Skipfish is a free, open-source Automated Penetration Testing tool available on GitHub made for security researchers. Skipfish is used for information gathering and testing the security of websites and web servers. Skipfish is the easiest and one of the best tools for penetration testing. It provides many integrated tools to perform penetration testing on the target system. This tool is also known as an active web application security reconnaissance tool. This tool functions and makes a map on the console of the targeted site using recursive crawl and dictionary-based probes. This tool gives us all the security checks that are active in the domain. Lastly, this tool generates a report which can be further used for security assessments.
SYSTEM REQUIREMENTS
RAM : Minimam 2 GB (4 GB is recommended).
Storage : Around 10 MB for installation.
OS : Compatible with Linux, macOS, and Windows.
Architecture : Supports both 32-bit and 64-bit systems.
Available On : PC
ADDITIONAL INFORMATION
Michal Zalewski (lcamtuf@google.com).
2010.
559 KB.
Michal Zalewski Known for contributions to web security tools.
English
Version 2.10b, regularly updated
Written in C.
Cross-platform
Open Source under the GNU General Public License (GPL).
Skipfish is a web application security scanner that performs reconnaissance and identifies vulnerabilities. Here are some examples of its usage :
$ skipfish -o output_dir http://example.com
This scans the target website (http://example.com) and saves the results in the specified output directory.
$ skipfish -o output_dir -W custom_wordlist.txt http://example.com
Uses a custom wordlist (custom_wordlist.txt) for dictionary-based probes.
$ skipfish -o output_dir -A username:password http://example.com
Performs a scan with HTTP authentication using the provided credentials.
$ skipfish -o output_dir -d 5 http://example.com
Limits the crawl depth to 5 levels to avoid scanning too deeply.
$ skipfish -o output_dir -X /admin http://example.com
Excludes the /admin directory from the scan.
$ skipfish -o output_dir --auth-form http://example.com/login --auth-user user --auth-pass pass --auth-verify-url http://example.com/dashboard
Configures form-based authentication for scanning.
$ skipfish -o output_dir -H "User-Agent: CustomAgent" http://example.com
Adds a custom HTTP header to the scan requests.
$ skipfish -o output_dir --proxy http://proxyserver:port http://example.com
Routes the scan through a specified proxy server.
index.html file in the output directory to view a detailed report of vulnerabilities and issues.
$ sudo apt-get update
$ sudo apt install skipfish
sudo apt updatesudo apt install skipfishSkipfish is primarily designed for Linux, but you can run it on Windows using Cygwin, a Linux-like environment for Windows. Here’s how you can install and uninstall it :
gcc, make, and perl.makeYou can install and uninstall Skipfish on macOS using Homebrew or MacPorts. Here’s how :
$ /bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
brew install skipfishAlternatively, you can install it via MacPorts : sudo port install skipfish
$ sudo apt remove skipfish
$ sudo apt autoclean && apt autoremove
sudo apt remove skipfishsudo apt-get -y autoremove --purge skipfishrm -rf /path/to/skipfishbrew uninstall skipfishOr, if installed via MacPorts : sudo port uninstall skipfish
Copyright © 2025 HACKERSPOT
All original content, including tools, software, and other information, is protected by copyright and remains the property of its respective owners.
HackerSpot is an informational platform that offers resources such as tools, software, courses, internships, and various other materials aimed at supporting individuals passionate about CyberSecurity and IT.