Displaying 1 to 7 from 7 results

DorkNet - Selenium powered Python script to automate searching for vulnerable web apps.

  •    Python

Selenium powered Python script to automate searching the web for vulnerable applications. DorkNet can take a single dork or a list of dorks as arguments. After the proper command line arguments have been passed, the script will use Selenium and Geckodriver to find the results we want and save them to a textfile for further processing with SQLmap or similar utilities.

PyParser-CVE - Multi source CVE/exploit parser.

  •    Python

PyParser is a vulnerability parser that looks for CVE's from different sources. It employs the Shodan API, has the ability to retrieve and process data from CVE Mitre and comes with functionality to install and use Offensive Security's ExploitDB Searchsploit utility. Start the program from the command line with python cveparser.py. Once the program has been started it will prompt for your Shodan.io API key. Once provided it will prompt to install Searchsploit, which is optional. After these operations a menu will be displayed the options for which are as follows.

QuickScan - Port scanning and domain utility.

  •    Python

QuickScan is a simple port scanning utility with some useful supporting features. As such it comes with functionality to query DNS in order to resolve domains and has a built in WHOIS lookup. Conveniently the program saves the results of your scans and assorted operations to an application log in the current working directory for future reference and/or further processing. Starting the program from the terminal python quickscan.py without arguments, will show you a quick introduction message and some usage information. The full set of options available to you are as follows.

contact.sh - An OSINT tool to find contacts in order to report security vulnerabilities.

  •    Shell

An OSINT tool to find contacts in order to report security vulnerabilities. Make sure you have installed the whois and jq packages.




Offensive-Dockerfiles - Personal implementation of offensive tools as Dockerfiles

  •    Python

Personal implementation of offensive tools as Dockerfiles. Uses either alpine or python-slim base