Happy New Year hackers !!!
A few days ago we released secator
on GitHub, which is a new CLI aimed at improving productivity for pentesters.
https://github.com/freelabz/secator
secator
is a Python-based swiss-knife tool that standardizes input / output for many recon (& others) tools that you use daily, like ffuf
, subfinder
, nmap
, nuclei
, … and many others. Input options are mutualized amongst tools of the same category, and the output format is always structured: JSON lines, JSON, CSV, Google Sheets, you can pick.
secator
is also a workflow automator: we have a set of out-of-the-box workflows that you can use (run secator w
to list them); and you can write custom workflows as well in YAML format.
I recommend you give it a try (pip install secator
) and let us know your feedback and questions below this post.
Cheers !
I just gave secator a spin, and I’m absolutely blown away! The speed of vulnerability scans is off the charts (especially when using distributed mode and multiple workers), and the included workflows are well-written and game-changing. I like how I can keep my work organized and save results to MongoDB for further explorations with advanced queries and so on… Really kudos to the team at Freelabz for this awesome tool. I feel like it’s about to become my new best friend for bug bounties and customer engagements!
Glad you liked it and found it useful ! This is exactly our goal ;) Feel free to file issues / pull requests on the GitHub repo too !
Secator stands out not only for its ability to identify and address security vulnerabilities but also for the team’s responsiveness and availability. The software’s user-friendly interface and robust capabilities make it a crucial asset for protecting digital systems. Highly recommended for its efficiency, comprehensive solutions, and excellent support. Thanks for all !
Very interesting that 4 people post comments that read like ads for that tool have exactly that one comment.