Posts

Showing posts with the label Scanning

Scannerl - The Modular Distributed Fingerprinting Engine

Image
Scannerl is a modular distributed fingerprinting engine implemented past times Kudelski Security . Scannerl tin give the axe fingerprint thousands of targets on a unmarried host, but tin give the axe precisely every bit easily last distributed across multiple hosts. Scannerl is to fingerprinting what zmap is to port scanning. Scannerl industrial plant on Debian/Ubuntu/Arch (but volition likely locomote on other distributions every bit well). It uses a master/slave architecture where the master copy node volition distribute the locomote (host(s) to fingerprint) to its slaves (local or remote). The entire deployment is transparent to the user. Why job Scannerl When using conventional fingerprinting tools for large-scale analysis, safety researchers volition oftentimes hitting 2 limitations: first, these tools are typically built for scanning comparatively few hosts at a fourth dimension as well as are inappropriate for large ranges of IP addresses. Second, if large hit of IP...

Osmedeus - Automatic Reconnaisance As Well As Scanning Inward Penetration Testing

Image
Automatic Reconnaisance in addition to Scanning inwards Penetration Testing What is Osmedeus? Osmedeus let yous to doing tedious materials inwards Pentesting automatically similar reconnaissance in addition to scanning the target past times run the collection of awesome tools. Installation git clone https://github.com/j3ssie/Osmedeus cd Osmedeus chmod +x install.sh ./install.sh How to use Doing normal routine include: Subdomain Scanning, Subdomain TakeOver Scanning, Port Scanning in addition to ScreenShot the target. ./osmedeus.py -t example.com Scanning subdomain in addition to Subdomain TakeOver ./osmedeus.py -m subdomain -t example.com Git repo scanning ./osmedeus.py -m git --git https://github.com/whatever/repo Doing around materials amongst Burp State file ./osmedeus.py -m burp -t example.com --burp yourburpstate.xml Available modules amongst listing tool existence used Subdomain Scanning amass subfinder massdns Subdomain TakeOver Scann...

Theharvester V3.0.3 - E-Mails, Subdomains In Addition To Names Harvester (Osint)

Image
theHarvester is a tool for gathering subdomain names, electronic mail addresses, virtual hosts, opened upward ports/ banners, too employee names from unlike world sources (search engines, pgp fundamental servers). Is a actually uncomplicated tool, but really effective for the early on stages of a penetration examination or but to know the visibility of your companionship inward the Internet. The sources are: Passive : threatcrowd: Open source threat intelligence - https://www.threatcrowd.org/ crtsh: Comodo Certificate search - www.crt.sh google: google search engine - www.google.com (With optional google dorking) googleCSE: google custom search engine google-profiles: google search engine, specific search for Google profiles bing: microsoft search engine - www.bing.com bingapi: microsoft search engine, through the API (you require to add together your Key inward the discovery/bingsearch.py file) dogpile: Dogpile search engine - www.dogpile.com ...

Celerystalk - An Asynchronous Enumeration In Addition To Vulnerability Scanner

Image
celerystalk helps you lot automate your network scanning/enumeration procedure amongst asynchronous jobs (aka tasks ) spell retaining total command of which tools you lot desire to run. Configurable - Some mutual tools are inwards the default config, simply you lot tin add together whatever tool you lot want Service Aware - Uses nmap/nessus service names rather than port numbers to determine which tools to run Scalable - Designed for scanning multiple hosts, simply industrial plant good for scanning i host at a time VirtualHosts - Supports subdomain recon too virtualhost scanning Job Control - Supports canceling, pausing, too resuming of tasks, inspired past times Burp scanner Screenshots Automatically takes screenshots of every url identified via brute force (gobuster) too spidering (Photon) Install/Setup Supported Operating Systems: Kali Supported Python Version: 2.x You must install too run celerystalk every bit root # git clone https://github.com/sethse...

Scavenger - Is A Multi-Threaded Post-Exploitation Scanning Tool For Scavenging Systems, Finding Almost Ofttimes Used Files As Well As Folders Equally Good Equally Interesting Files Containing Sensitive Information

Image
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding close ofttimes used files as well as folders every bit good every bit "interesting" files containing sensitive information. Problem Definition: Scavenger confronts a challenging lawsuit typically faced yesteryear Penetration Testing consultants during internal penetration tests; the lawsuit of having besides much access to besides many systems alongside express days for testing. Requirements: Install CrackMapExec - CrackMapExec Installation Page Examples: $ python3 ./scavenger.py smb -t 10.0.0.10 -u administrator -p Password123 -d test.local $ python3 ./scavenger.py smb --target iplist --username administrator --password Password123 --domain test.local --overwrite Blog Post: Link to Trustwave SpiderLabs Blog Acknowledgements - Powered as well as Inspired by: Impacket (@agsolino) CrackMapExec (@byt3bl33d3r) ccsrch (@adamcaudill) LaZagne Download ...

