Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
Installation
git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh
This install only focus on Kali linux
How To Use?
If you have no idea what are you doing just type the command below or check out the Advanced Usage
Also Read – Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks
Demo
Example Commands
#normal routine
./osmedeus.py -t example.com
./osmedeus.py -T list_of_target.txt
#normal routine but slow speed on subdomain module
./osmedeus.py -t example.com –slow ‘all’
#direct mode examples
./osmedeus.py -m subdomain -t example.com
./osmedeus.py -m portscan -i “1.2.3.4/24”
./osmedeus.py -m “portscan,vulnscan” -i “1.2.3.4/24” -w result_folder
./osmedeus.py -m “git” -i ‘repo:https://github.com/foo/bar’
./osmedeus.py -m “git” -i ‘user:sample’
#direct list mode examples
./osmedeus.py -m portscan -I list_of_targets.txt
./osmedeus.py -m portscan,vulnscan -I list_of_targets.txt
./osmedeus.py -m screen -I list_of_targets.txt -w result_folder
#report mode
./osemdeus.py -t example.com –report list
./osemdeus.py -t example.com –report export
./osemdeus.py -t example.com –report sum
./osemdeus.py -t example.com –report short
./osemdeus.py -t example.com –report full
Disclaimer
Most of this tool done by the authors of the tool that list in CREDITS.md. I’m just put all the pieces together, plus some extra magic.
This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.
Credits : @j3ssiejjj , @gujjuboy10x00
Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…
Managing files efficiently is a core skill for anyone working in Linux, whether you're a…
Open ports act as communication endpoints between your Linux system and the outside world. Every…
Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…
Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…