Skip to main content

Fast CLI for directory discovery, subdomain enumeration, and web asset reconnaissance

Project description

OWASP WEB Directory Scanner Twitter

OpenDoor OWASP

Python Linux macOS Windows
3.12 CI Linux Python 3.12 CI macOS Python 3.12 CI Windows Python 3.12
3.13 CI Linux Python 3.13 CI macOS Python 3.13 CI Windows Python 3.13
3.14 CI Linux Python 3.14 CI macOS Python 3.14 CI Windows Python 3.14

OpenDoor OWASP is a multifunctional console website scanner.
This application finds possible login entry points, Index of/ directories, web shells, restricted access points, subdomains, hidden data, and large backup files.
Scanning is performed using both the built-in dictionary and external dictionaries.
Anonymity and speed are provided through the use of proxy servers.
The software is written for informational purposes and is released as an open-source product under the GPL license.
The project is part of BlackArch Linux and is maintained and supported by the community.

Maintainer Contributors PyPI - Version Python 3.12+ codecov

Documentation Status Codacy Security Scan Dependency Review CodeQL

  • Built-in dictionaries
    • Directories: 115092
    • Subdomains: 1507134
v5.11.0 (28.04.2026)
  • (feature) added smart auto-calibration via --auto-calibrate
  • (feature) added baseline filtering for soft-404, wildcard and catch-all responses
  • (feature) added --calibration-samples to control the number of random calibration probes
  • (feature) added --calibration-threshold to control calibration match strictness
  • (feature) added multi-signal calibration signatures based on status code, OpenDoor bucket, normalized body hash, HTML skeleton hash, title, redirect target, stable headers, size, word count and line count
  • (feature) added calibrated result bucket for responses filtered by auto-calibration
  • (enhancement) auto-calibration remains strict opt-in and does not change default scan behaviour when disabled
  • (enhancement) auto-calibration forces HEAD to GET only when enabled because response body analysis is required
  • (enhancement) dynamic response fragments such as UUIDs, timestamps, long numeric IDs, nonce and CSRF-like values are normalized before hashing
  • (enhancement) calibration matches now preserve calibration_score and calibration_reason in detailed report items
  • (enhancement) calibration baseline is persisted in session checkpoints and restored on resume
  • (enhancement) auto-calibration options are preserved for wizard and session resume flows
  • (enhancement) blocked WAF probe responses are skipped during calibration baseline creation
  • (enhancement) failed calibration probes no longer stop the scan; OpenDoor safely continues without a usable baseline
  • (enhancement) CI/CD --fail-on-bucket remains compatible with auto-calibration and can explicitly target the calibrated bucket
  • (tests) added unittest coverage for calibration signatures, normalization, scoring, matching and fallback paths
  • (tests) added regression coverage for Browser calibration runtime, session persistence and controller orchestration
  • (tests) full unittest suite passes after integration (999 tests)
  • (tests) coverage gate passes at 98%

Changelog (last changes)

