Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
Installation
git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh
This install only focus on Kali linux
How To Use?
If you have no idea what are you doing just type the command below or check out the Advanced Usage
Also Read – Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks
Demo
Example Commands
#normal routine
./osmedeus.py -t example.com
./osmedeus.py -T list_of_target.txt
#normal routine but slow speed on subdomain module
./osmedeus.py -t example.com –slow ‘all’
#direct mode examples
./osmedeus.py -m subdomain -t example.com
./osmedeus.py -m portscan -i “1.2.3.4/24”
./osmedeus.py -m “portscan,vulnscan” -i “1.2.3.4/24” -w result_folder
./osmedeus.py -m “git” -i ‘repo:https://github.com/foo/bar’
./osmedeus.py -m “git” -i ‘user:sample’
#direct list mode examples
./osmedeus.py -m portscan -I list_of_targets.txt
./osmedeus.py -m portscan,vulnscan -I list_of_targets.txt
./osmedeus.py -m screen -I list_of_targets.txt -w result_folder
#report mode
./osemdeus.py -t example.com –report list
./osemdeus.py -t example.com –report export
./osemdeus.py -t example.com –report sum
./osemdeus.py -t example.com –report short
./osemdeus.py -t example.com –report full
Disclaimer
Most of this tool done by the authors of the tool that list in CREDITS.md. I’m just put all the pieces together, plus some extra magic.
This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.
Credits : @j3ssiejjj , @gujjuboy10x00
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…