Katana is a fast, pipeline-friendly web crawler from ProjectDiscovery for automated endpoint discovery, attack-surface mapping, and security recon. Install…
Katana is a fast, pipeline-friendly web crawler from ProjectDiscovery for automated endpoint discovery, attack-surface mapping, and security recon. Install via Go (CGO_ENABLED=1 go install github.com/projectdiscovery/katana/cmd/katana@latest) or Docker. Input URLs via -u, -list, or STDIN (e.g., piped from httpx). Default "standard" mode uses a lightweight Go HTTP client for high-performance crawling; enable -headless (with -system-chrome) for full JS/DOM rendering and -js-crawl/-jc or -jsluice to extract script-driven routes. Key flags: -d/-depth, -c/-concurrency, -rl/-rate-limit, -ct/-crawl-duration, -cs/-cos (in-scope/out-of-scope regex), -ns to disable host scope. Outputs are machine-friendly (JSONL) and designed to be chained into automation pipelines. Use only on authorized targets; configure concurrency/rate/depth to minimize impact.
Esta página faz parte do hub OpenClaw Skills com guias de instalação, navegação por categorias e links práticos.