Kanha
- A web-app pentesting suite written in rust π¦Installation
β¦Ύ
Subcommands
β¦Ύ
Features
β¦Ύ
Contribute

Kanha
is a tool that can help you perform, a variety of attacks based on the target domain . With just kanha
you can do, Fuzzing
, Reverse dns lookup
,
common http response
, subdomain takeover detection
and many more
.
The project is inspird by mini.nvim
, basically helping you to be productive with less numbers of tools(plugins) installed on your system and be unobtrusive and function as a standalone single binary
by out of the box.
Built from the ground up with performance, ease of use, and portability in mind in your favourite programming lang rust
π
π¦―Binary
You can directly download the binary of your arch and run it.
πΌ Source
bash
git clone --depth=1 https://github.com/pwnwriter/kanha --branch=main
cd kanha
cargo build --release
Then go to release
dir and ./kanha
or move the binary
to your any $PATH
for instant access from anywhere.
π Cargo
bash
cargo install kanha
Using binstall
bash
cargo binstall kanha
Note β οΈ This requires a working setup of rust/cargo & binstall.
π© METIS Linux
bash
sudo/doas pacman -Syyy kanha
β Status :- Just return the HTTP response code of URLs
π» Help
```bash $ kanha status -h
Just return the HTTP response code of URLs
Usage: kanha status [OPTIONS]
Options:
-f, --filename
π¦ Screenshots
β fuzz
:- Fuzz URLs and return the response codes
π» Help
```bash $ kanha fuzz -h Fuzz URLs and return the response codes
Usage: kanha fuzz [OPTIONS] --wordlist
Options:
-w, --wordlist π¦ Screenshots
β rdns
:- Reverse dns lookup
π» Help
```bash kanha rdns -h Reverse dns lookup
Usage: kanha rdns [OPTIONS] --filename
Options:
-f, --filename π¦ Screenshots
β Takeover
:- Check possible subdomain takeover
π» Help
```bash Check possible subdomain takeover
Usage: kanha takeover [OPTIONS] --json-file
Options:
-j, --json-file π¦ Screenshots
As always, this project is also licensed under the MIT LICENSE
Copyright © 2023 pwnwriter xyz βοΈ