docker Compose
NameDescriptionCategory
httpxFast HTTP prober.http
cariddiFast crawler and endpoint secrets / api keys / tokens matcher.http/crawler
gauOffline URL crawler (Alien Vault, The Wayback Machine, Common Crawl, URLScan).http/crawler
gospiderFast web spider written in Go.http/crawler
katanaNext-generation crawling and spidering framework.http/crawler
dirsearchWeb path discovery.http/fuzzer
feroxbusterSimple, fast, recursive content discovery tool written in Rust.http/fuzzer
ffufFast web fuzzer written in Go.http/fuzzer
h8mailEmail OSINT and breach hunting tool.osint
dnsxFast and multi-purpose DNS toolkit designed for running DNS queries.recon/dns
dnsxbruteFast and multi-purpose DNS toolkit designed for running DNS queries (bruteforce mode).recon/dns
subfinderFast subdomain finder.recon/dns
fpingFind alive hosts on local networks.recon/ip
mapcidrExpand CIDR ranges into IPs.recon/ip
naabuFast port discovery tool.recon/port
maigretHunt for user accounts across many websites.recon/user
gfA wrapper around grep to avoid typing common patterns.tagger
grypeA vulnerability scanner for container images and filesystems.vuln/code
dalfoxPowerful XSS scanning tool and parameter analyzer.vuln/http
msfconsoleCLI to access and work with the Metasploit Framework.vuln/http
wpscanWordPress Security Scannervuln/multi
nmapVulnerability scanner using NSE scripts.vuln/multi
nucleiFast and customisable vulnerability scanner based on simple YAML based DSL.vuln/multi
searchsploitExploit searcher.exploit/search
Secator integrates tools.

Installing languages

secator uses external tools, so you might need to install languages used by those tools assuming they are not already installed on your system.

We provide utilities to install required languages if you don’t manage them externally:

  • Go
    Ruby

Installing tools

    secator does not install any of the external tools it supports by default.

    We provide utilities to install or update each supported tool which should work on all systems supporting apt:

    • All tools
    • Specific tools

    Please make sure you are using the latest available versions for each tool before you run secator or you might run into parsing / formatting issues.

    Installing addons

    secator comes installed with the minimum amount of dependencies.

    There are several addons available for secator:

    • worker
    • google
    • mongodb
    • redis
    • dev
    • trace
    • build

    Install CVEs

    secator makes remote API calls to https://cve.circl.lu/ to get in-depth information about the CVEs it encounters. We provide a subcommand to download all known CVEs locally so that future lookups are made from disk instead:

    secator install cves

    Checking installation health

    To figure out which languages or tools are installed on your system (along with their version):

    secator health

    Usage

    secator --help

    Usage examples

    Run a fuzzing task (ffuf):

    secator x ffuf http://testphp.vulnweb.com/FUZZ

    Run a url crawl workflow:

    secator w url_crawl http://testphp.vulnweb.com

    Run a host scan:

    secator s host mydomain.com
    and more… to list all tasks / workflows / scans that you can use:

    secator x --help
    secator w --help
    secator s --help

    Download Secator

    Previous Article
    Cybersecurity and Identity Verification

    Cybersecurity and Identity Verification Services: Safeguarding Personal Information in a Digital Age

    Next Article
    Understanding Quishing

    Understanding Quishing: The Rise of QR Code Scams in Cybersecurity

    Related Posts