FEATURES LIST

  • ✅ directories scanner
  • ✅ recursive directory scanner
  • ✅ subdomains scanner
  • ✅ target input sources
    • single target via --host
    • multi-target file via --hostlist
    • standard input via --stdin
  • ✅ CI/CD pipeline controls
    • optional fail-on result buckets via --fail-on-bucket
    • supports buckets such as success, auth, forbidden, blocked
    • returns exit code 1 only when configured fail-on buckets are found
    • keeps default scan exit behaviour unchanged without fail-on rules
    • scans all targets before returning the final CI/CD exit code
  • ✅ smart auto-calibration
    • opt-in baseline filtering via --auto-calibrate
    • configurable random probes via --calibration-samples
    • configurable match strictness via --calibration-threshold
    • filters soft-404, wildcard and catch-all responses into the calibrated bucket
    • uses normalized body hash, HTML skeleton hash, title, redirect target, stable headers, size, word count and line count
    • normalizes dynamic tokens such as UUIDs, timestamps, long numeric IDs, nonce and CSRF-like values
    • stores calibration score and reason in detailed report items
    • persists calibration baseline in session checkpoints
    • stays compatible with CI/CD fail-on rules
  • ✅ technology fingerprinting
    • heuristic application stack detection via --fingerprint
    • identify probable CMS, ecommerce platforms, frameworks, site builders, and static-site tooling
    • detect infrastructure providers such as AWS, Cloudflare, Vercel, Netlify, GitHub Pages, GitLab Pages, Heroku, Azure, Google Cloud, Fastly, Akamai, and OpenResty
    • print application and infrastructure confidence in the standard report
  • ✅ WAF detection and safe mode
    • passive WAF / anti-bot recognition via --waf-detect
    • detect probable vendors such as Anubis, Cloudflare, Sucuri, Akamai, Imperva, Distil, F5 BIG-IP ASM, AWS WAF, Azure Front Door, Fastly, ModSecurity, DataDome, PerimeterX / HUMAN, Kasada, Barracuda, Radware, FortiWeb, Reblaze, NetScaler / Citrix WAF, AppTrana, and Huawei Cloud WAF
    • cautious runtime profile via --waf-safe-mode
    • safe mode automatically enables --waf-detect
    • serialize requests and apply cooldown after first WAF detection
    • adaptively increase cooldown for blocked and challenge responses
    • suspend recursive expansion for blocked responses while safe mode is active
    • persist WAF safe mode state and adaptive cooldown recovery state in session checkpoints
  • ✅ session control
    • runtime pause / resume session
    • persistent scan sessions
    • checkpoint autosave
    • session snapshot validation
    • atomic session writes
    • restore flow
  • ✅ HTTP(S) (PORT) support
  • ✅ Keep-alive long pooling
  • ✅ Invalid certificates scan
  • ✅ HTTP(S)/SOCKS proxies
  • ✅ dynamic request headers
    • custom request headers support
    • custom request cookies support
    • cookies forwarding from responses
    • custom or randomized user-agent support
  • ✅ custom wordlists prefixes
  • ✅ custom wordlists, proxies, ignore lists
  • ✅ debug levels (1-3)
    • silent mode
    • info
    • raw mode
  • ✅ extensions filters
  • ✅ custom config wizard (use random techniques)
  • ✅ scans reporting
    • console reports
    • json reports
    • txt reports
    • csv reports
    • html reports
    • sqlite reports
  • ✅ analyze techniques:
    • detect redirects
    • detect index of/ Apache
    • detect large files
    • skip 200 OK redirects
    • skip empty pages
    • cookie routing (reusing cookies)
    • heuristic detect invalid pages (false 404)
    • blank success page filter
    • certificate required pages
  • ✅ randomization techniques:
    • random user-agent per request
    • random proxy per request
    • wordlists shuffling
    • wordlists filters
  • ✅ response filters
    • include/exclude HTTP status codes
    • HTTP status ranges, e.g. 200-299,301,302,403
    • exclude exact response sizes
    • exclude inclusive response size ranges
    • match or exclude body text fragments
    • match or exclude body regex patterns
    • min/max response length filters
    • automatic HEAD -> GET override for body-required filters
  • ✅ raw-request templates
    • load raw HTTP requests via --raw-request request.txt
    • resolve relative request lines with --scheme http|https
    • parse method, host, port, headers, cookies, and request body
    • derive prefix automatically from raw request path
    • allow CLI host/header/cookie/method/prefix overrides on top of the template

Install PIP

python3 -m ensurepip --upgrade
python3 -m pip install --upgrade pip

Global installation from PyPI

Use this if you want the package available as a normal Python CLI tool.

Linux / macOS
python3 -m pip install --upgrade opendoor
opendoor --host http://www.example.com
Windows (PowerShell)
winget install Python.Python.3.14
py -m pip install --upgrade pip
py -m pip install --upgrade opendoor

opendoor --host http://www.example.com

Global installation with pipx (recommended for end users)

macOS / Homebrew
brew install pipx
pipx ensurepath
pipx install opendoor

opendoor --host http://www.example.com
Linux / generic environments

Install pipx with your system package manager or preferred Python tooling, then:

pipx ensurepath
pipx install opendoor

opendoor --host http://www.example.com
Windows (PowerShell)
winget install Python.Python.3.14
py -m pip install --user pipx
py -m pipx ensurepath

# Reopen PowerShell after ensurepath
pipx install opendoor

opendoor --host http://www.example.com

pipx is the preferred option when you want an isolated CLI installation without managing a project virtual environment manually.

Local installation and run

Use this mode if you want to run OpenDoor directly from the repository without installing it globally.

Linux / macOS
git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor/
python3 -m pip install -r requirements.txt
chmod +x opendoor.py

python3 opendoor.py --host http://www.example.com
Windows (PowerShell)
git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor
py -m pip install -r requirements.txt

py opendoor.py --host http://www.example.com

Local development installation

Use this mode if you are developing, testing, or changing the project locally.

