Host discovery and service enumeration are part of every network pentest and routine check.
It’s relatively straightforward, and we could all probably do it in our sleep (you will be with this tool), but doing it thoroughly is still tedious and wastes valuable time.
Zero-E (ZrE) aims to automate the entire process in a fire-and-forget manner, from initial open port and live host discovery scans to in-depth scanning of only active hosts and open ports, to free up our attention to work on other things and save valuable time.
It uses a thoughtful, extensively-tested methodology that balances accuracy and efficiency.
It’s zero effort, zero error network enumeration made easy with zero experience required. Among many other functions, it generates multiple files for various analysis purposes.
So embrace your inner script kiddie, sit back in your reclining ergonomic chair, and take a nap while ZrE does your work for you.
Please consider supporting this project with BuyMeACoffee or Bitcoin (wallet address: 37Gofs5XGv8zB8odoFTJLv8NZk9TvwSr3i)
--count option to calculate and display the total number of target IP addresses--geniplist option that generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file without needing ipcalc or prips--only option to enable only UDP scanning and/or running only the specified stage/scan --ngineer option that enables the entry of custom masscan and nmap options for each scan (experimental)sudo ./zero-e.shsudo ./zero-e.sh [-e || -i] [-o output_directory] [-t targets_file] [-x [excludes_file]] [-U || -u] [-S [stage] || -s] [--count filename] [--geniplist filename] [--ngineer] [--only] --help: Self-explanatory — does not require sudo--count: Calculates and displays the total number of target IP addresses — does not require sudo--geniplist: Generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file — does not require sudo--ngineer: Enables entry of custom masscan and Nmap command options--only: Only run UDP scans if enabled, and/or specified stage if provided — does not apply to other options--defaults: Runs ZrE using default settings — using options with this will overwrite the default for that option -e: Tells ZrE to run external methodology scans — cannot be used with -i-i: Tells ZrE to run internal methodology scans — cannot be used with -e-o: Sets the output directory where generated files will be saved to-t: Sets the file containing the target IP addresses — each single IP, range, or CIDR must be on a new line-x: Sets the file containing the IP addresses to exclude — provide no argument to disable and not be prompted-U: Enables UDP scans — cannot be used with -u-u: Disables UDP scans — cannot be used with -U-S: With no arguments, resumes from saved stage — cannot be used with -s -s: Disables stage resuming and selection and starts at initial alives scan — cannot be used with -S zero-e.sh to PATH, so it’s able to be called as a command from anywhere installzre.sh, which will add Zero-E to PATH for you; or use -b to specify a destination.zrepath) in my shell (~/.zshrc) that quickly copies ZrE into the primary PATH directory (/usr/local/bin) as zeroe for quick updating when changes are made alias zrepath='sudo cp /path/to/zero-e.sh /usr/local/bin/zeroe && sudo chmod +x /usr/local/bin/zeroe'installzre.sh or your aliaszeroe if zrepath.sh was used, or whatever you named it if set up manually, with or without options: sudo zeroe [options]-S option with no argumentsy to resumeOption 1:
-S option with the desired stage nameOption 2:
--top-ports to discover alive hostsFor more information click here.
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…