Osmedeus is a Workflow Engine for Offensive Security.
Installation
NOTE that you need some essential tools like curl, wget, git, zip
and login as root to start
bash -c “$(curl -fsSL https://raw.githubusercontent.com/osmedeus/osmedeus-base/master/install.sh)”
Build the engine from source
Make sure you installed golang >= v1.17
mkdir -p $GOPATH/src/github.com/j3ssie
git clone –depth=1 https://github.com/j3ssie/osmedeus $GOPATH/src/github.com/j3ssie/osmedeus
cd $GOPATH/src/github.com/j3ssie/osmedeus
make build
Usage
Scan Usage:
osmedeus scan -f [flowName] -t [target]
osmedeus scan -m [modulePath] -T [targetsFile]
osmedeus scan -f /path/to/flow.yaml -t [target]
osmedeus scan -m /path/to/module.yaml -t [target] –params ‘port=9200’
osmedeus scan -m /path/to/module.yaml -t [target] -l /tmp/log.log
cat targets | osmedeus scan -f sample
Practical Scan Usage:
osmedeus scan -T list_of_targets.txt -W custom_workspaces
osmedeus scan -t target.com -w workspace_name –debug
osmedeus scan -f general -t www.sample.com
osmedeus scan -f gdirb -T list_of_target.txt
osmedeus scan -m ~/.osmedeus/core/workflow/test/dirbscan.yaml -t list_of_urls.txt
osmedeus scan –wfFolder ~/custom-workflow/ -f your-custom-workflow -t list_of_urls.txt
Provider Usage:
osmedeus provider build
osmedeus provider build –token xxx –rebuild –ic
osmedeus provider create –name ‘sample’
osmedeus provider health –debug
Cloud Usage:
osmedeus cloud -f [flowName] -t [target]
osmedeus cloud -m [modulePath] -t [target]
osmedeus cloud -c 10 -f [flowName] -T [targetsFile]
osmedeus cloud –token xxx -G -c 10 -f [flowName] -T [targetsFile]
osmedeus cloud –chunk -c 10 -f [flowName] -t [targetsFile]
Utilities Usage:
osmedeus health
osmedeus version –json
osmedeus utils tmux ls
osmedeus utils tmux logs -A -l 10
osmedeus utils ps
osmedeus utils ps –proc ‘jaeles’
osmedeus utils cron –cmd ‘osmdeus scan -t example.com’ –sch 60
osmedeus utils cron –for –cmd ‘osmedeus scan -t example.com’
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…