Working with Snallygaster Tool on Kali Linux OS
Example 1: Scanning on w3wiki.org domain (secured)
snallygaster w3wiki.org
We are scanning for secret files on w3wiki.org’s target domain.
Unfortunately, we haven’t got any secret files on the w3wiki.org domain.
Example 2: Scanning secret files on zero.webappsecurity.com domain.
snallgaster zero.webappsecurity.com
In this example, we are scanning for the secret files on the zero.webappsecurity.com domain.
We have got the secret file that is present on the zero.webappsecurity.com domain.
After visiting the URL, we have got the information about the server like its versions built to date and many more.
Snallygaster – Scan For Secret Files On HTTP Servers
Some of the files present on the server need to be kept safe from public access, as these can have a bunch of sensitive data like version details, certificates, API keys, and a lot more. So to identify these secret files we have an automated tool names snallygaster. Snallygaster tool is a fully automated cyber security tool that has the potential to find out secret files from the target domain. This tool is developed in the Python language and it’s available on the GitHub platform for free.
Note: Make Sure You have Python Installed on your System, as this is a python-based tool. Click to check the Installation process: Python Installation Steps on Linux
Contact Us