Osmedeus V1.5 - Fully Automated Offensive Safety Framework For Reconnaissance Together With Vulnerability Scanning


Osmedeus allows you lot automated run the collection of awesome tools to reconnaissance as well as vulnerability scanning against the target.

Installation
git clone https://github.com/j3ssie/Osmedeus cd Osmedeus ./install.sh
This install exclusively focus on Kali linux, banking concern represent to a greater extent than install on Wiki page

How to use
If you lot stimulate got no thought what are you lot doing simply type the ascendence below or banking concern represent out the Advanced Usage
./osmedeus.py -t example.com

Using Docker
Check out docker-osmedeus yesteryear mabnavarrete for docker installation as well as this wiki for to a greater extent than detail.

Features
  • Subdomain Scan.
  • Subdomain TakeOver Scan.
  • Screenshot the target.
  • Basic recon similar Whois, Dig info.
  • Web Technology detection.
  • IP Discovery.
  • CORS Scan.
  • SSL Scan.
  • Wayback Machine Discovery.
  • URL Discovery.
  • Headers Scan.
  • Port Scan.
  • Vulnerable Scan.
  • Seperate workspaces to shop all scan output as well as details logging.
  • REST API.
  • React Web UI.
  • Support Continuous Scan.
  • Slack notifications.
  • Easily persuasion report from commnad line.
Check this Wiki page for to a greater extent than item almost each module.


Demo








Example Commands
# normal routine ./osmedeus.py -t example.com  # normal routine but ho-hum speed on subdomain module ./osmedeus.py -t example.com --slow 'subdomain'  # forthwith manner examples ./osmedeus.py -m portscan -i "1.2.3.4/24"  ./osmedeus.py -m portscan -I list_of_targets.txt -t result_folder  ./osmedeus.py -m "portscan,vulnscan" -i "1.2.3.4/24" -t result_folder  ./osmedeus.py -m "assets" -i "example.com" ./osmedeus.py -m "assets,dirb" -i "example.com"  # study manner  ./osemdeus.py -t example.com --report listing ./osemdeus.py -t example.com --report total ./osemdeus.py -t example.com -m subdomain --report curt ./osemdeus.py -t example.com -m "subdomain, portscan" --report total  

More options
Basic Usage =========== python3 osmedeus.py -t  python3 osmedeus.py -T  python3 osmedeus.py -m  [-i |-I ] [-t workspace_name] python3 osmedeus.py --report  -t  [-m ]  Advanced Usage ============== [*] List all module python3 osmedeus.py -M  [*] List all study manner python3 osmedeus.py --report manage  [*] Running amongst specific module python3 osmedeus.py -t  -m  -i   [*] Example ascendence python3 osmedeus.py -m subdomain -t example.com python3 osmedeus.py -t example.com --slow "subdomain" python3 osmedeus.py -t sample2 -m vuln -i hosts.txt python3 osmedeus.py -t sample2 -m dirb -i /tmp/list_of_hosts.txt  Remote Options ============== --remote REMOTE       Remote address for API, (default: h   ttps://127.0.0.1:5000) --auth AUTH           Specify authentication e.g: --auth="username:password"                       See your config file for to a greater extent than item (default: core/config.conf)  --client              simply run customer materials inward instance you lot ran the flask server earlier  More options ============== --update              Update lastest from git  -c CONFIG, --config CONFIG                       Specify config file (default: core/config.conf)  -w WORKSPACE, --workspace WORKSPACE                       Custom workspace folder  -f, --force           forcefulness to run the module in 1 lawsuit again if output exists -s, --slow  "all"                       All module running equally ho-hum manner -s, --slow  "subdomain"                       Only running ho-hum manner inward subdomain module  --debug               Just for debug role  

Disclaimer
Most of this tool done yesteryear the authors of the tool that listing inward CREDITS.md. I'm simply position all the pieces together, summation about extra magic.
This tool is for educational purposes only. You are responsible for your ain actions. If you lot mess something upwards or intermission whatever laws spell using this software, it's your fault, as well as your error only.

Contribute
Please accept a await at CONTRIBUTING.md

Changelog
Please accept a await at CHANGELOG.md

CREDITS
Please accept a await at CREDITS.md

Contact
@j3ssiejjj