WebRaptor is a comprehensive, professional-grade bug bounty automation tool that integrates 50+ security tools into a unified platform. It provides automated reconnaissance, vulnerability scanning, exploitation, and reporting capabilities for complete security assessments.
- Subdomain Enumeration: Advanced subdomain discovery using multiple sources
- Historical URL Discovery: Wayback Machine integration for historical data
- Port Scanning: Comprehensive port scanning with Nmap and Masscan
- Technology Detection: Web technology fingerprinting and identification
- DNS Enumeration: DNS reconnaissance and analysis
- Nuclei Integration: Template-based vulnerability scanning
- Nikto Integration: Web server vulnerability scanning
- SQLMap Integration: Automated SQL injection testing
- XSS Testing: Cross-site scripting vulnerability detection
- Custom Modules: Specialized vulnerability detection modules
- Directory Bruteforce: WFuzz, Dirb, Gobuster, FFuF
- Web Crawling: Katana, Unfurl, Qsreplace
- JavaScript Analysis: LinkFinder, SecretFinder, JSFinder
- Parameter Discovery: ParamSpider, Arjun
- WAF Detection: WAFW00F integration
- Predefined Workflows: 7 comprehensive automation pipelines
- Custom Workflows: Create and manage custom automation sequences
- Real-time Dashboard: Interactive monitoring and visualization
- Configuration Management: Secure API key and settings management
- HTML Reports: Comprehensive HTML reports with visualizations
- JSON Output: Machine-readable JSON reports
- Real-time Monitoring: Live dashboard with system metrics
- Export Capabilities: Multiple output formats
- Python 3.8+
- Git
- Go 1.19+ (for Go-based tools)
- Java 8+ (for Java-based tools)
- Node.js (for some tools)
# Clone the repository
git clone https://github.com/letchu_pkt/WebRaptor.git
cd WebRaptor
# Install Python dependencies
pip install -r requirements.txt
# Run WebRaptor
python main.py- Clone Repository
git clone https://github.com/letchu_pkt/WebRaptor.git
cd WebRaptor- Install Python Dependencies
pip install -r requirements.txt- Install System Dependencies
Ubuntu/Debian:
sudo apt update
sudo apt install -y nmap nikto dirb whatweb masscan
sudo apt install -y golang-go nodejs npmmacOS:
brew install nmap nikto dirb whatweb masscan
brew install go nodeWindows:
# Install using Chocolatey
choco install nmap nikto dirb whatweb masscan
choco install golang nodejs- Install Go-based Tools
# Install Go tools
go install github.com/tomnomnom/waybackurls@latest
go install github.com/lc/gau@latest
go install github.com/tomnomnom/assetfinder@latest
go install github.com/projectdiscovery/subfinder@latest
go install github.com/projectdiscovery/httpx@latest
go install github.com/projectdiscovery/nuclei@latest
go install github.com/projectdiscovery/katana@latest
go install github.com/projectdiscovery/dnsx@latest
go install github.com/projectdiscovery/shuffledns@latest
go install github.com/projectdiscovery/chaos-client@latest
go install github.com/tomnomnom/unfurl@latest
go install github.com/tomnomnom/qsreplace@latest
go install github.com/ffuf/ffuf@latest
go install github.com/OJ/gobuster@latest- Install Python Tools
pip install sqlmap wfuzz wafw00f dnsrecon theharvester sublist3r knockpy arjunpython main.pyset target example.comtools installautorun report# Set target
set target <url>
# Show available modules
show modules
# Run a specific module
run <module_name>
# Run workflow
workflow <workflow_name>
# Show tool status
tools status
# Install tools
tools install
# Configure settings
configure
# Show help
helpadvanced_subenum- Advanced subdomain enumerationwaybackurls_scanner- Historical URL discoveryportscan- Port scanning and service detectiontech_detect- Technology detection and fingerprinting
nuclei_scanner- Template-based vulnerability scanningnikto_scanner- Web server vulnerability scanningsqlmap_scanner- SQL injection testingxss- Cross-site scripting testingspli- SQL injection testing
advanced_tools- Comprehensive tool integrationscreenshot- Screenshot capturereport- Report generation
Complete reconnaissance using all available tools:
- Subdomain enumeration
- Historical URL discovery
- Port scanning
- Technology detection
- Directory bruteforce
- Vulnerability scanning
Complete bug bounty automation:
- Subdomain discovery
- Historical URL analysis
- Port scanning
- Web crawling
- Technology fingerprinting
- Vulnerability scanning
- SQL injection testing
- XSS testing
- Report generation
Low-profile scanning to avoid detection:
- Passive subdomain enumeration
- Historical URL analysis
- Light port scanning
- Technology detection
Focused web application security testing:
- Technology detection
- Directory bruteforce
- Parameter discovery
- Vulnerability scanning
- SQL injection testing
- XSS testing
- Screenshot capture
