Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.

Installation

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

This install only focus on Kali linux, check more install on Wiki page

How To Use

If you have no idea what are you doing just type the command below or check out the Advanced Usage

./osmedeus.py -t example.com

Features

  • Subdomain Scan.
  • Subdomain TakeOver Scan.
  • Screenshot the target.
  • Basic recon like Whois, Dig info.
  • Web Technology detection.
  • IP Discovery.
  • CORS Scan.
  • SSL Scan.
  • Wayback Machine Discovery.
  • URL Discovery.
  • Headers Scan.
  • Port Scan.
  • Vulnerable Scan.
  • Seperate workspaces to store all scan output and details logging.
  • REST API.
  • React Web UI.
  • Support Continuous Scan.
  • Slack notifications.
  • Easily view report from commnad line.

Also Read – KRF : A Kernelspace Randomized Faulter

Example Commands

==>normal routine
./osmedeus.py -t example.com

==>normal routine but slow speed on subdomain module
./osmedeus.py -t example.com –slow ‘subdomain’

==>direct mode examples
./osmedeus.py -m portscan -i “1.2.3.4/24”

./osmedeus.py -m portscan -I list_of_targets.txt -t result_folder

./osmedeus.py -m “portscan,vulnscan” -i “1.2.3.4/24” -t result_folder

./osmedeus.py -m “assets” -i “example.com”
./osmedeus.py -m “assets,dirb” -i “example.com”

==>report mode
./osemdeus.py -t example.com –report list
./osemdeus.py -t example.com –report sum
./osemdeus.py -t example.com -m subdomain –report short
./osemdeus.py -t example.com -m “subdomain, portscan” –report full

More Options

==>Basic Usage

python3 osmedeus.py -t
python3 osmedeus.py -T
python3 osmedeus.py -m [-i |-I ] [-t workspace_name]
python3 osmedeus.py –report -t [-m ]

==>Advanced Usage

[*] List all module
python3 osmedeus.py -M

[*] List all report mode
python3 osmedeus.py –report help

[*] Running with specific module
python3 osmedeus.py -t -m -i

[*] Example command
python3 osmedeus.py -m subdomain -t example.com
python3 osmedeus.py -t example.com –slow “subdomain”
python3 osmedeus.py -t sample2 -m vuln -i hosts.txt
python3 osmedeus.py -t sample2 -m dirb -i /tmp/list_of_hosts.txt

==>Remote Options

–remote REMOTE Remote address for API, (default: https://127.0.0.1:5000)
–auth AUTH Specify authentication e.g: –auth=”username:password”
See your config file for more detail (default: core/config.conf)
–client just run client stuff in case you ran the flask server before

==>More options

–update Update lastest from git -c CONFIG, –config CONFIG
Specify config file (default: core/config.conf)
-w WORKSPACE, –workspace WORKSPACE : Custom workspace folder
-f, –force force to run the module again if output exists
-s, –slow “all” : All module running as slow mode
-s, –slow “subdomain” : Only running slow mode in subdomain module
–debug Just for debug purpose

Demo

Screenshot

Disclaimer

Most of this tool done by the authors of the tool that list in CREDITS.md. I’m just put all the pieces together, plus some extra magic. This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

1 week ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

1 week ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

2 weeks ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 months ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago