Skip to content

Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning (Under Development)

License

Notifications You must be signed in to change notification settings

r3dxpl0it/TheXFramework

Repository files navigation

TheXFramework (THIS REPO IS UNDER OPEN-SOURCE DEVELOPMENT)

Network/WebApplication Information Gathering, Enumeration and Vulnerability Scanning Framework For Most Common Attacks Based On OWASP Methodology and P.T. Guide.

The XFramework Is a Light in Darkness

  • Network Scanner
    • Network Scanning For Open/Filter Ports
  • X-Attacker Core
    • Information Gathering
    • CMS Identifier (More Than 120 CMS)
    • WAF Testing (Enumeration, Limited Firewall Bypass Recommendation)
    • CMS-ENUMERATION For Drupal/Wordpress/Joomla/Vb
    • Crawler For URL with Parameters
    • LFI, RFI, and RCE
    • Sql-injection
    • Template-Injection
    • Basic XSS Check
    • CSRF Scan
    • Brute force directories and files in websites

What Tools It You Can Use in TheXFramework ?

  • Nmap
  • Raccoon
  • NSE Scripts
  • Golismero and Golismero Plugin Nikto
  • CMSmap/WPScan/WPsecu/Droopscan/Joomscan [CMS Attacks]
  • Photon
  • Crawler Engine
  • Sqlmap
  • Tplmap
  • Sqliv
  • XssPy
  • Xsstrick
  • Bunch of Other Scrpits/Tools

Installation

One Line Installation and Use :

sudo git clone https://github.com/r3dxpl0it/TheXFramework TXF && cd TXF && sudo chmod +x install.sh && ./install.sh && ./xframework.py

Note : This Framework has Beed Developed In Kali Linux For Kali Linux ALthough you might also try it on any DEBIAN distro. please note that it if you want to use it On Parrot OS / Ubuntu Make Sure Every Single Package Have been Installed Successfully

Usage

usage: ./xframework.py -u <Target> [Options/Scans]

optional arguments:
  -h, --help         show this help message and exit

Required Options:
  -u URL, --url URL  root url

Scans:
  --banner           Grab Target Banner
  --wafbanner        Agressive Banner Grabbing with Limited WAF detection
  --wafstress        Web Application Firewall Stress(Optional : Fuzzfile)
  --waf              Web ApplicationFirewall and Server Service Detection
  --cms              CMS Identifier
  --lfi              Local File Inclution Attack (Optional : Fuzzfile)
  --clickjack        clickjack Vuln Scan
  --tempi            Template Injection Attack
  --sqlimini         Pre-Enumeration Simple Sqli Attacks
  --sqliv            Enumeration Simple Sqli Attacks
  --sqlmap           Identify Databases with Sqlmap
  --sqlmapdump       Identify Databases with Sqlmap
  --xssmini          Pre-Enumeration Simple Cross Siting Scripting
  --xsspy            Pre-Enumeration Simple Cross Siting Scripting
  --drupal           Droopal Full Enumeration
  --wordpress        Wordpress Full Enumeration with wpscan
  --wordpress2       Wordpress Full Enumeration with wpseku
  --joomla           Joomla Full Enumeration with wpseku
  --golismero        Target Full Enumeration with golismero
  --raccoon          Raccoon Framework Full Scan
  --shellshock       Scan For shellshock
  --xssstrick        Scan a URL For XSS injection with XSS-Strick

Crawler Engine:
  --crawler          Run Crawler
  --deep             Run Crawler With Deep Depth
  --photon           Run Crawler With Minimized Photon Engine
  --photonold        Run Crawler With Photon Engine

What Would Make TheXFramework Very Intresting (Soon)

  1. We Aim to Add an Semi-Automation Process to TheXFramework In Very Near Future That would Also do Standard P.T. and V.A. For Targets
  2. Adding an Interprator That Aim to Log/History/Report Based on the The Commands and Output Function

What Is Under Development and What is The Future ?

This Options Are Under Development But They will be added to Version 2 of TXF

  • Enumeration and Port Vuln Scanner
  • Auto Network Port Scanner
  • Auto web Application Scanner
  • Threading
  • Plugin Engine

To Add In Future :

  • Metasploit
  • Zmap
  • wapiti / WAFW00F / Commix