Dicoria is a CMS identification tool that uses website response fingerprinting to accurately detect the Content Management System powering a target website.
Dicoria 是一款根据网站响应识别内容管理系统 (CMS) 的工具。它利用各种技术和指纹识别方法来确定网站正在使用的 CMS。Dicoria is a tool used to identify Content Management Systems (CMS) based on the website's response. It utilizes various techniques and fingerprinting methods to determine the CMS being used.
Security analysts, penetration testers, and web developers use Dicoria to quickly identify the CMS behind a website, which helps in assessing potential vulnerabilities and tailoring security measures. It is particularly useful during web security assessments and automated vulnerability scanning workflows.
This tool is intended for educational and authorized security testing purposes only. Users should ensure they have permission to scan target websites to avoid legal issues. The tool requires Python and dependencies specified in requirements.txt.
Clone this repository: git clone https://github.com/R4be1/Dicoria.git
Install the required dependencies: pip install -r requirements.txt
python3 Dicoria.py -u <website>
Starts the CMS identification process for the specified target website URL.
python3 Dicoria.py -u 'http://www.example.com'
Example command to scan 'http://www.example.com' and identify its CMS.