Host discovery and service enumeration are part of every network pentest and routine check.
It’s relatively straightforward, and we could all probably do it in our sleep (you will be with this tool), but doing it thoroughly is still tedious and wastes valuable time.
Zero-E (ZrE) aims to automate the entire process in a fire-and-forget manner, from initial open port and live host discovery scans to in-depth scanning of only active hosts and open ports, to free up our attention to work on other things and save valuable time.
It uses a thoughtful, extensively-tested methodology that balances accuracy and efficiency.
It’s zero effort, zero error network enumeration made easy with zero experience required. Among many other functions, it generates multiple files for various analysis purposes.
So embrace your inner script kiddie, sit back in your reclining ergonomic chair, and take a nap while ZrE does your work for you.
Please consider supporting this project with BuyMeACoffee or Bitcoin (wallet address: 37Gofs5XGv8zB8odoFTJLv8NZk9TvwSr3i)
--count
option to calculate and display the total number of target IP addresses--geniplist
option that generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file without needing ipcalc or prips--only
option to enable only UDP scanning and/or running only the specified stage/scan --ngineer
option that enables the entry of custom masscan and nmap options for each scan (experimental)sudo ./zero-e.sh
sudo ./zero-e.sh [-e || -i] [-o output_directory] [-t targets_file] [-x [excludes_file]] [-U || -u] [-S [stage] || -s] [--count filename] [--geniplist filename] [--ngineer] [--only]
--help
: Self-explanatory — does not require sudo--count
: Calculates and displays the total number of target IP addresses — does not require sudo--geniplist
: Generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file — does not require sudo--ngineer
: Enables entry of custom masscan and Nmap command options--only
: Only run UDP scans if enabled, and/or specified stage if provided — does not apply to other options--defaults
: Runs ZrE using default settings — using options with this will overwrite the default for that option -e
: Tells ZrE to run external methodology scans — cannot be used with -i-i
: Tells ZrE to run internal methodology scans — cannot be used with -e-o
: Sets the output directory where generated files will be saved to-t
: Sets the file containing the target IP addresses — each single IP, range, or CIDR must be on a new line-x
: Sets the file containing the IP addresses to exclude — provide no argument to disable and not be prompted-U
: Enables UDP scans — cannot be used with -u-u
: Disables UDP scans — cannot be used with -U-S
: With no arguments, resumes from saved stage — cannot be used with -s -s
: Disables stage resuming and selection and starts at initial alives scan — cannot be used with -S zero-e.sh
to PATH, so it’s able to be called as a command from anywhere installzre.sh
, which will add Zero-E to PATH for you; or use -b
to specify a destination.zrepath
) in my shell (~/.zshrc
) that quickly copies ZrE into the primary PATH directory (/usr/local/bin
) as zeroe
for quick updating when changes are made alias zrepath='sudo cp /path/to/zero-e.sh /usr/local/bin/zeroe && sudo chmod +x /usr/local/bin/zeroe'
installzre.sh
or your aliaszeroe
if zrepath.sh was used, or whatever you named it if set up manually, with or without options: sudo zeroe [options]
-S
option with no argumentsy
to resumeOption 1:
-S
option with the desired stage nameOption 2:
--top-ports
to discover alive hostsFor more information click here.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…