h0tak88r/AutoAR
GitHub: h0tak88r/AutoAR
一个用 Go 实现的自动化安全侦察与漏洞挖掘平台,集成子域名枚举、漏洞扫描与 AI 分析,为赏金猎人提供端到端的工作流。
Stars: 67 | Forks: 20
# AutoAR — 自动化攻击与侦察平台
**终极漏洞赏金自动化框架。更智能扫描,发现更多,更快交付。**
[Go](https://golang.org/)
[License](LICENSE)
[Discord](https://discord.com)
AutoAR 是一个用 Go 构建的强大端到端自动化安全侦察与漏洞挖掘平台。它专为 **漏洞赏金猎人** 和 **渗透测试人员** 设计,旨在自动化全链路侦察到报告流程——无论是大规模子域名枚举、DNS 接管检测、Nuclei 扫描、JavaScript 密钥提取、GitHub 暴露、移动应用分析,还是更多。
结果会自动上传至 **Cloudflare R2 存储**,并直接关联输出内容,无需手动遍历目录查找。
**公共 VPS / 仪表盘:** 配置基于 Supabase 的登录与 JWT 验证以支持 HTTP API——详见 [docs/DASHBOARD_AUTH.md](docs/DASHBOARD_AUTH.md)。
## ✨ 功能亮点
| 类别 | AutoAR 的功能 |
| ------------------- | -------------------------------------------------------------------------------------------------------------------------------------- |
| 🌐 **子域名** | 通过 15+ 来源枚举:Subfinder、CertSpotter、SecurityTrails、Chaos、crt.sh、OTX、VirusTotal 等 |
| 🔍 **活跃主机** | 使用 httpx 检测存活主机,支持重定向跟踪与状态识别 |
| 🕳️ **DNS 接管** | 检测 CNAME、NS、Azure/AWS 云、DNSReaper、悬空 IP 以及 **CF-1016 Cloudflare 悬空记录** 漏洞 |
| 💥 **Nuclei 扫描** | 基于 Nuclei 模板的自动化漏洞扫描,支持速率限制 |
| 🧠 **零日** | 针对检测到的技术栈进行智能扫描,查找活跃的 CVE |
| ☁️ **S3 存储桶** | 枚举并扫描 AWS S3 存储桶的暴露与错误配置 |
| 🔗 **JavaScript** | 从 JS 文件中提取密钥、API 端点、认证令牌 |
| 🐙 **GitHub 侦察** | 组织级与仓库级扫描,查找密钥与依赖混淆 |
| 📱 **移动应用** | 使用 MobSF 分析 APK/IPA,并支持 MITM 流量拦截 |
| ⚙️ **错误配置** | 超过 100 项服务错误配置检查 |
| 🏴☠️ **目标范围** | 从 HackerOne、Bugcrowd、Intigriti、YesWeHack(令牌)、Immunefi 获取范围——支持 CLI 与 **仪表盘 Targets 页面** |
| 🔄 **监控** | 子域名与 URL 变更监控守护进程,支持 Discord 告警与数据库历史记录 |
| 🤖 **AI 代理** | 完整的 AI 狩猎闭环(CLI + Discord `/ai` 与 `/brain`)——由 **Step-3.5 Flash(通过 OpenRouter,免费层级)** 驱动,无需任何费用 |
| 📤 **R2 存储** | 自动将每个非空结果文件上传至 Cloudflare R2 并打印公开 URL |
| 🔔 **智能告警** | 针对零命中扫描的丰富 Discord 通知,避免空文件与垃圾信息 |
| 🖥️ **Web 仪表盘** | **v4.0+** — 统计、扫描、域名、监控、R2 浏览器、Targets 页面(BB 范围获取)、重新扫描按钮、结构化 CF-1016 结果 |
## 🗂️ 完整命令参考
### 工作流(从这里开始)
```
autoar domain run -d Full end-to-end workflow: subdomains → live hosts → ports →
[--skip-ffuf] tech → DNS → S3 → nuclei → JS → URLs → GF → backup → misconfig
autoar subdomain run -s Focused deep-dive on a single subdomain:
live check → ports → JS → vuln scan → nuclei
autoar lite run -d Lighter workflow: livehosts → reflection → JS → CNAME → DNS → misconfig
[--skip-js] Skip JavaScript scanning
[--phase-timeout] Set default phase timeout in seconds
[--timeout-] Specific overrides (e.g. --timeout-livehosts)
autoar fastlook run -d Quick recon: subdomains → live hosts → URLs/JS collection
autoar asr -d High-depth reconnaissance (ASR Modes)
[-mode 1-5] Recon mode (default: 5)
[-t ] Number of threads
```
### 侦察
```
autoar subdomains get -d Enumerate subdomains (15+ passive sources + Subfinder)
autoar livehosts get -d Detect live hosts via httpx
autoar cnames get -d Collect all CNAME records
autoar urls collect -d Collect URLs (Wayback, gau, katana)
[--subdomain] Focus on specific subdomain URLs
autoar tech detect -d Detect web technologies (Wappalyzer, headers)
autoar ports scan -d Port scan with naabu
```
### 漏洞扫描
```
autoar nuclei run -d Run Nuclei templates on all live hosts
autoar zerodays scan -d Smart CVE scanning based on detected tech
-s Scan a specific subdomain
-f Scan domains from a file
[--cve ] Target a specific CVE
[--dos-test] Include DoS checks (use on your own targets only)
[--silent] Output only vulnerable hosts
autoar reflection scan -d Scan for XSS/injection reflection points
autoar dalfox run -d Advanced XSS scanning with Dalfox
autoar sqlmap run -d SQL injection testing with SQLMap
autoar gf scan -d Grep for interesting patterns (SQLi, SSTI, LFI, etc.)
