def specific(options, module): module = module.lower() # checking the tool is installed right or not and exit if 'health' in module: health = healcheck.Healcheck(options) if health.checking(): utils.print_good("All things look fine") else: utils.print_bad("Installing Osmedeus not correctly done") utils.just_shutdown_flask(options) sys.exit(0) initials.Initials(options) if 'sub' in module or 'subdomain' in module: subdomain.SubdomainScanning(options) takeover.TakeOverScanning(options) screenshot.ScreenShot(options) cors.CorsScan(options) recon.Recon(options) assetfinding.AssetFinding(options) if 'ip' in module: # Discovery IP space ipspace.IPSpace(options) if 'screen' in module: # Discovery IP space screenshot.ScreenShot(options) if 'portscan' in module: # scanning port, service and vuln with masscan and nmap portscan.PortScan(options) if 'headers' in module: headers.HeadersScan(options) if 'asset' in module: assetfinding.AssetFinding(options) if 'vuln' in module: # scanning vulnerable service based on version vulnscan.VulnScan(options) if 'dir' in module: # run blind directory brute force directly dirbrute.DirBrute(options) if 'brute' in module or 'force' in module: # running brute force things based on scanning result brutethings.BruteThings(options) if 'git' in module: gitscan.GitScan(options) # if 'burp' in module: # burpstate.BurpState(options) conclusion.Conclusion(options)
def save_log(self): logfile = utils.replace_argument(self.options, '$WORKSPACE/log.json') utils.save_all_cmd(self.options, logfile) if self.options.get('CLIENT'): utils.just_shutdown_flask(self.options)
def save_log(self): logfile = utils.replace_argument(self.options, '$WORKSPACE/log.json') utils.save_all_cmd(logfile) utils.just_shutdown_flask()