Fringe Runner
fringe-runner is a tool to fetch new assets over the wire and add it the
FringeProject.
Installation
To easy-install the binary run the following command:
go get github.com/fringeproject/fringe-runner
If you want to install manually or for an other environment, please read the
documentation here
Docker
A Docker image of the latest build is available on DockerHub:
docker run -it --rm fringeproject/fringe-runner:latest <cmd>
You can also build the image yourself:
docker build .
---> <image_id>
docker run -it <image_id> <cmd>
How to use
Configuration
The configuration of fringe-runner is store in a YAML file config.yml.
Please check the config.yml provided in the repository and the
documentation for more
information.
Module
This command interacts with the fringe modules.
You can list the modules with -L/--list-modules:
fringe-runner module --list-modules | jq
You can execute a module manually:
fringe-runner module -m module_slug -a asset_value
The asset argument can also be a file containing assets to execute the same
module on all the assets from the file.
fringe-runner module -m crtsh -a assets.txt
Parse a local file
This command parse a file separated by new lines:
fringe-runner parse -p <file_path> | jq ".[].value"
Use cases
Get website technologies with Wappalyzer
You want to use the wappalyzer module on a URL to identify technologies on a
website:
fringe-runner module -m wappalyzer https://fringeproject.com | jq .[].value
This will returns a list of technologies and their versions.
Take screenshots a list of hostnames
The file hostnames.txt contains a list of hostname (1 by line) and you want
to take a screenshot of the webservers runnings on those:
First, configure the screenshot renderer (see config.yml) then
type the following command:
fringe-runner module -m http-probe -a hostnames.txt -w workflows/screenshot.yml
The runner execute the module http-probe on each line of the hostnames.txt
file. This module checks for web-servers on HTTP (80) and HTTPS (443). Then the
workflow screenshot.yml take a live screenshot for every listening web-server.
Available modules
Here is a list of module's slugs available to query public resources:
The following modules are still in progress:
nessus: Add a new scan to a module instance (nessus_endpoint, nessus_username and nessus_password)