Crates.io | rprobe |
lib.rs | rprobe |
version | |
source | src |
created_at | 2022-09-10 15:53:54.189043+00 |
updated_at | 2025-04-16 04:03:13.91468+00 |
description | A simple tool to probe a remote host http or https connection |
homepage | https://github.com/vschwaberow/rprobe.git |
repository | https://github.com/vschwaberow/rprobe.git |
max_upload_size | |
id | 662571 |
Cargo.toml error: | TOML parse error at line 18, column 1 | 18 | autolib = false | ^^^^^^^ unknown field `autolib`, expected one of `name`, `version`, `edition`, `authors`, `description`, `readme`, `license`, `repository`, `homepage`, `documentation`, `build`, `resolver`, `links`, `default-run`, `default_dash_run`, `rust-version`, `rust_dash_version`, `rust_version`, `license-file`, `license_dash_file`, `license_file`, `licenseFile`, `license_capital_file`, `forced-target`, `forced_dash_target`, `autobins`, `autotests`, `autoexamples`, `autobenches`, `publish`, `metadata`, `keywords`, `categories`, `exclude`, `include` |
size | 0 |
A powerful tool for web reconnaissance that probes for HTTP and HTTPS services, identifies web technologies, analyzes content for sensitive information, examines TLS certificates, and provides comprehensive scan reports.
Always scan your own assets, or the assets you are allowed to scan.
cargo install rprobe
git clone https://github.com/vschwaberow/rprobe.git
cd rprobe
cargo build --release
The binary will be available at target/release/rprobe
.
# Scan from stdin (one URL per line)
cat domains.txt | rprobe
# Scan from a file with 10 concurrent workers
rprobe -i domains.txt -w 10
# Scan with technology detection enabled
rprobe -i domains.txt -d
# Full reconnaissance with content analysis, TLS analysis and screenshots
rprobe -i targets.txt -d --content-analysis --tls-analysis --screenshot -w 20 -r 5
# Perform comprehensive TLS analysis (requires testssl.sh or nmap)
rprobe -i targets.txt --comprehensive-tls
# Security focused scan with output to all formats
rprobe -i sensitive_targets.txt -d --content-analysis --tls-analysis --html --csv
rprobe --help
rprobe (c) 2022-2025 by Volker Schwaberow <volker@schwaberow.de>
A simple tool to probe a remote host http or https connection
Usage: rprobe [OPTIONS]
Options:
-t, --timeout <TIMEOUT> [default: 10]
-n, --nohttp Disable HTTP probing
-N, --nohttps Disable HTTPS probing
-S, --show-unresponsive Show unresponsive hosts in output
-s, --suppress-stats Don't show statistics at the end
-d, --detect-all Detect technologies on all hosts
-p, --plugins List available detection plugins
-r, --rate-limit <RATE_LIMIT> Requests per second [default: 10]
-w, --workers <WORKERS> Number of concurrent workers [default: 10]
--plugin <PLUGIN> Specify a plugin to use
--report-format <REPORT_FORMAT> Format for main report [default: text]
--report-filename <REPORT_FILENAME> Custom filename for main report
--download-robots Download robots.txt files
-i, --input-file <INPUT_FILE> Read targets from file instead of stdin
-o, --output-dir <OUTPUT_DIR> Directory to store scan results [default: scan]
--log-level <LOG_LEVEL> Set log level (error, warn, info, debug, trace) [default: info]
--screenshot Take screenshots of responsive sites
--resume-file <RESUME_FILE> Save/resume scan state to/from this file
--csv Export results to CSV format
--html Export results to HTML report
--content-analysis Analyze page content for sensitive information
--tls-analysis Analyze TLS certificates for HTTPS sites
--comprehensive-tls Perform comprehensive TLS analysis (requires external tools)
-h, --help Print help
-V, --version Print version
By default, rprobe creates a scan
directory with the following structure:
scan/
├── headers/ # HTTP response headers
├── html/ # Response body content
├── robots/ # robots.txt files (if enabled)
├── screenshots/ # Screenshots (if enabled)
├── content_analysis/ # Content analysis reports
│ ├── content_findings.html # Detailed HTML report of content findings
│ └── content_findings.csv # CSV export of all findings
├── tls_analysis/ # TLS certificate analysis
│ ├── certificate_analysis.html # Detailed certificate information
│ └── certificate_analysis.csv # CSV export of certificate data
├── index.txt # Index of all scanned sites
├── report_output.txt # Main report
├── report_output.csv # CSV report (if enabled)
└── report_output.html # HTML report (if enabled)
The content analysis feature scans webpage content for:
Findings are classified by severity level:
The TLS analysis examines HTTPS certificates for security issues:
The comprehensive TLS analysis (requires external tools like testssl.sh or nmap) can detect:
rprobe includes several technology detection plugins:
List all available plugins with:
rprobe -p
For full functionality, rprobe can leverage these external tools if available:
--screenshot
)--tls-analysis
)--comprehensive-tls
)--comprehensive-tls
)None of these are required for basic operation - rprobe will gracefully handle their absence.
Basic scan with HTML report:
cat domains.txt | rprobe --html
Security assessment scan:
rprobe -i targets.txt -d --content-analysis --tls-analysis -w 20 -r 5
Full reconnaissance with all features:
rprobe -i targets.txt -d --content-analysis --tls-analysis --comprehensive-tls --screenshot --html --csv
Resume a previous scan:
rprobe -i large_target_list.txt --resume-file myscan.state --content-analysis
Specific technology detection:
rprobe -i domains.txt --plugin "WordPress"
Contributions are welcome! Please feel free to submit a Pull Request.
src/plugins/
Plugin
traitsrc/plugins/mod.rs
To add new detection patterns for sensitive content:
src/content_analyzer.rs
This project is licensed under either the MIT License or Apache License 2.0, at your option.