Skip to content
My simple Swiss Army knife for http/https troubleshooting and profiling.
Branch: master
Clone or download
trimstray #70 - minor fixes
- signed-off-by: trimstray <trimstray@gmail.com>
Latest commit 5381257 Mar 13, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
bin updated version Mar 8, 2019
build #68 - replaced Sublist3r to SubFinder Mar 10, 2019
lib #70 - minor fixes Mar 13, 2019
log added log/ directory to project (not only locally) Jan 3, 2019
src #70 - minor updates; fixed shellcheck warnings Mar 13, 2019
static #70 - updated preview Mar 13, 2019
.gitignore
.travis.yml fixed shellcheck for travis Mar 5, 2019
CODE_OF_CONDUCT.md added CODE_OF_CONDUCT.md Jul 17, 2018
CONTRIBUTING.md fixed link Mar 4, 2019
LICENSE.md fixed typos Jan 22, 2019
README.md updated testssl.sh descriptions Mar 11, 2019
dependencies.sh fixed golang installation Mar 11, 2019
setup.sh updated version; minor fixes Mar 5, 2019

README.md

htrace.sh

Travis-CI Docker


Master

Created by trimstray and contributors

Description

htrace.sh is a shell script for http/https troubleshooting and profiling. It's also a simple wrapper script around several open source security tools.

For a more detailed understanding of htrace.sh, its parameters, functions and how it all works, see the Wiki.

How To Use

To install htrace.sh itself:

# Clone this repository
git clone https://github.com/trimstray/htrace.sh

# Go into directory
cd htrace.sh

# Install
sudo ./setup.sh install

# Install dependencies (Debian 8/9, Ubuntu 18.x and MacOS support)
#   - recommend build docker image or install dependencies manually
#   - before init please see what it does and which packages are available on your repository
sudo ./dependencies.sh

# Run the app
htrace.sh -u https://nmap.org -s -h
  • symlink to bin/htrace.sh is placed in /usr/local/bin
  • man page is placed in /usr/local/man/man8

or build docker image:

# Clone this repository
git clone https://github.com/trimstray/htrace.sh

# Go into directory and build docker image
cd htrace.sh && build/build.sh

# Run the app
docker run --rm -it --name htrace.sh htrace.sh -u https://nmap.org -s -h

Parameters

Provides the following options:

    htrace.sh v1.1.3

  Usage:

    htrace.sh <option|long-option>

  Examples:

    htrace.sh -u https://example.com --all-scans
    htrace.sh -u https://example.com -s -h --testssl --ssllabs
    htrace.sh -u https://example.com -h -M 'POST:password=123&name=Admin'
    htrace.sh --url https://example.com --cache-bypass "?${RANDOM}"
    htrace.sh --url https://example.com --ssl --headers --proxy "socks5h://127.0.0.1:9501"

  Options:

        --help                                show this message
        --version                             show script version

    Standard:

        -u|--url <value>                      set target url with http/https protocol
        -s|--ssl                              show basic ssl server/connection parameters
        -h|--headers                          show response headers
        -b|--body                             show response body
        -M|--req-method <value>               set request method (default: GET)
        -H|--req-header <value>               set request header(s)
        -p|--proxy <value>                    set proxy server (not for external tools)

    Security tools:

        --testssl                             test ssl protocols and ciphers (testssl.sh)
        --observatory                         analyze website headers (mozilla observatory)
        --ssllabs                             deep analysis of the ssl web server (ssllabs)
        --mixed-content                       scan website for non-secure resources (mixed-content-scan)
        --nse                                 scan website and domain with nse library (nmap)
        --waf                                 detect and bypass web application firewalls (whatwaf)
        --dns                                 enumerate subdomains of website (subfinder)

    Extended:

        --cache-bypass <value>                try (proxy) cache bypass
        --user-agent <value>                  set 'User-Agent' header
        --max-redirects <num>                 set max redirects (default: 10)
        --timeout <num>                       set max timeout (default: 15)
        --hide-src-ip                         hide source ip from output

Output colors

Sometimes it is very useful to redirect the output to a file. Default htrace.sh produces nonprintable characters (for colors). For disable them export HTRACE_COLORS variable:

export HTRACE_COLORS=off ; htrace.sh -u htrace.sh -u https://nmap.org -s -h

This option does not affect for external tools.

Contributing

See this.

License

GPLv3 : http://www.gnu.org/licenses/

Free software, Yeah!

You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.