Skip to main content

A2SV WEB HACKER

OVERVIEW:

A2SV stands for Auto Scanning to SSL Vulnerability. A2SV performs vulnerability scanning for CCS injection, Heartbleed, Logjam, Freak Attack, Anonymous Cipher, SSL v3 POODLE, SSL v2 Drown, and Crime (SPDY).

HOW TO INSTALL:

• Download(clone) & Unpack A2SV
$ git clone https://github.com/hahwul/a2sv.git
$ cd a2sv

• Install Python Package / OpenSSL
$ pip install argparse
$ pip install netaddr
$ apt-get install openssl

• Run A2SV
$ python a2sv.py -h

HOW TO USE:usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE] [-d DISPLAY] [-u] [-v]

OPTIONAL ARRGUMENTS:

-h, --help show this help message and exit
  -t TARGET, --target TARGET
Target URL and IP Address
 $ e.g -t 127.0.0.1
  -tf TARGETFILE, --targetfile TARGETFILE
Target file(list) URL and IP Address
 $ e.g -tf ./target.list
  -p PORT, --port PORT Custom Port / Default: 443
 $ e.g -p 8080
  -m MODULE, --module MODULE
Check SSL Vuln with one module
[anonymous]: Anonymous Cipher
[crime]: Crime(SPDY)
[heart]: HeartBleed
[ccs]: CCS Injection
[poodle]: SSLv3 POODLE
[freak]: OpenSSL FREAK
[logjam]: OpenSSL LOGJAM
[drown]: SSLv2 DROWN
 -d DISPLAY, --display DISPLAY
Display output
[Y,y] Show output
[N,n] Hide output
 -o OUT, --out OUT Result write to file
 $ e.g -o /home/yourdir/result.txt
 -u, --update Update A2SV (GIT)
 -v, --version Show Version

SCAN SSL:

 python a2sv.py -t 127.0.0.1
$ python a2sv.py -t 127.0.0.1 -m heartbleed
$ python a2sv.py -t 127.0.0.1 -d n
$ python a2sv.py -t 127.0.0.1 -p 8111
$ python a2sv.py -tf target_list.txt

UPDATE A2SV:

$ python a2sv.py -u
$ python a2sv.py --update



Comments

Popular posts from this blog

Proxy Generator Termux Tool by Python Leech Proxies and Return as List

  Proxy Generator Termux Tool by Python Leech Proxies and Return as List   Proxy Generator Termux Tool by Python Leech Proxies and Return as List πŸ”° ✅ Feature : -   ▫️ Proxy Leech at least 100 proxies to higher 400 - 600 proxies!   ▫️ Leech Proxy Socks4 , Socks5 , HTTP   ▫️ Fully Support , Easy ! πŸ”† Installing :- $  apt update && apt upgrade -y $ pkg install git -y $ pkg install python3 -y $ git clone https://github.com/BlackFoxTM/FoxProxyLeecher.git $ cd FoxProxyLeecher $ pip3 install pyfiglet requests $  python3 fox-proxy.py $ ls ☢️ Move Proxy txt File Your Mobile Storage :- $ cp <file name> /sdcard

Asus ROG Phone 8 Pro Edition Full Specification

  NETWORK Technology GSM / CDMA / HSPA / LTE / 5G LAUNCH Announced 2024, January 08 Status Available. Released 2024, January 18 BODY Dimensions 163.8 x 76.8 x 8.9 mm (6.45 x 3.02 x 0.35 in) Weight 225 g (7.94 oz) Build Glass front (Gorilla Glass Victus 2), glass back (Gorilla Glass), aluminum frame SIM Dual SIM (Nano-SIM, dual stand-by)   IP68 dust/water resistant (up to 1.5m for 30 min) 341 Mini-LED programmable matrix (on the back) Pressure sensitive zones (Gaming triggers) DISPLAY Type LTPO AMOLED, 1B colors, 165Hz, HDR10, 1600 nits (HBM), 2500 nits (peak) Size 6.78 inches, 111.0 cm 2  (~88.2% screen-to-body ratio) Resolution 1080 x 2400 pixels, 20:9 ratio (~388 ppi density) Protection Corning Gorilla Glass Victus 2   Always-On display PLATFORM OS Android 14 Chipset Qualcomm SM8650-AB Snapdragon 8 Gen 3 (4 nm) CPU Octa-core (1x3.3 GHz Cortex-X4 & 5x3.2 GHz Cortex-A720 & 2x2.3 GHz Cortex-A520) GPU Adreno 750 MEMORY Card slot No Internal 512GB 16GB RAM, 1TB ...

Paypal Scam 2024 Alart

Paypal Scam 2024 || Alart Be Aware   Paypal Scam 2024 PayPal scams continue to be a prevalent threat in 2024, targeting users through various deceptive tactics. These scams often involve phishing emails, fake promotional offers, advance payment schemes, and other fraudulent activities. Scammers use social engineering and sophisticated methods to trick individuals into revealing their personal and financial information, putting their accounts at risk. To avoid falling victim to these scams, it is essential to be cautious of any suspicious emails, texts, or calls, carefully review the communication for signs of fraud such as bad grammar, generic content, and fake links, and report any potential scams to the appropriate authorities. Additionally, it's important to verify the authenticity of any communication directly through official channels, such as the company's website or customer support. By staying informed and vigilant, users can protect themselves from falling prey to PayP...