Linux / macOS
git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor/
python3 -m venv .venv
source .venv/bin/activate
python -m pip install --upgrade pip setuptools wheel
python -m pip install -r requirements-dev.txt
python -m pip install -e .

opendoor --host http://www.example.com
Windows (PowerShell)
git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor
py -m venv .venv
.\.venv\Scripts\Activate.ps1
python -m pip install --upgrade pip setuptools wheel
python -m pip install -r requirements-dev.txt
python -m pip install -e .

opendoor --host http://www.example.com

Installation from source for OS distributions / maintainers

This flow is intended for Linux distributions, package maintainers, and release pipelines.

Linux / macOS
git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor/
python3 -m pip install --upgrade build
python3 -m build
Windows (PowerShell)
git clone https://github.com/stanislav-web/OpenDoor.git
cd OpenDoor
py -m pip install --upgrade build
py -m build

This flow is preferable for Linux distributions and package maintainers because:

  • source package and wheel are generated through the standard Python build backend
  • installation can be managed by the distribution package manager
  • updates can be delivered together with OS package updates
  • no legacy setup.py install flow is required

The package is already present in BlackArch Linux, and this build layout is intended to make packaging for other Linux distributions easier as well.

PyPI installation

Linux / macOS:

python3 -m pip install --upgrade opendoor

Windows:

py -m pip install --upgrade opendoor
pipx installation
pipx upgrade opendoor
Source checkout

Linux / macOS:

git pull
python3 -m pip install -e .

Windows:

git pull
py -m pip install -e .

Recognized systems by the heuristic fingerprint engine

This is summarizing the platform families currently recognized by the heuristic fingerprint engine.

CMS (27)
  • Bitrix
  • Bludit
  • Bolt CMS
  • Concrete CMS
  • Contao
  • Craft CMS
  • Directus
  • Discourse
  • Drupal
  • Ghost
  • GravCMS
  • Joomla
  • Matomo
  • MediaWiki
  • Open Journal Systems
  • MODX
  • Moodle
  • Neos
  • Nextcloud
  • OctoberCMS
  • ownCloud
  • phpBB
  • phpMyAdmin
  • Pimcore
  • TYPO3
  • Umbraco
  • WordPress
E-commerce (7)
  • Magento
  • nopCommerce
  • OpenCart
  • PrestaShop
  • Shopify
  • Shopware
  • WooCommerce
Frameworks / app platforms (24)
  • Angular
  • ASP.NET
  • Astro
  • Django
  • Express
  • FastAPI
  • Fastify
  • Flask
  • Gatsby
  • Hapi
  • Koa
  • Laravel
  • NestJS
  • Next.js
  • Nuxt
  • Phoenix
  • React
  • Remix
  • Ruby on Rails
  • Spring
  • Strapi
  • SvelteKit
  • Symfony
  • Vue
Site builders (4)
  • Squarespace
  • Tilda
  • Webflow
  • Wix
Static / docs generators (5)
  • Docusaurus
  • Hugo
  • Jekyll
  • MkDocs
  • VitePress
Infrastructure providers / hosting edge signals (21)
  • AWS
  • AWS API Gateway
  • AWS Amplify
  • AWS CloudFront
  • AWS ELB / ALB
  • AWS S3
  • Akamai
  • Cloudflare
  • Fastly
  • GitHub Pages
  • GitLab Pages
  • Google App Engine
  • Google Cloud
  • Google Cloud / Google Frontend
  • Google Cloud Run
  • Heroku
  • Microsoft Azure
  • Microsoft Azure App Service
  • Netlify
  • OpenResty
  • Vercel
WAF / anti-bot / edge protection systems (21)
  • Akamai
  • Anubis
  • AppTrana
  • AWS WAF
  • Azure Front Door
  • Barracuda
  • Cloudflare
  • DataDome
  • Distil
  • F5 BIG-IP ASM
  • Fastly
  • FortiWeb
  • Huawei Cloud WAF
  • Imperva
  • Kasada
  • ModSecurity
  • NetScaler / Citrix WAF
  • PerimeterX / HUMAN
  • Radware
  • Reblaze
  • Sucuri

