예제 #1
0
def specific(options, module):
    module = module.lower()

    # checking the tool is installed right or not and exit
    if 'health' in module:
        health = healcheck.Healcheck(options)
        if health.checking():
            utils.print_good("All things look fine")
        else:
            utils.print_bad("Installing Osmedeus not correctly done")
        utils.just_shutdown_flask(options)
        sys.exit(0)

    initials.Initials(options)

    if 'sub' in module or 'subdomain' in module:
        subdomain.SubdomainScanning(options)
        takeover.TakeOverScanning(options)
        screenshot.ScreenShot(options)
        cors.CorsScan(options)
        recon.Recon(options)
        assetfinding.AssetFinding(options)

    if 'ip' in module:
        # Discovery IP space
        ipspace.IPSpace(options)

    if 'screen' in module:
        # Discovery IP space
        screenshot.ScreenShot(options)

    if 'portscan' in module:
        # scanning port, service and vuln with masscan and nmap
        portscan.PortScan(options)

    if 'headers' in module:
        headers.HeadersScan(options)

    if 'asset' in module:
        assetfinding.AssetFinding(options)

    if 'vuln' in module:
        # scanning vulnerable service based on version
        vulnscan.VulnScan(options)

    if 'dir' in module:
        # run blind directory brute force directly
        dirbrute.DirBrute(options)

    if 'brute' in module or 'force' in module:
        # running brute force things based on scanning result
        brutethings.BruteThings(options)

    if 'git' in module:
        gitscan.GitScan(options)

    # if 'burp' in module:
    #     burpstate.BurpState(options)

    conclusion.Conclusion(options)
예제 #2
0
def specific(options, module):
    module = module.lower()

    initials.Initials(options)

    if 'sub' in module or 'subdomain' in module:
        subdomain.SubdomainScanning(options)
        takeover.TakeOverScanning(options)
        screenshot.ScreenShot(options)
        cors.CorsScan(options)
        recon.Recon(options)
        assetfinding.AssetFinding(options)

    if 'ip' in module:
        # Discovery IP space
        ipspace.IPSpace(options)

    if 'screen' in module:
        # Discovery IP space
        screenshot.ScreenShot(options)

    if 'portscan' in module:
        # scanning port, service and vuln with masscan and nmap
        portscan.PortScan(options)

    if 'headers' in module:
        headers.HeadersScan(options)

    if 'asset' in module:
        assetfinding.AssetFinding(options)

    if 'vuln' in module:
        # scanning vulnerable service based on version
        vulnscan.VulnScan(options)

    if 'dir' in module:
        # run blind directory brute force directly
        dirbrute.DirBrute(options)

    if 'brute' in module or 'force' in module:
        # running brute force things based on scanning result
        brutethings.BruteThings(options)

    if 'git' in module:
        gitscan.GitScan(options)

    # if 'burp' in module:
    #     burpstate.BurpState(options)

    conclusion.Conclusion(options)
예제 #3
0
def normal(options):

    utils.print_good("Running with {0} speed".format(options['SPEED']))

    # Create skeleton json
    initials.Initials(options)

    # Finding subdomain
    subdomain.SubdomainScanning(options)

    # waiting for previous module
    utils.just_waiting(options, 'SubdomainScanning')

    # Scanning for subdomain take over
    takeover.TakeOverScanning(options)

    # Screen shot the target on common service
    screenshot.ScreenShot(options)

    # Recon
    recon.Recon(options)

    # Recon
    assetfinding.AssetFinding(options)

    # Scanning for CorsScan
    cors.CorsScan(options)

    # Discovery IP space
    ipspace.IPSpace(options)

    # SSL Scan
    sslscan.SSLScan(options)

    # Headers Scan
    headers.HeadersScan(options)

    # Note: From here the module gonna take really long time
    # for scanning service and stuff like that
    utils.print_info('This gonna take a while')

    # Scanning all port using result from subdomain scanning
    # and also checking vulnerable service based on version
    portscan.PortScan(options)

    # Directory scan
    dirbrute.DirBrute(options)

    # Starting vulnerable scan
    vulnscan.VulnScan(options)

    # brutethings.BruteThings(options)

    conclusion.Conclusion(options)