![Go version](https://img.shields.io/github/go-mod/go-version/dropalldatabases/sif?style=flat-square) [![Go Report Card](https://goreportcard.com/badge/github.com/dropalldatabases/sif?style=flat-square)](https://goreportcard.com/report/github.com/dropalldatabases/sif) [![Version](https://img.shields.io/github/v/tag/dropalldatabases/sif?style=flat-square)](https://github.com/dropalldatabases/sif/tags) [![All Contributors](https://img.shields.io/github/all-contributors/lunchcat/sif?color=ee8449&style=flat-square)](#contributors) [![Discord](https://discordapp.com/api/guilds/1202922721969705010/widget.png?style=banner2)](https://discord.gg/w6HuE8puuX)
## 📖 Table of Contents - [Modules](#-modules) - [Installation](#-installation) - [Quick Start](#-quick-start) - [Usage](#-usage) - [Performance](#-performance) - [Contributing](#-contributing) - [Contributors](#-contributors) - [Acknowledgements](#-acknowledgements) ## 🧩 Modules sif is built with a modular architecture, allowing for easy extension and customization. Some of our key modules include: - 📂 Directory/file fuzzing/scanning - 📡 DNS subdomain enumeration - 🐾 Common Web scanning - 🖥️ Port/service scanning - 🦠 Vulnerability scanning - Support for pre-existing nuclei templates - Metasploit emulation for execution - 🔎 Automated Google dorking - 💘 Shodan integration - 📦 CMS detection - 🔍 HTTP Header Analysis - ☁️ C3 Misconfiguration Scanner - 🔍 Subdomain Takeover Checks ## 📦 Installation ### Using pre-built binaries Visit our [Releases](https://github.com/dropalldatabases/sif/releases) page to download the latest pre-built binary for your operating system. ### Building from source 1. Ensure you have Go 1.23+ installed on your system. 2. Clone the repository: ``` git clone https://github.com/lunchcat/sif.git cd sif ``` 3. Build using the Makefile: ``` make ``` 4. The binary will be available in the root directory. ## 🚀 Quick Start 1. Run a basic scan: ``` ./sif -u example.com ``` 2. For more options and advanced usage, refer to the help command: ``` ./sif -h ``` ## 🛠 Usage sif offers a wide range of commands and options to customize your pentesting workflow. Here are some common usage examples: - Directory fuzzing ``` ./sif -u http://example.com -dirlist medium ``` - Subdomain enumeration ``` ./sif -u http://example.com -dnslist medium ``` - Supabase/Firebase and C3 Vulnerability scanning ``` ./sif -u https://example.com -js -c3 ``` - Port scanning ``` ./sif -u https://example.com -ports common ``` For a complete list of commands and options, run `./sif -h`. ## ⚡ Performance sif is designed for high performance and efficiency: - Written in Go for excellent concurrency and speed - Optimized algorithms for minimal resource usage - Supports multi-threading for faster scans - Efficient caching mechanisms to reduce redundant operations ## 🤝 Contributing We welcome contributions from the community! Please read our [Contributing Guidelines](CONTRIBUTING.md) before submitting a pull request. Areas we're particularly interested in: - New scanning modules - Performance improvements - Documentation enhancements - Bug fixes and error handling improvements ## 🌟 Contributors Thanks to these wonderful people who have contributed to sif:
mel
mel

🚧 🧑‍🏫 📆 🛡️ ⚠️ 💼 💻 🎨 💵 🤔
ProjectDiscovery
ProjectDiscovery

📦
macdoos
macdoos

💻
Matthieu Witrowiez
Matthieu Witrowiez

🤔
tessa
tessa

🚇 💬 📓
Eva
Eva

📝 🖋 🔬 🛡️ ⚠️ 💻
## 🙏 Acknowledgements We'd like to thank the following projects and communities for their inspiration and support: - [ProjectDiscovery](https://projectdiscovery.io/) for their amazing open-source security tools - [Shodan](https://www.shodan.io/) - [Malcore](https://www.malcore.io/), for providing us direct API support at Lunchcat. ---
Happy Hunting! 🐾

Built with ❤️ by the lunchcat team and contributors worldwide