OpenDoor: OWASP WEB Directory Scanner • Penetration Testing

OpenDoor OWASP is console multifunctional websites scanner. This application finds all possible ways to login, index of/ directories, web shells, restricted access points, subdomains, hidden data and large backups. The scanning is performed by the built-in dictionary and external dictionaries as well. Anonymity and speed are provided by means of using proxy servers. The software is written for informational purposes and is open source product under the GPL license.


  •  multithreading control
  •  scan’s reports
  •  directories scanner
  •  subdomains scanner
  •  HTTP(S) (PORT) support
  •  Keep-alive long pooling
  •  HTTP(S)/SOCKS proxies
  •  dynamic request header
  •  custom wordlst’s prefixes
  •  custom wordlists, proxies, ignore lists
  •  debug levels (1-3)
  •  extensions filter
  •  custom reports directory
  •  custom config wizard (use random techniques)
  •  analyze techniques
    • detect redirects
    • detect index of/ Apache
    • detect large files
    • heuristic detect invalid web pages
    • blank success page filter
    • certify required pages
  •  randomization techniques
    • random user-agent per request
    • random proxy per request
    • wordlists shuffling
    • wordlists filters


git clone
 cd OpenDoor/
 pip install -r requirements.txt
 chmod +x


 python3 --host
usage: [-h] [--host HOST] [-p PORT] [-m METHOD] [-t THREADS]
                   [-d DELAY] [--timeout TIMEOUT] [-r RETRIES]
                   [--accept-cookies] [--debug DEBUG] [--tor]
                   [--torlist TORLIST] [--proxy PROXY] [-s SCAN] [-w WORDLIST]
                   [--reports REPORTS] [--reports-dir REPORTS_DIR]
                   [--random-agent] [--random-list] [--prefix PREFIX]
                   [-e EXTENSIONS] [-i IGNORE_EXTENSIONS] [--sniff SNIFF]
                   [--update] [--version] [--examples] [--docs]
                   [--wizard [WIZARD]]

optional arguments:
  -h, --help            show this help message and exit

required named options:
  --host HOST           Target host (ip); --host

Application tools:
  --update              Update from CVS
  --version             Get current version
  --examples            Examples of usage
  --docs                Read documentation
  --wizard [WIZARD]     Run wizard scanner from your config

Debug tools:
  --debug DEBUG         Debug level 1 - 3

Reports tools:
  --reports REPORTS     Scan reports (json,std,txt,html)
  --reports-dir REPORTS_DIR
                        Path to custom reports dir

Request tools:
  -p PORT, --port PORT  Custom port (Default 80)
  -m METHOD, --method METHOD
                        Request method (use HEAD as default)
  -d DELAY, --delay DELAY
                        Delay between requests threading
  --timeout TIMEOUT     Request timeout (30 sec default)
  -r RETRIES, --retries RETRIES
                        Max retries to reconnect (default 3)
  --accept-cookies      Accept and route cookies from responses
  --tor                 Using built-in proxylist
  --torlist TORLIST     Path to custom proxylist
  --proxy PROXY         Custom permanent proxy server
  --random-agent        Randomize user-agent per request

Sniff tools:
  --sniff SNIFF         Response sniff plugins

Stream tools:
  -t THREADS, --threads THREADS
                        Allowed threads

Wordlist tools:
  -s SCAN, --scan SCAN  Scan type scan=directories or scan=subdomains
  -w WORDLIST, --wordlist WORDLIST
                        Path to custom wordlist
  --random-list         Shuffle scan list
  --prefix PREFIX       Append path prefix to scan host
  -e EXTENSIONS, --extensions EXTENSIONS
                        Force use selected extensions for scan session -e
                        php,json e.g
                        Ignore extensions for scan session -i aspx,jsp e.g

Copyright (C) 2017 Stanislav WEB