Dismap is a fast asset discovery and web fingerprinting tool that helps red and blue teams quickly identify target assets and potential vulnerabilities.
Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点
This tool is primarily used by red teams to rapidly locate and identify web assets and their types during penetration testing engagements. Blue teams can also leverage dismap to discover suspicious points in their infrastructure for proactive defense and vulnerability management.
Ensure Go environment is properly set up before building the tool. Use responsibly within authorized testing environments to avoid legal issues. Regularly update the tool to benefit from the latest fingerprinting signatures.
git clone https://github.com/zhzyker/dismap.git
cd dismap
go build
or use go install github.com/zhzyker/dismap@latest
./dismap -h
Display help information and usage options
./dismap -u http://example.com
Scan a single URL to identify asset fingerprint and type
./dismap -f urls.txt
Scan multiple URLs listed in a file for asset discovery
./dismap -o result.txt
Output scan results to a specified file