Skip to content

A state-aware web reconnaissance engine for modern, JS-heavy applications

License

Notifications You must be signed in to change notification settings

pilloverx/NETBEAR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

NetBear 🐻 - Complete Web Reconnaissance & Vulnerability Scanner

A comprehensive security testing framework for bug bounty hunters and penetration testers.

Python 3.8+ License Nuclei v3.x


✨ Features

Web Crawling - Depth-limited, scope-aware page discovery with Playwright
JavaScript Analysis - Extract APIs, endpoints, and security patterns from JS
API Endpoint Discovery - Automatic extraction with intelligent noise filtering
Vulnerability Scanning - Nuclei integration for API testing (exposure, auth bypass, IDOR)
Multi-format Export - HAR (Burp), cURL, JSON, screenshots, Playwright traces
Authenticated Testing - Built-in login flow support and HAR file extraction
Real-time Scanning - See progress as vulnerabilities are discovered


🚀 Quick Start (5 Minutes)

Installation

# 1. Clone repository
git clone https://github.com/pilloverx/NETBEAR.git
cd NETBEAR

# 2. Setup Python environment
python -m venv venv
source venv/bin/activate          # Windows: venv\Scripts\activate

# 3. Install dependencies
pip install -r requirements.txt
playwright install

# 4. Install Nuclei (vulnerability scanner - REQUIRED)
go install -v github.com/projectdiscovery/nuclei/v3/cmd/nuclei@latest

# 5. Verify
nuclei -version  # Should show v3.x.x

First Scan

# Create targets
echo "https://example.com" > targets.txt
echo "example.com" > scopes.txt

# Run scan (auto-runs Nuclei)
python netbear_crawler.py

# View results
cat reports/run_*/nuclei_output_*/nuclei_results.txt

📖 Complete Documentation


📊 How It Works

URLs (targets.txt)
    ↓
Crawl (Playwright) → Extract links, forms, JavaScript
    ↓
Analyze → Find API endpoints, auth patterns
    ↓
Filter & Normalize → Remove noise, deduplicate
    ↓
Nuclei Scan → Check for vulnerabilities
    ↓
Reports → Vulnerabilities found + tested endpoints

What It Detects

Vulnerability Template Detection
API Exposure netbear-api-exposure-direct.yaml API keys, secrets, tokens
Auth Bypass netbear-auth-bypass-direct.yaml Unauthenticated access
IDOR netbear-idor-direct.yaml Broken authorization

🖼️ Screenshots

NETBEAR Crawler Operation

Deep Crawling
Validating templates before scanning

Nuclei EndPoint Extrction
Download Nuclei from GitHub releases

Nuclei Setup

JS Files
Template validation

Scan Results

Curl Exports
Real-time vulnerability discovery


⚙️ Configuration

Key settings in config.py:

NETBEAR_MAX_DEPTH = 2              # Crawl depth (1-3)
NETBEAR_MAX_PAGES_PER_DOMAIN = 15  # Pages per domain
NETBEAR_RATE_LIMIT_SEC = 1.5       # Delay between requests
NUCLEI_ENABLED = True              # Enable scanning
NUCLEI_TIMEOUT = 1800              # 30 minutes
NUCLEI_SEVERITY = "high,critical"  # Minimum severity

📋 Result Files

reports/run_TIMESTAMP/
├── domain_com/
│   ├── report.txt                    # Crawl summary
│   ├── nuclei_targets_clean.txt      # Tested endpoints
│   └── js_structures.json            # Extracted APIs
├── nuclei_output_TIMESTAMP/
│   ├── nuclei_results.txt            # ⭐ Vulnerabilities found
│   ├── nuclei_results.json           # Machine format
│   └── nuclei_*.log                  # Scan logs
└── exports/
    ├── domain.har                    # Burp Suite import
    └── domain_requests.curl          # Replay commands

🔧 Troubleshooting

Nuclei Not Found

export PATH=$PATH:~/go/bin
nuclei -version

Scan Stalls

# Increase timeout in config.py
NUCLEI_TIMEOUT = 3600  # 60 minutes

More Issues?

See COMPLETE_GUIDE.md - Troubleshooting section.


⚖️ Legal Notice

⚠️ Only test systems you own or have written permission to test.

  • Use scopes.txt to prevent out-of-scope scanning
  • Increase rate limits for stealth on production systems
  • Store results securely (contains sensitive data)

📄 License

MIT License - See LICENSE


→ Start with QUICKSTART.md

About

A state-aware web reconnaissance engine for modern, JS-heavy applications

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published