autoar jwt scan --token Analyze JWT tokens for vulnerabilities
[--skip-crack]
[--test-attacks]
[-w ]
```
### DNS 接管检测
```
autoar dns takeover -d Comprehensive DNS takeover scan (all methods)
[-s ] Target a single subdomain directly (skips enumeration)
autoar dns cname -d CNAME takeover detection
autoar dns ns -d Nameserver takeover detection
autoar dns azure-aws -d Azure/AWS cloud service takeover
autoar dns dnsreaper -d DNSReaper-based detection
autoar dns dangling-ip -d Dangling IP detection
autoar dns cf1016 -d Cloudflare 1016 Dangling DNS — auto-enumerates subdomains,
then scans all for CF-1016 dangling records.
Saves structured JSON findings + writes live status to DB.
-s Scan a single subdomain directly
-l Scan subdomains from a file
autoar dns all -d Run all DNS checks simultaneously
```
### JavaScript 扫描
```
autoar js scan -d Scan all JS files for secrets and endpoints
[-s ] Scope to a specific subdomain's JS
```
### 模糊测试(FFUF)
```
autoar ffuf fuzz -u Fuzz a URL (must contain FUZZ placeholder)
-d Fuzz all live hosts for a domain
[-w ] Custom wordlist (default: Wordlists/quick_fuzz.txt)
[-t ] Thread count
[--bypass-403] Attempt 403 bypass techniques
[--recursion] Recursive fuzzing
[-e ] File extensions to fuzz
[--header ] Custom headers
```
### 备份文件发现
```
autoar backup scan -d Hunt for exposed backup files on a domain
-l Scan from a file of live hosts
-f Scan from a file of domains
[-m ] Methods: regular, withoutdots, withoutvowels,
reverse, mixed, withoutdv, shuffle, all
[-ex .zip,.rar] Specific extensions to hunt
[-t ] Thread count
```
### S3 存储桶狩猎与云存储
```
autoar s3 enum -b Generate and check S3 bucket name permutations
autoar s3 scan -b Scan a specific bucket for access
[-r ] AWS region
```
### GitHub 侦察
```
autoar github scan -r Scan a single repository for secrets
autoar github org -o Full org-level scan (all repos)
[-m ] Limit number of repos scanned
autoar github depconfusion -r Check for dependency confusion
autoar github experimental -r Deep experimental analysis
autoar github-wordlist scan -o Build wordlist from org's codebase
```
### 错误配置检测
```
autoar misconfig scan Scan for common misconfigurations (100+ checks)
[--service ] Test a specific service
[--delay ] Request delay
[--permutations] Include path permutations
autoar misconfig service Test a single service
autoar misconfig list List all available service checks
autoar misconfig update Update built-in templates
```
### API 密钥验证
```
autoar keyhack list List all API key validation templates
autoar keyhack search Search for a specific provider
autoar keyhack validate Generate validation command for an API key
autoar keyhack add Add a custom validation template
```
### Adobe Experience Manager(AEM)
```
autoar aem scan -d Detect AEM instances and test vulnerabilities
-l Scan from a file
[--ssrf-host ] SSRF callback host
[--proxy ] HTTP proxy
```
### 移动应用分析(APKx)
```
autoar apkx scan -i Analyze an APK or IPA file
-p Download and scan by package ID
[--platform android|ios]
[--mitm] Set up MITM proxy interception
autoar apkx mitm -i Patch APK for MITM traffic analysis
```
### 依赖混淆
```
autoar depconfusion scan Scan a local dependency file
autoar depconfusion github repo Scan a GitHub repo's dependencies
autoar depconfusion github org Scan all repos in a GitHub org
autoar depconfusion web [url2...] Scan web targets
autoar depconfusion web-file Scan targets listed in a file
autoar wpDepConf scan -d WordPress plugin dependency confusion
-l
```
### 漏洞赏金平台范围获取
**CLI:**
```
autoar scope -p h1 -u -t HackerOne
autoar scope -p bc -t Bugcrowd
autoar scope -p it -t Intigriti
autoar scope -p ywh -t YesWeHack (JWT token — no email/password needed)
autoar scope -p immunefi Immunefi (no auth required)
Options:
--bbp-only Only programs offering monetary rewards
--pvt-only Only private programs
--active-only Only active programs
--extract-roots Extract root domains (default: true)
-o
标签:AI技术分析, Cloudflare R2, DNS接管检测, EVTX分析, GitHub映射, Go语言, HTTP API, JWT验证, Nuclei扫描, PB级数据处理, SEO词:侦察平台, SEO词:漏洞猎手工具, SEO词:自动化攻击平台, Supabase认证, 子域名枚举, 安全运维, 开源安全工具, 技术栈探测, 数据统计, 日志审计, 测试用例, 程序破解, 端口扫描, 系统安全, 自动化安全侦察, 请求拦截, 逆向工程平台