-
Notifications
You must be signed in to change notification settings - Fork 13
API Endpoints
CommonHuman-Lab edited this page Feb 24, 2026
·
1 revision
-
GET
/health
Check server health and tool availability. -
GET
/api/cache/stats
Get cache statistics. -
POST
/api/cache/clear
Clear the tool cache. -
GET
/api/telemetry
Get system telemetry.
-
POST
/api/files/create
Create a new file.
Body:{ "filename": "file.txt", "content": "data", "binary": false } -
POST
/api/files/modify
Modify an existing file.
Body:{ "filename": "file.txt", "content": "data", "append": false } -
DELETE
/api/files/delete
Delete a file or directory.
Body:{ "filename": "file.txt" } -
GET
/api/files/list
List files in a directory.
Query:?directory=.
-
POST
/api/payloads/generate
Generate large payloads for testing.
Body:{ "payload_type": "buffer", "size": 1024, "pattern": "A", "filename": "" }
-
POST
/api/tools/nmap
Run Nmap scan.
Body:{ "target": "host", "scan_type": "-sCV", "ports": "", "additional_args": "-T4 -Pn" } -
POST
/api/tools/gobuster
Run Gobuster directory scan.
Body:{ "url": "http://site", "mode": "dir", "wordlist": "/usr/share/wordlists/dirb/common.txt", "additional_args": "" } -
POST
/api/tools/nikto
Run Nikto web server scan.
Body:{ "target": "http://site", "additional_args": "" } -
POST
/api/tools/ffuf
Run FFUF web fuzzer.
Body:{ "url": "http://site/FUZZ", "wordlist": "/usr/share/wordlists/dirb/common.txt", "mode": "directory", "match_codes": "200,204,301,302,307,401,403", "additional_args": "" } -
POST
/api/tools/dirsearch
Run Dirsearch path scanner.
Body:{ "url": "http://site", "additional_args": "" } -
POST
/api/tools/httpx
HTTP probing and tech detection.
Body:{ "target": "http://site", "probe": true, "tech_detect": true, "status_code": true, "title": true, "additional_args": "" }
-
POST
/api/tools/nuclei
Run Nuclei vulnerability scan.
Body:{ "target": "http://site", "severity": "", "tags": "", "template": "", "additional_args": "" } -
POST
/api/tools/sqlmap
Run SQLMap SQL injection test.
Body:{ "url": "http://site", "data": "", "additional_args": "" } -
POST
/api/tools/dalfox
Run Dalfox XSS scanner.
Body:{ "url": "http://site", "blind": false, "additional_args": "" }
-
POST
/api/tools/whois
WHOIS lookup for domains and IPs.
Body:{ "target": "example.com" } -
POST
/api/tools/amass
Subdomain enumeration.
Body:{ "domain": "example.com", "mode": "enum", "additional_args": "" } -
POST
/api/tools/subfinder
Passive subdomain discovery.
Body:{ "domain": "example.com", "silent": true, "all_sources": false, "additional_args": "" } -
POST
/api/tools/fierce
DNS reconnaissance.
Body:{ "domain": "example.com", "additional_args": "" } -
POST
/api/tools/dnsenum
DNS enumeration and zone transfer.
Body:{ "domain": "example.com", "additional_args": "" }
-
POST
/api/tools/metasploit
Run Metasploit module.
Body:{ "module": "exploit/windows/smb/ms17_010_eternalblue", "options": {} } -
POST
/api/tools/hydra
Network login brute-forcer.
Body:{ "target": "host", "service": "ssh", "username": "", "username_file": "", "password": "", "password_file": "", "additional_args": "" } -
POST
/api/tools/hashcat
GPU-accelerated password cracker.
Body:{ "hash_file": "hashes.txt", "hash_type": "1000", "attack_mode": "0", "wordlist": "/usr/share/wordlists/rockyou.txt", "mask": "", "additional_args": "" }
-
POST
/api/tools/gdb
Run GDB analysis.
Body:{ "file": "binary", "commands": "", "additional_args": "" } -
POST
/api/tools/radare2
Run Radare2 analysis.
Body:{ "file": "binary", "commands": "", "additional_args": "" } -
POST
/api/tools/binwalk
Firmware analysis and extraction.
Body:{ "file": "firmware.bin", "additional_args": "" }
-
POST
/api/tools/prowler
AWS/Azure/GCP security audit.
Body:{ "provider": "aws", "profile": "default", "region": "", "checks": "", "additional_args": "" } -
POST
/api/tools/trivy
Container and filesystem vulnerability scanner.
Body:{ "target": "image:latest", "scan_type": "image", "severity": "", "additional_args": "" } -
POST
/api/tools/kube-hunter
Kubernetes penetration testing.
Body:{ "additional_args": "" }
-
POST
/api/tools/mysql
Query a MySQL/MariaDB database.
Body:{ "host": "127.0.0.1", "user": "root", "password": "", "database": "testdb", "query": "SELECT * FROM users;" } -
POST
/api/tools/postgresql
Query a PostgreSQL database.
Body:{ "host": "127.0.0.1", "user": "postgres", "password": "", "database": "testdb", "query": "SELECT * FROM users;" } -
POST
/api/tools/sqlite
Query a SQLite database file.
Body:{ "db_path": "/path/to/test.db", "query": "SELECT * FROM users;" }
curl -X POST http://127.0.0.1:8888/api/tools/whois \
-H "Content-Type: application/json" \
-d '{"target": "example.com"}'