Categories: Kali Linux

Silver : Mass Scan IPs For Vulnerable Services

masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more.

Features

  • Resumable scanning
  • Slack notifications
  • multi-core utilization
  • Vulnerability data caching
  • Smart Shodan integration*

*Shodan integration is optional but when linked, it can automatically use Shodan to retrieve service and vulnerability data if a host has a lot of ports open to save resources. Shodan credits used per scan by it can be throttled. The minimum number of ports to trigger Shodan can be configured as well.

Also Read – Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

Setup

Downloading

git clone https://github.com/s0md3v/Silver

Requirements

External Programs

Python libraries

  • psutil
  • requests

Required Python libraries can be installed by executing pip3 install -r requirements.txt in Silver directory.

Configuration

Slack WebHook, Shodan API key and limits can be configured by editing respective variables in /core/memory.py

Setting up Slack notifications

  • Create a workspace on slack, here
  • Create an app, here
  • Enable WebHooks from the app and copy the URL from there to Silver’s /core/memory.py file.

Run it as root

It requires root permission because it uses masscan under the hood which needs to be run as root to do port scanning. Use sudo.

Usage

Before you start

  • ⚠️ Run it as root and with python3 i.e. with sudo python3 silver.py <your input>
  • ⚠️ It scans all TCP ports by default i.e. ports 0-65535. Use --quick switch to only scan top ~1000 ports.

Scan host(s) from command line

python3 silver.py 127.0.0.1
python3 silver.py 127.0.0.1/22
python3 silver.py 127.0.0.1,127.0.0.2,127.0.0.3

Scan top ~1000 ports

python3 silver.py 127.0.0.1 –quick

Scan hosts from a file

python3 silver.py -i /path/to/targets.txt

Set max number of parallel nmap instances

python3 silver.py -i /path/to/targets.txt -t 4

R K

Recent Posts

Burrow – Breaking Through Firewalls With Open Source Ingenuity

Burrow is an open source tool for burrowing through firewalls, built by teenagers at Hack Club.…

12 hours ago

Its-A-Trap : Building Secure Web Applications With A Golang Web Server For Authentication

Simple golang webserver that listens for basic auth or post requests and sends a notification…

12 hours ago

Nutek-Apple : Unleashing Power On macOS And Linux

Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and…

12 hours ago

SecureSphere Labs – A Haven For Cybersecurity Innovators And Ethical Hackers

Welcome to SecureSphere Labs, your go-to destination for a curated collection of powerful hacking tools…

12 hours ago

Vulpes/VulpOS : The Docker-Powered All-in-One Workstation For Penetration Testing And Offsec Labs

All in one Docker-based workstation with hacking tools for Pentesting and offsec Labs by maintained…

12 hours ago

LiCo-Extrator : Revolutionizing Icon Extraction Across Platforms

Got it! Below is the updated README.md file with instructions for downloading the project on…

1 day ago