Vulnerability Scanner


INSTALLATION PROCESS

    • RUNING SINGLE COMMAND 
    • wget -O rapidscan.py https://raw.githubusercontent.com/skavngr/rapidscan/master/rapidscan.py && chmod +x rapidscan.py && ./rapidscan.py example.com
    • wget -O rapidscan.py https://raw.githubusercontent.com/skavngr/rapidscan/master/rapidscan.py 
    • chmod +x rapidscan.py 
    • ./rapidscan.py example.com

SPECIFICATION 
  • executes a multitude of security scanning tools, does other custom coded checks and prints the results spontaneously.
  • some of the tools include nmap, dnsrecon, wafw00f, uniscan, sslyze, fierce, lbd, theharvester, dnswalk, golismero etc executes under one entity.
  • checks for same vulnerabilities with multiple tools to help you zero-in on false positives effectively.
  • critical, high, medium, low and informational classification of vulnerabilities.
  • artificial intelligence to deploy tools automatically depending upon the issues found. for eg; automates the launch of wpscan and plecost tools when a wordpress installation is found. (under development)

Vulnerability Checks

  • heavy_check_mark DNS/HTTP Load Balancers & Web Application Firewalls.
  • heavy_check_mark Checks for Joomla, WordPress and Drupal
  • heavy_check_mark SSL related Vulnerabilities (HEARTBLEED, FREAK, POODLE, CCS Injection, LOGJAM, OCSP Stapling).
  • heavy_check_mark Commonly Opened Ports.
  • heavy_check_mark DNS Zone Transfers using multiple tools (Fierce, DNSWalk, DNSRecon, DNSEnum).
  • heavy_check_mark Sub-Domains Brute Forcing (DNSMap, amass, nikto)
  • heavy_check_mark Open Directory/File Brute Forcing.
  • heavy_check_mark Shallow XSS, SQLi and BSQLi Banners.
  • heavy_check_mark Slow-Loris DoS Attack, LFI (Local File Inclusion), RFI (Remote File Inclusion) & RCE (Remote Code Execution).
  • & more coming up... 

Popular posts from this blog

LINUX SYSTEM MONITORING AND ANIMATION COMMANDS

TERMUX HIDDEN TRICKS

SOCIALFISH PHISHING