Kube-Hunter - Hunt For Safety Weaknesses Inwards Kubernetes Clusters

Image
Kube-hunter hunts for safety weaknesses inwards Kubernetes clusters. The tool was developed to growth awareness as well as visibility for safety issues inwards Kubernetes environments. You should NOT run kube-hunter on a Kubernetes cluster yous don't own! Run kube-hunter : kube-hunter is available equally a container (aquasec/kube-hunter), as well as nosotros also offering a spider web site at kube-hunter.aquasec.com where yous tin register online to have a token allowing yous run across as well as portion the results online. You tin also run the Python code yourself equally described below. Contribute : We welcome contributions, specially novel hunter modules that perform additional tests. If yous would similar to railroad train your ain modules delight read Guidelines For Developing Your First kube-hunter Module . Hunting Where should I run kube-hunter? Run kube-hunter on whatever auto (including your laptop), conduct Remote scanning as well as give the IP address ...

Wpintel - Chrome Extension Designed For Wordpress Vulnerability Scanning Together With Data Gathering

Image
WordPress Vulnerability Scanner - Scan for vulnerabilities, version, themes, plugins together with much more! WPintel allows yous to scan self hosted WordPress sites. With WPintel yous tin sack uncovering the following: Version Version vulnerabilities Plugins Themes Users together with much more! Although WPintel is designed for self hosted (wordpress.org) WordPress sites, around of it's functionalities all the same piece of employment for sites hosted on wordpress.com. Video Download WPintel

Scanner-Cli - A Projection Security/Vulnerability/Risk Scanning Tool

Image
The Hawkeye scanner-cli is a projection security, vulnerability as well as full general gamble highlighting tool. It is meant to hold upwardly integrated into your pre-commit hooks as well as your pipelines. Running as well as configuring the scanner The Hawkeye scanner-cli assumes that your directory construction is such that it keeps the toolchain's files on top level. Roughly, this is what it boils downwards to: Node.js projects have got a package.json on top level Ruby projects volition have got a Gemfile on top level Python projects volition have got a requirements.txt on top level PHP projects volition have got a composer.lock on top level Java projects volition have got a build (gradle) or target (maven) folder, as well as include .java as well as .jar files This is non exhaustive equally sometimes tools require farther files to exist. To empathise how the modules produce upwardly one's hear whether they tin handgrip a project, delight cheque ...

Fierce - Semi-Lightweight Scanner That Helps Locate Non-Contiguous Ip Infinite As Well As Hostnames Against Specified Domains

Image
Fierce is a semi-lightweight scanner that helps locate non-contiguous IP infinite in addition to hostnames against specified domains. It's actually meant equally a pre-cursor to nmap, unicornscan, nessus, nikto, etc, since all of those involve that you lot already know what IP infinite you lot are looking for. This does non perform exploitation in addition to does non scan the whole network indiscriminately. It is meant specifically to locate probable targets both within in addition to exterior a corporate network. Because it uses DNS primarily you lot volition oft notice mis-configured networks that leak internal address space. That's peculiarly useful inwards targeted malware. Options: -connect Attempt to brand http connections to whatsoever non RFC1918 (public) addresses. This volition output the render headers but live on warned, this could receive got a long fourth dimension against a fellowship amongst many targets, depending on network/mach...

Bscan - An Asynchronous Target Enumeration Tool

Image
Synopsis bscan is a command-line utility to perform active information gathering together with service enumeration. At its core, bscan asynchronously spawns processes of well-known scanning utilities, repurposing scan results into highlighted console output together with a well-defined directory structure. Installation bscan was written to last run on Kali Linux , but in that place is naught inherently preventing it from running on whatever OS amongst the appropriate tools installed. Download the latest packaged version from PyPI: pip install bscan Or teach the bleeding-edge version from version control: pip install https://github.com/welchbj/bscan/archive/master.tar.gz Basic Usage bscan has a broad multifariousness of configuration options which tin last used to melody scans to your needs. Here's a quick example: $ bscan \ > --max-concurrency iii \ > --patterns [Mm]icrosoft \ > --status-interval 10 \ > --verbose-status \ > scanme.nmap.or...