Files
PentestPilot/bin/web/tech_detect.sh
PentestPilot Bot 461c14d676 feat: bootstrap PentestPilot toolkit, docs, and orchestrators
Initial commit of PentestPilot — AI‑assisted pentest recon and orchestration toolkit.\n\nHighlights:\n- Resumeable pipelines (full_pipeline) with manifest state and elapsed timings\n- Rich dashboard (colors, severity bars, durations, compact/json modes)\n- Web helpers: httpx→nuclei auto, tech routing + quick scanners\n- Agents: multi‑task orchestrator (web/full/ad/notes/post) with resume\n- AD/SMB, password utils, shells, transfer, privesc, tunnels\n- QoL scripts: proxy toggle, cleanup, tmux init, URL extractor\n- Docs: README (Quick Start + Docs Index), HOWTO (deep guide), TOOLKIT (catalog with examples)\n\nStructure:\n- bin/automation: pipelines, dashboard, manifest, resume, tech_actions\n- bin/web: routing, scanners, helpers\n- bin/ai: orchestrators + robust AI utils\n- bin/ad, bin/passwords, bin/shells, bin/transfer, bin/privesc, bin/misc, bin/dns, bin/scan, bin/windows, bin/hashes\n- HOWTO.md and TOOLKIT.md cross‑linked with examples\n\nUse:\n- settarget <target>; agent full <domain|hosts.txt>; dashboard --compact\n- See HOWTO.md for setup, semantics, and examples.
2025-10-08 16:00:22 +02:00

23 lines
765 B
Bash
Executable File

#!/usr/bin/env bash
set -euo pipefail
url=${1:-}
[[ -z "$url" ]] && { echo "Usage: $(basename "$0") <url>" >&2; exit 1; }
echo "[+] GET $url"
headers=$(curl -skI -m 8 "$url" || true)
echo "$headers"
srv=$(echo "$headers" | awk -F': ' 'tolower($1)=="server"{print $2}' | tr -d '\r')
pow=$(echo "$headers" | awk -F': ' 'tolower($1)=="x-powered-by"{print $2}' | tr -d '\r')
echo "[+] Server: ${srv:-unknown}"
echo "[+] X-Powered-By: ${pow:-unknown}"
body=$(curl -sk -m 8 "$url" | head -c 4096 || true)
[[ "$body" =~ wordpress ]] && echo "[+] Detected: WordPress" || true
[[ "$body" =~ Joomla ]] && echo "[+] Detected: Joomla" || true
[[ "$body" =~ Drupal ]] && echo "[+] Detected: Drupal" || true
[[ "$body" =~ Laravel ]] && echo "[+] Detected: Laravel" || true