Help

Usage
usage: opendoor.py [-h] [--host HOST | --hostlist HOSTLIST | --stdin | --session-load SESSION_LOAD] [-p PORT] [-m METHOD] [--scheme SCHEME] [--raw-request RAW_REQUEST] [--session-save SESSION_SAVE]
                   [--session-autosave-sec SESSION_AUTOSAVE_SEC] [--session-autosave-items SESSION_AUTOSAVE_ITEMS] [-t THREADS] [-d DELAY] [--timeout TIMEOUT] [-r RETRIES] [--keep-alive] [--header HEADER]
                   [--cookie COOKIE] [--accept-cookies] [--fingerprint] [--waf-detect] [--waf-safe-mode] [--debug DEBUG] [--tor] [--torlist TORLIST] [--proxy PROXY] [-s SCAN] [-w WORDLIST]
                   [--fail-on-bucket FAIL_ON_BUCKET] [--auto-calibrate] [--calibration-samples CALIBRATION_SAMPLES] [--calibration-threshold CALIBRATION_THRESHOLD] [--reports REPORTS]
                   [--reports-dir REPORTS_DIR] [--random-agent] [--random-list] [--prefix PREFIX] [-e EXTENSIONS] [-i IGNORE_EXTENSIONS] [--recursive] [--recursive-depth RECURSIVE_DEPTH]
                   [--recursive-status RECURSIVE_STATUS] [--recursive-exclude RECURSIVE_EXCLUDE] [--sniff SNIFF] [--include-status INCLUDE_STATUS] [--exclude-status EXCLUDE_STATUS]
                   [--exclude-size EXCLUDE_SIZE] [--exclude-size-range EXCLUDE_SIZE_RANGE] [--match-text MATCH_TEXT] [--exclude-text EXCLUDE_TEXT] [--match-regex MATCH_REGEX]
                   [--exclude-regex EXCLUDE_REGEX] [--min-response-length MIN_RESPONSE_LENGTH] [--max-response-length MAX_RESPONSE_LENGTH] [--update] [--version] [--examples] [--docs]
                   [--wizard [WIZARD]]
Options
Group Option Description
General -h, --help show this help message and exit
Required named options --host HOST Target host; example: --host http://example.com
Required named options --hostlist HOSTLIST Path to file with targets, one per line
Required named options --stdin Read targets from STDIN, one per line
Required named options --session-load SESSION_LOAD Resume a scan from a saved session file
Application tools --update Show package update instructions
Application tools --version Show current version
Application tools --examples Show usage examples
Application tools --docs Open documentation
Application tools --wizard [WIZARD] Run scanner wizard from your config
Debug tools --debug DEBUG Debug level -1 (silent), 1 - 3
CI/CD tools --fail-on-bucket FAIL_ON_BUCKET Exit with code 1 when selected result buckets are found, e.g. success,auth,forbidden,blocked
Auto-calibration tools --auto-calibrate Enable smart baseline filtering for soft-404, wildcard and catch-all responses
Auto-calibration tools --calibration-samples CALIBRATION_SAMPLES Number of random calibration probes before scan
Auto-calibration tools --calibration-threshold CALIBRATION_THRESHOLD Auto-calibration match threshold from 0.01 to 1.0
Response filters --include-status INCLUDE_STATUS Include only response codes, e.g. 200-299,301,302,403
Response filters --exclude-status EXCLUDE_STATUS Exclude response codes, e.g. 404,429,500-599
Response filters --exclude-size EXCLUDE_SIZE Exclude exact response sizes in bytes, e.g. 0,1234
Response filters --exclude-size-range EXCLUDE_SIZE_RANGE Exclude response size ranges in bytes, e.g. 0-256,1024-2048
Response filters --match-text MATCH_TEXT Keep only responses whose body contains the given text. Repeatable
Response filters --exclude-text EXCLUDE_TEXT Exclude responses whose body contains the given text. Repeatable
Response filters --match-regex MATCH_REGEX Keep only responses whose body matches the given regex. Repeatable
Response filters --exclude-regex EXCLUDE_REGEX Exclude responses whose body matches the given regex. Repeatable
Response filters --min-response-length MIN_RESPONSE_LENGTH Keep only responses whose size is at least N bytes
Response filters --max-response-length MAX_RESPONSE_LENGTH Keep only responses whose size is at most N bytes
Reports tools --reports REPORTS Scan reports (json,std,txt,csv,html,sqlite)
Reports tools --reports-dir REPORTS_DIR Path to custom reports directory
Request tools -p, --port PORT Custom port (default 80)
Request tools -m, --method METHOD Request method (HEAD by default)
Request tools --scheme SCHEME Raw-request scheme when request line uses a relative path (http or https)
Request tools --raw-request RAW_REQUEST Path to raw HTTP request file exported from a proxy or repeater
Request tools -d, --delay DELAY Delay between threaded requests
Request tools --timeout TIMEOUT Request timeout (30 sec default)
Request tools -r, --retries RETRIES Maximum reconnect retries (default 3)
Request tools --keep-alive Use keep-alive connection
Request tools --header HEADER Add custom request header, e.g. --header 'X-Test: 1'
Request tools --cookie COOKIE Add custom cookie, e.g. --cookie 'sid=abc123'
Request tools --accept-cookies Accept and route cookies from responses
Request tools --fingerprint Detect probable CMS, framework or custom stack before the scan
Request tools --waf-detect Passively detect probable WAF or anti-bot protections before classifying a response
Request tools --waf-safe-mode Automatically switch to a cautious scan profile after WAF detection
Request tools --tor Use built-in proxy list
Request tools --torlist TORLIST Path to custom proxy list
Request tools --proxy PROXY Custom permanent proxy server
Request tools --random-agent Randomize user-agent per request
Session tools --session-save SESSION_SAVE Persist scan state to a checkpoint file
Session tools --session-autosave-sec SESSION_AUTOSAVE_SEC Autosave session checkpoint every N seconds (default 20)
Session tools --session-autosave-items SESSION_AUTOSAVE_ITEMS Autosave session checkpoint after N processed items (default 200)
Sniff tools --sniff SNIFF Response sniff plugins (indexof,collation,file,skipempty,skipsizes=NUM:NUM...)
Stream tools -t, --threads THREADS Allowed threads
Wordlist tools -s, --scan SCAN Scan type: directories or subdomains
Wordlist tools -w, --wordlist WORDLIST Path to custom wordlist
Wordlist tools --random-list Shuffle scan list
Wordlist tools --prefix PREFIX Append path prefix to scan host
Wordlist tools -e, --extensions EXTENSIONS Force selected extensions for the scan session, e.g. php,json
Wordlist tools -i, --ignore-extensions IGNORE_EXTENSIONS Ignore selected extensions for the scan session, e.g. aspx,jsp
Wordlist tools --recursive Enable recursive directory scan
Wordlist tools --recursive-depth RECURSIVE_DEPTH Maximum recursive scan depth
Wordlist tools --recursive-status RECURSIVE_STATUS HTTP status codes allowed for recursive expansion
Wordlist tools --recursive-exclude RECURSIVE_EXCLUDE File extensions excluded from recursive expansion

