Vault_Scanner : Swiss Army Knife For Hackers - TechnoExploit

Breaking

Post Top Ad

Post Top Ad

Friday, December 28, 2018

Vault_Scanner : Swiss Army Knife For Hackers


VAULT

swiss army knife for hackers


Features

  • Scan website for the following vulnerabilities

  •  XSS
  •  LFI
  •  RFI
  •  SQLi

Scanner

  • Port scanning : ACK, FIN, NULL, XMAS
  •  IP scanning : Ping Sweep, ARP
  •  SSL vulnerability scan
  •  OS scan
  •  Hash scanner

Others



  • nformation Gathering
    •  Clickjacking
    •  jQuery version checking
    •  Insecure cookie flags
    •  Testing HTTP methods
    •  Insecure headers
    •  Header/banner grabbing
    • Finder
      •  Find comments in source code
      •  Find e-mails in source code
  •  Session fixation through cookie injection
  •  Brute force login through authorization headers
  •  URL Fuzzer
  •  WHOIS Lookup
  •  Google Dork
  •  Error handler checker
  •  Admin panel finder
  •  Open redirect vulnerability
  •  CMS Detection
  •  Detect Honeypots
  •  Detect DDoS attack
  •  Detect De-authentication attack

Crawling

  • Crawl a website and collect all the links
  •  Crawl and scrape the website for images

Attacks

  • DDoS Attack
  •  ARP Spoofer
  •  DNS Spoofer
  •  De-authentication attack
  •  Network disassociation attack
  •  Ping of death
  •  MAC Flood Attack


Utilities

  • Generate customized backdoor
  •  Data monitoring
  •  Keylogger
  •  SSH Tunnelling
  •  Generate sitemap
  •  MAC address changer
  •  Traceroute

Install

git clone https://github.com/abhisharma404/vault_scanner.git
cd vault_scanner
sudo apt-get install python3-pip
sudo pip3 install virtualenv
virtualenv venv
source venv/bin/activate
pip3 install -r requirements.txt
Starting Vault :
cd vault_scanner/src
python3 vault.py

Usage



usage: vault.py [-h] [-u URL] [-p PORT] [-sp START_PORT] [-ep END_PORT] [-ssl] [-info] [-comment] [-fuzz] [-ip IP] [-t THREADS] [-source_port SOURCE_PORT] [-fin] [-null] [-ack] [-xmas] [-c] [-xss] [-this] [-ping_sweep] [-ip_start_range IP_START_RANGE] [-ip_end_range IP_END_RANGE] [-lfi] [-whois] [-o OUTPUT] [-d DORK] optional arguments: -h, --help show this help message and exit -u URL, --url URL URL for scanning -p PORT, --port PORT Single port for scanning -d DORK,--dork DORK Performs Google Dorking -sp START_PORT, --start_port START_PORT Start port for scanning -ep END_PORT, --end_port END_PORT End port for scanning -ssl perform SSL scan -info Gather information -comment Finding comments -fuzz Fuzzing URL -ip IP, --ip IP IP address for port scanning -t THREADS, --threads THREADS Number of threads to use -source_port SOURCE_PORT Source port for sending packets -fin Perform FIN Scan -null Perform NULL Scan -ack Perform TCP ACK Scan -xmas Perform XMAS Scan -c, --crawl Crawl and collect all the links -xss Scan for XSS vulnerabilities -this Only scan the given URL, do not crawl -ping_sweep ICMP ECHO request -ip_start_range IP_START_RANGE Start range for scanning IP -ip_end_range IP_END_RANGE End range for scanning IP -lfi Scan for LFI vulnerabilities -whois perform a whois lookup of a given IP -o OUTPUT, --output OUTPUT Output all data



Copyright (c) [2018] [Abhishek Sharma]


2 comments:

Post Top Ad