Parth
What is the purpose of Parth?
Parth tool is an open source tool. Parth python language-based tool that can discover URLs to find parameters names and the vulnerabilities or risks commonly associated with them.
Here are the primary uses of Parth:
-
Network Security: Parth is often used to analyze and assess web security. Parth can help in identifying vulnerabilities and weaknesses in the target system's network configurations.
-
Web Application Security: It is mainly used for testing web applications for the presence of vulnerabilities. This includes the following: web application common vulnerability detection, including SQL injection and cross-site scripting, and other vulnerabilities.
-
Penetration Testing: Parth is a tool used in penetration testing or bug bounty programs, where security professionals aim to reveal security vulnerabilities by simulating an attack against a system or network.
-
Vulnerability Assessment: Parth assists in the vulnerability assessment of a network and a web application, thereby providing information about potential risks and enabling their remediation.
-
Security Research: Parth, güncel zafiyetleri test etmek, yeni güvenlik teknikleri geliştirmek ve yeni güvenlik araçlarını test etmek için güvenlik uzmanları tarafından etkili bir şekilde kullanılabilir. Parth, diğer araçlarla birlikte entegrasyona uygundur.
Core Features
- Vulnerability Scanning
- Exploit Testing
- Security Assessment
- Bug Bounty Integration
- Customizable Testing
- Automated Reporting
- Integration with Other Tools
Data sources:
- Public Vulnerability Databases
- Security Advisories and Bulletins
- Exploit Databases
- Open Source Intelligence (OSINT)
- Web Application Fingerprints
- Network Scanning Results
- Threat Intelligence Feeds
Common Parth Commands
1. Basic Usage
- This command will initiate a security scan of the target URL. This will help in finding vulnerabilities that may be present in the target system.
parth scan https://example.com
2. Scanning from a File
- This command is useful for scanning a large number of systems efficiently. Scans multiple targets given from users in a file.
parth scan -f targets.txt
3. Using Custom Templates
- Uses custom or additional templates from a customized directory from users. This customization helps focus the scan on specific vulnerabilities of target system.
parth scan -t /path/to/templates/