Categories: Kali Linux

Osmedeus – Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning

Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.

Installation

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

This install only focus on Kali linux

How To Use?

If you have no idea what are you doing just type the command below or check out the Advanced Usage

  • ./osmedeus.py -t example.com
  • Features
  • Subdomain Scan.
  • Subdomain TakeOver Scan.
  • Screenshot the target.
  • Basic recon like Whois, Dig info.
  • Web Technology detection.
  • IP Discovery.
  • CORS Scan.
  • SSL Scan.
  • Wayback Machine Discovery.
  • URL Discovery.
  • Headers Scan.
  • Port Scan.
  • Vulnerable Scan.
  • Seperate workspaces to store all scan output and details logging.
  • REST API.
  • React Web UI.
  • Support Continuous Scan.
  • Slack notifications.
  • Easily view report from commnad line.

Also Read – Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks

Demo

Example Commands

#normal routine
./osmedeus.py -t example.com
./osmedeus.py -T list_of_target.txt

#normal routine but slow speed on subdomain module
./osmedeus.py -t example.com –slow ‘all’

#direct mode examples
./osmedeus.py -m subdomain -t example.com
./osmedeus.py -m portscan -i “1.2.3.4/24”

./osmedeus.py -m “portscan,vulnscan” -i “1.2.3.4/24” -w result_folder
./osmedeus.py -m “git” -i ‘repo:https://github.com/foo/bar’
./osmedeus.py -m “git” -i ‘user:sample’

#direct list mode examples
./osmedeus.py -m portscan -I list_of_targets.txt
./osmedeus.py -m portscan,vulnscan -I list_of_targets.txt
./osmedeus.py -m screen -I list_of_targets.txt -w result_folder

#report mode
./osemdeus.py -t example.com –report list
./osemdeus.py -t example.com –report export
./osemdeus.py -t example.com –report sum
./osemdeus.py -t example.com –report short
./osemdeus.py -t example.com –report full

Disclaimer

Most of this tool done by the authors of the tool that list in CREDITS.md. I’m just put all the pieces together, plus some extra magic.

This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.

Credits :  @j3ssiejjj ,  @gujjuboy10x00

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

6 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

6 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

6 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago