Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
Installation
git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh
This install only focus on Kali linux
How To Use?
If you have no idea what are you doing just type the command below or check out the Advanced Usage
Also Read – Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks
Demo
Example Commands
#normal routine
./osmedeus.py -t example.com
./osmedeus.py -T list_of_target.txt
#normal routine but slow speed on subdomain module
./osmedeus.py -t example.com –slow ‘all’
#direct mode examples
./osmedeus.py -m subdomain -t example.com
./osmedeus.py -m portscan -i “1.2.3.4/24”
./osmedeus.py -m “portscan,vulnscan” -i “1.2.3.4/24” -w result_folder
./osmedeus.py -m “git” -i ‘repo:https://github.com/foo/bar’
./osmedeus.py -m “git” -i ‘user:sample’
#direct list mode examples
./osmedeus.py -m portscan -I list_of_targets.txt
./osmedeus.py -m portscan,vulnscan -I list_of_targets.txt
./osmedeus.py -m screen -I list_of_targets.txt -w result_folder
#report mode
./osemdeus.py -t example.com –report list
./osemdeus.py -t example.com –report export
./osemdeus.py -t example.com –report sum
./osemdeus.py -t example.com –report short
./osemdeus.py -t example.com –report full
Disclaimer
Most of this tool done by the authors of the tool that list in CREDITS.md. I’m just put all the pieces together, plus some extra magic.
This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.
Credits : @j3ssiejjj , @gujjuboy10x00
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…
A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…