Need help with inception?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

291 Stars 65 Forks 69 Commits 11 Opened issues


A highly configurable Framework for easy automated web scanning

Services available


Need anything else?

Contributors list

# 225,408
53 commits
# 24,797
4 commits
# 559,604
1 commit
# 212,633
1 commit
# 542,441
1 commit


Inception is a highly configurable tool to check for whatever you like against any number of hosts. It is extremely easy to use, yet highly configurable. It only takes few minutes to create fingerprints/signatures of the desired vulnerability/service one wants to scan by using providerCreate.html .

This tool comes handy for bugbounty hunters who want to check for specific endpoint on large number of hosts and report if the endpoint returns the specified String, Status Code or Content-Length.

Inception is a Go version of Snallygaster and comes with a large number of test cases derived from Snallygaster plus more, added by me.

Default test cases includes: test for publicly accesible git config file, .env file, magento config file, php info file, server stats page, Rails and Symfony database config files, CORS Misconfiguration check, basic XSS check at web root and few others.

What differentiate Inception from Snallygaster is - Inception allows users to create & provide their own test cases without touching a single line of code.

The use of goroutine makes it very fast but it doesn't hammer a single domain concurrently with a large number of requests as single test case is performed against all the specified domain before moving to another test case.

Key Features

1) Very easy to use and create signatures using providerCreate.html 2) Extremely fast due to use of goroutine 3) Does not hammer single server and prevent WAF blocking 4) Highly configurable to send GET/POST/HEAD/PUT/DELETE request with desired headers and body. 5) Minimum False Positive as Response can be filered with specific String, Status code, Content Length.


Just make sure you have go installed and run the following command.

go get


go get -u


▶️  inception -h
    Usage of inception:
        case sensitive checks
  -d string
        Path of list of domains to run against (default "/home/proabiral/go/src/")
        force https (works only if scheme is not provided in domain list
        hide progress bar
  -o string
        File to write JSON result
  -provider string
        Path of provider file (default "/home/proabiral/go/src/")
        Only prints when issue detected
  -t int
        No of threads (default 200)
  -timeout int
        HTTP request Timeout (default 10)
  -v    Verbose mode

Basic Example

▶️ inception -d /path/to/domainlist.txt
Issue detected : Server status is publicly viewable response contains all check
Issue detected : PHP info is publicly viewable response contains all check

All detected issues will be printed on screen as shown above. While if no issue is detected, a completion message is shown as

Note: If error like
provider.json: no such file or directory
is thrown, provide the path of provider.json {default one located at your-gopath/src/} file with -provider option.

Saving Output to File

▶️ inception -d /path/to/domainlist.txt -o /tmp/output

Output is saved in json format using can easily be filtered out later using tools like jq and gron.


Q. How should my domain list look like?
A sample of domain list is provided with the tool. It's basically a list of line seperated domains without no protocol.

Q. How do I add my own test cases?
You can use providerCreate.html to generate JSON. Just fill in the details and JSON as shown below will be generated. ``` [ { "vulnerability": "Server status is publicly viewable", "method": "GET", "color": "blue", "body": "", "endpoint": [ "/server-status" ], "headers": [], "checkIn": "responseBody", "checkFor": "CPU Usage&&&&Server Version&&&&Apache Server Status" },
{ "vulnerability": "Tomcat Server status is publicly viewable", "method": "GET", "color": "blue", "body": "", "endpoint": [ "/status?full=true" ], "headers": [], "checkIn": "responseBody", "checkFor": "Current thread count" } ]

Save the generated JSON to some file and then run the tool by providing the path to the json file with `-provider` option:

▶️ inception -provider /path/to/your/provider.json -d /path/to/your/domainlist.txt ```

Placeholders in Providers

You can also use the following predefined placeholders in provider.json which will get replaced according to the URL against which the tool is ran. * $hostname * $domain * $fqdn

For example, if you're running inception against

$hostname becomes example
$domain becomes and
$fqdn becomes

This is very helpful for cases like CORS. Or if you want to check for files prefixed by domain name or alike.

Below is the example showing fingerprint and request generated by it against
        "vulnerability": "Demo Bug",
        "method": "GET",
        "color": "blue",
        "body": "fqdn=$fqdn&domain=$domain&hostname=$hostname",
        "endpoint": [
        "headers": [
        "checkIn": "responseBody",
        "regexCheck": false,
        "checkFor": ""

incoming request

Q. Whats with the name?
The name of tool is inspired from the movie Inception where DiCaprio steals secrets from subconscious mind of people. Similar to movie, this tool steal secrets from webserver.

because this is the first tool I am open sourcing.


Thanks to Iceman for reviewing the tool and suggesting this cool name. Also concurrency module has been shamelessly stolen from his Subover project

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.