API endpoint discovery and security testing:
- API endpoint discovery
- Parameter analysis
- Vulnerability scanning
- SQL injection testing
Infrastructure and network security assessment:
- Subdomain enumeration
- Port scanning
- Service detection
- Vulnerability scanning
Complete security assessment using all available tools:
- All reconnaissance steps
- All vulnerability scanning
- All testing phases
- Complete reporting
run dashboard- Real-time monitoring
- System performance metrics
- Live scan statistics
- Interactive controls
configure api-keys # Configure API keys
configure tools # Configure tool settings
configure profiles # Manage scan profiles
configure show # Show current configurationtools install # Install all tools
tools install <tool> # Install specific tool
tools status # Show tool status
tools list # List available toolsAll results are stored in the output/ directory with the following structure:
output/
βββ reports/ # Generated reports
β βββ html/ # HTML reports
β βββ json/ # JSON reports
β βββ pdf/ # PDF reports (if enabled)
βββ scans/ # Scan results
β βββ subdomain/ # Subdomain enumeration results
β βββ waybackurls/ # Historical URL results
β βββ nuclei/ # Nuclei scan results
β βββ nikto/ # Nikto scan results
β βββ sqlmap/ # SQLMap scan results
β βββ advanced_tools/ # Advanced tools results
βββ logs/ # Application logs
β βββ webraptor.log # Main application log
β βββ errors.log # Error logs
β βββ debug.log # Debug logs
βββ config/ # Configuration files
β βββ webraptor_config.json
β βββ secrets.encrypted
β βββ templates/
βββ wordlists/ # Wordlists
β βββ subdomains.txt
β βββ directories.txt
β βββ passwords.txt
βββ tools/ # Installed tools
β βββ sqlmap/
β βββ nuclei/
β βββ ...
βββ temp/ # Temporary files
βββ scans/
βββ downloads/
WebRaptor supports multiple API services for enhanced reconnaissance:
configure api-keysSupported Services:
- Shodan - Internet-connected device search
- VirusTotal - Malware and URL analysis
- SecurityTrails - DNS and domain intelligence
- Censys - Internet-wide scanning
- GitHub - Code repository search
configure toolsConfigurable Parameters:
- Timeout settings
- Thread counts
- Output formats
- Custom flags
- Rate limiting
configure profilesAvailable Profiles:
- Quick - Fast scanning (5 minutes)
- Comprehensive - Complete scanning (30 minutes)
- Stealth - Low-profile scanning (60 minutes)
- API keys encrypted with master password
- Secure configuration management
- Encrypted secrets storage
- Configurable rate limits for all tools
- API rate limiting
- Request throttling
- Comprehensive error logging
- Graceful failure handling
- Recovery mechanisms
- Interactive visualizations
- Charts and graphs
- Detailed findings
- Recommendations
- Machine-readable format
- API integration ready
- Structured data
- Live monitoring
- System metrics
- Progress tracking
- Interactive controls
- Nmap, Masscan, Zmap
- Subfinder, Amass, Assetfinder
- Findomain, Chaos, ShuffleDNS
- DNSx, DNSRecon, TheHarvester
- Sublist3r, Knockpy
- Nuclei, Nikto, SQLMap
- WFuzz, Dirb, Gobuster, FFuF
- WhatWeb, WAFW00F
- LinkFinder, SecretFinder, JSFinder
- ParamSpider, Arjun
- Katana, Unfurl, Qsreplace
- WaybackURLs, GAU
- Screenshot capture
- OWASP ZAP, Burp Suite
- Custom vulnerability modules
- XSS, SQL injection testing
# Check tool status
tools status
# Reinstall specific tool
tools install <tool_name>
# Check system requirements
tools check-requirements# Fix permissions
chmod +x tools/*
# Run with sudo if needed
sudo python main.py# Reconfigure API keys
configure api-keys
# Check API key status
configure show api-keys# Reduce thread count
configure tools
# Use stealth scan profile
workflow stealth_scan- Check
output/logs/webraptor.logfor general issues - Check
output/logs/errors.logfor error details - Check
output/logs/debug.logfor debugging information
We welcome contributions! Please see our Contributing Guidelines for details.
# Fork the repository
git clone https://github.com/your-username/WebRaptor.git
cd WebRaptor
# Install development dependencies
pip install -r requirements-dev.txt
# Run tests
python -m pytest tests/
# Run linting
python -m flake8This project is licensed under the MIT License - see the LICENSE file for details.
- ProjectDiscovery - For amazing security tools
- OWASP - For security testing methodologies
- Bug Bounty Community - For feedback and contributions
- Open Source Community - For the amazing tools we integrate
- Documentation: Wiki
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Email: letchupkt.dev@gmail.com
- GitHub: https://github.com/letchu_pkt/WebRaptor
- Website: https://letchupkt.vgrow.tech
- LinkedIn: https://linkedin.com/in/lakshmikanthank
- Instagram: https://instagram.com/letchu_pkt
Made with β€οΈ by LakshmikanthanK