Osmedeus V1.5 - Fully Automated Offensive Safety Framework For Reconnaissance Together With Vulnerability Scanning
Installation
git clone https://github.com/j3ssie/Osmedeus cd Osmedeus ./install.sh
This install exclusively focus on Kali linux, banking concern represent to a greater extent than install on Wiki pageHow to use
If you lot stimulate got no thought what are you lot doing simply type the ascendence below or banking concern represent out the Advanced Usage
./osmedeus.py -t example.com
Using Docker
Check out docker-osmedeus yesteryear mabnavarrete for docker installation as well as this wiki for to a greater extent than detail.
Features
- Subdomain Scan.
- Subdomain TakeOver Scan.
- Screenshot the target.
- Basic recon similar Whois, Dig info.
- Web Technology detection.
- IP Discovery.
- CORS Scan.
- SSL Scan.
- Wayback Machine Discovery.
- URL Discovery.
- Headers Scan.
- Port Scan.
- Vulnerable Scan.
- Seperate workspaces to shop all scan output as well as details logging.
- REST API.
- React Web UI.
- Support Continuous Scan.
- Slack notifications.
- Easily persuasion report from commnad line.
Demo
Example Commands
# normal routine ./osmedeus.py -t example.com # normal routine but ho-hum speed on subdomain module ./osmedeus.py -t example.com --slow 'subdomain' # forthwith manner examples ./osmedeus.py -m portscan -i "1.2.3.4/24" ./osmedeus.py -m portscan -I list_of_targets.txt -t result_folder ./osmedeus.py -m "portscan,vulnscan" -i "1.2.3.4/24" -t result_folder ./osmedeus.py -m "assets" -i "example.com" ./osmedeus.py -m "assets,dirb" -i "example.com" # study manner ./osemdeus.py -t example.com --report listing ./osemdeus.py -t example.com --report total ./osemdeus.py -t example.com -m subdomain --report curt ./osemdeus.py -t example.com -m "subdomain, portscan" --report total
More options
Basic Usage =========== python3 osmedeus.py -t python3 osmedeus.py -T python3 osmedeus.py -m [-i |-I ] [-t workspace_name] python3 osmedeus.py --report -t [-m ] Advanced Usage ============== [*] List all module python3 osmedeus.py -M [*] List all study manner python3 osmedeus.py --report manage [*] Running amongst specific module python3 osmedeus.py -t -m -i [*] Example ascendence python3 osmedeus.py -m subdomain -t example.com python3 osmedeus.py -t example.com --slow "subdomain" python3 osmedeus.py -t sample2 -m vuln -i hosts.txt python3 osmedeus.py -t sample2 -m dirb -i /tmp/list_of_hosts.txt Remote Options ============== --remote REMOTE Remote address for API, (default: h ttps://127.0.0.1:5000) --auth AUTH Specify authentication e.g: --auth="username:password" See your config file for to a greater extent than item (default: core/config.conf) --client simply run customer materials inward instance you lot ran the flask server earlier More options ============== --update Update lastest from git -c CONFIG, --config CONFIG Specify config file (default: core/config.conf) -w WORKSPACE, --workspace WORKSPACE Custom workspace folder -f, --force forcefulness to run the module in 1 lawsuit again if output exists -s, --slow "all" All module running equally ho-hum manner -s, --slow "subdomain" Only running ho-hum manner inward subdomain module --debug Just for debug role
Disclaimer
Most of this tool done yesteryear the authors of the tool that listing inward CREDITS.md. I'm simply position all the pieces together, summation about extra magic.
This tool is for educational purposes only. You are responsible for your ain actions. If you lot mess something upwards or intermission whatever laws spell using this software, it's your fault, as well as your error only.
Contribute
Please accept a await at CONTRIBUTING.md
Changelog
Please accept a await at CHANGELOG.md
CREDITS
Please accept a await at CREDITS.md
Contact
@j3ssiejjj