Web crawler that scans domains for endpoints, secrets, API keys, file extensions, and security vulnerabilities
Cariddi is a web security reconnaissance tool that crawls domains and URLs to identify potential security issues and interesting endpoints. It takes a list of target domains as input and systematically crawls them to discover secrets like API keys and tokens, hunt for exposed endpoints, scan for specific file extensions, and identify errors or useful information in web applications.
The tool offers extensive scanning capabilities including subdomain crawling with the -intensive flag, custom secret detection using regex patterns, and configurable file extension hunting with seven different sensitivity levels. It supports proxy integration (including Burp Suite), custom headers, random user agents, and various output formats including JSON, HTML, and plain text. Cariddi can cache results, store HTTP responses, and handle concurrent requests with adjustable delays between requests.
Security researchers, penetration testers, and bug bounty hunters would find cariddi useful for automated reconnaissance during security assessments. The tool integrates well with existing security workflows through its proxy support and flexible input/output options, allowing it to feed discovered endpoints into other security testing tools.
# via Homebrew
brew install cariddi
# via Go
go install -v github.com/edoardottt/cariddi/cmd/cariddi@latest
# via Snap
sudo snap install cariddi