Tests

python3 -m pip install -r requirements-dev.txt
python3 -m unittest

Build

python3 -m pip install -r requirements-dev.txt
python3 -m build

Lint

python3 -m pip install -r requirements-dev.txt
ruff check .

Contributors

If you like to contribute to the development of the project, in that case, pull requests are open for you. Also, you can suggest ideas and create a task in my track list.

Ask DeepWiki License: GPL v3

Documentation

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

opendoor-5.11.0.tar.gz (12.7 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

opendoor-5.11.0-py3-none-any.whl (12.7 MB view details)

Uploaded Python 3

File details

Details for the file opendoor-5.11.0.tar.gz.

File metadata

  • Download URL: opendoor-5.11.0.tar.gz
  • Upload date:
  • Size: 12.7 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for opendoor-5.11.0.tar.gz
Algorithm Hash digest
SHA256 0f221ad3daca386f7acdb7add4dec4f5f44fd94c0b229ed3b72be1d7bd8acf06
MD5 edd4db5cff540f7c516744c2c0456311
BLAKE2b-256 949115269fa0a4739adab04c49ae5c8ee8049c35dcb50aa69788bba233a2d6db

See more details on using hashes here.

File details

Details for the file opendoor-5.11.0-py3-none-any.whl.

File metadata

  • Download URL: opendoor-5.11.0-py3-none-any.whl
  • Upload date:
  • Size: 12.7 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.14.4

File hashes

Hashes for opendoor-5.11.0-py3-none-any.whl
Algorithm Hash digest
SHA256 46c99cb9d86c4dfe1588206d926f70717923aad16dec3aed712ccb1a4ad6c663
MD5 522a8685eccf86ad15b08f468b458b91
BLAKE2b-256 ef85f0285adf0c44fc2f39f918d27f12608a2a9bcf9ec58377906e2c0d2f1361

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page