Vulnx V1.7 - An Intelligent Bot Automobile Trounce Injector That Discovery Vulnerabilities Inward Multiple Types Of Cms



Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities inwards multiple types of Cms, fast cms detection, information gathering together with vulnerability Scanning of the target similar subdomains, IP addresses, country, org, timezone, region, together with and to a greater extent than ...
Instead of injecting each together with every trounce manually similar all the other tools do, VulnX analyses the target website checking the presence of vulnerability if together with thence the trounce volition last Injected. searching URLs amongst dorks Tool.

Features
  • Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
  • Target informations gatherings
  • Target Subdomains gathering
  • Multi-threading on demand
  • Checks for vulnerabilities
  • Auto trounce injector
  • Exploit dork searcher
  • Ports Scan High Level
  • Dns-Servers Dump
  • Input multiple target to scan.
  • Dorks Listing yesteryear Name& yesteryear ExploitName.
  • Export multiple target from Dorks into a logfile.

DNS-Map-Results
To produce this,run a scan amongst the --dns flag together with -d for subdomains. To generate a map of isetso.rnu.tn, y'all tin plow over the axe run the ascendency vulnx -u isetso.rnu.tn --dns -d --output $PATHin a novel terminal.
$PATH : Where the graphs results volition last stored.


Let's generates an picture displaying target Subdomains,MX & DNS data.


Exploits


Joomla

Wordpress

Drupal

PrestaShop

Opencart

Available command line options
READ VULNX WIKI
usage: vulnx [options]    -u --url              url target   -D --dorks            search webs amongst dorks   -o --output           specify output directory   -t --timeout          http requests timeout   -c --cms-info         search cms info[themes,plugins,user,version..]   -e --exploit          searching vulnerability & run exploits   -w --web-info         spider web informations gathering   -d --domain-info      subdomains informations gathering   -l, --dork-list       listing names of dorks exploits   -n, --number-page     number page of search engine(Google)   -p, --ports           ports to scan   -i, --input           specify domains to scan from an input file    --threads             number of threads   --dns                 dns informations gathering

Docker
VulnX inwards DOCKER !!.
$ git clone https://github.com/anouarbensaad/VulnX.git $ cd VulnX $ docker construct -t vulnx ./docker/ $ docker run -it --name vulnx vulnx:latest -u http://exemple.com
run vulnx container inwards interactive mode


to persuasion logfiles mountain it inwards a book similar so:
$ docker run -it --name vulnx -v "$PWD/logs:/VulnX/logs" vulnx:latest -u http://exemple.com
alter the mounting directory..
VOLUME [ "$PATH" ]

Install vulnx on Ubuntu
$ git clone https://github.com/anouarbensaad/vulnx.git $ cd VulnX $ chmod +x install.sh $ ./install.sh
Now run vulnx

Install vulnx on Termux
$ pkg update $ pkg install -y git $ git clone http://github.com/anouarbensaad/vulnx $ cd vulnx $ chmod +x install.sh $ ./install.sh


example ascendency amongst options : settimeout=3 , cms-gathering = all , -d subdomains-gathering , run --exploits
vulnx -u http://example.com --timeout three -c all -d -w --exploit

example ascendency for searching dorks : -D or --dorks , -l --list-dorks
vulnx --list-dorks provide tabular array of exploits name. vulnx -D blaze provide urls institute amongst blaze dork