def routine(options): utils.print_good("Running with {0} speed".format(options['speed'])) #Finding subdomain subdomain.SubdomainScanning(options) #Scanning for subdomain take over takeover.TakeOverScanning(options) #Screen shot the target on common service screenshot.ScreenShot(options) #Scanning for CorsScan cors.CorsScan(options) #Discovery IP space ipspace.IPSpace(options) #SSL Scan sslscan.SSLScan(options) ##### Note: From here the module gonna take really long time for scanning service and stuff like that utils.print_info('This gonna take a while') #Scanning all port using result from subdomain scanning and also checking vulnerable service based on version portscan.PortScan(options) #Starting vulnerable scan vulnscan.VulnScan(options) #Brute force service from port scan result brutethings.BruteThings(options)
def normal(options): utils.print_good("Running with {0} speed".format(options['SPEED'])) # Create skeleton json initials.Initials(options) # Finding subdomain subdomain.SubdomainScanning(options) # waiting for previous module utils.just_waiting(options, 'SubdomainScanning') # Scanning for subdomain take over takeover.TakeOverScanning(options) # Screen shot the target on common service screenshot.ScreenShot(options) # Recon recon.Recon(options) # Recon assetfinding.AssetFinding(options) # Scanning for CorsScan cors.CorsScan(options) # Discovery IP space ipspace.IPSpace(options) # SSL Scan sslscan.SSLScan(options) # Headers Scan headers.HeadersScan(options) # Note: From here the module gonna take really long time # for scanning service and stuff like that utils.print_info('This gonna take a while') # Scanning all port using result from subdomain scanning # and also checking vulnerable service based on version portscan.PortScan(options) # Directory scan dirbrute.DirBrute(options) # Starting vulnerable scan vulnscan.VulnScan(options) # brutethings.BruteThings(options) conclusion.Conclusion(options)