Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
Installation
git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh
This install only focus on Kali linux
How To Use?
If you have no idea what are you doing just type the command below or check out the Advanced Usage
Also Read – Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks
Demo
Example Commands
#normal routine
./osmedeus.py -t example.com
./osmedeus.py -T list_of_target.txt
#normal routine but slow speed on subdomain module
./osmedeus.py -t example.com –slow ‘all’
#direct mode examples
./osmedeus.py -m subdomain -t example.com
./osmedeus.py -m portscan -i “1.2.3.4/24”
./osmedeus.py -m “portscan,vulnscan” -i “1.2.3.4/24” -w result_folder
./osmedeus.py -m “git” -i ‘repo:https://github.com/foo/bar’
./osmedeus.py -m “git” -i ‘user:sample’
#direct list mode examples
./osmedeus.py -m portscan -I list_of_targets.txt
./osmedeus.py -m portscan,vulnscan -I list_of_targets.txt
./osmedeus.py -m screen -I list_of_targets.txt -w result_folder
#report mode
./osemdeus.py -t example.com –report list
./osemdeus.py -t example.com –report export
./osemdeus.py -t example.com –report sum
./osemdeus.py -t example.com –report short
./osemdeus.py -t example.com –report full
Disclaimer
Most of this tool done by the authors of the tool that list in CREDITS.md. I’m just put all the pieces together, plus some extra magic.
This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.
Credits : @j3ssiejjj , @gujjuboy10x00
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…