Host discovery and service enumeration are part of every network pentest and routine check.
It’s relatively straightforward, and we could all probably do it in our sleep (you will be with this tool), but doing it thoroughly is still tedious and wastes valuable time.
Zero-E (ZrE) aims to automate the entire process in a fire-and-forget manner, from initial open port and live host discovery scans to in-depth scanning of only active hosts and open ports, to free up our attention to work on other things and save valuable time.
It uses a thoughtful, extensively-tested methodology that balances accuracy and efficiency.
It’s zero effort, zero error network enumeration made easy with zero experience required. Among many other functions, it generates multiple files for various analysis purposes.
So embrace your inner script kiddie, sit back in your reclining ergonomic chair, and take a nap while ZrE does your work for you.
Please consider supporting this project with BuyMeACoffee or Bitcoin (wallet address: 37Gofs5XGv8zB8odoFTJLv8NZk9TvwSr3i)
--count option to calculate and display the total number of target IP addresses--geniplist option that generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file without needing ipcalc or prips--only option to enable only UDP scanning and/or running only the specified stage/scan --ngineer option that enables the entry of custom masscan and nmap options for each scan (experimental)sudo ./zero-e.shsudo ./zero-e.sh [-e || -i] [-o output_directory] [-t targets_file] [-x [excludes_file]] [-U || -u] [-S [stage] || -s] [--count filename] [--geniplist filename] [--ngineer] [--only] --help: Self-explanatory — does not require sudo--count: Calculates and displays the total number of target IP addresses — does not require sudo--geniplist: Generates a list of unique, single IP addresses from the IP addresses, ranges, and CIDRs in the passed file — does not require sudo--ngineer: Enables entry of custom masscan and Nmap command options--only: Only run UDP scans if enabled, and/or specified stage if provided — does not apply to other options--defaults: Runs ZrE using default settings — using options with this will overwrite the default for that option -e: Tells ZrE to run external methodology scans — cannot be used with -i-i: Tells ZrE to run internal methodology scans — cannot be used with -e-o: Sets the output directory where generated files will be saved to-t: Sets the file containing the target IP addresses — each single IP, range, or CIDR must be on a new line-x: Sets the file containing the IP addresses to exclude — provide no argument to disable and not be prompted-U: Enables UDP scans — cannot be used with -u-u: Disables UDP scans — cannot be used with -U-S: With no arguments, resumes from saved stage — cannot be used with -s -s: Disables stage resuming and selection and starts at initial alives scan — cannot be used with -S zero-e.sh to PATH, so it’s able to be called as a command from anywhere installzre.sh, which will add Zero-E to PATH for you; or use -b to specify a destination.zrepath) in my shell (~/.zshrc) that quickly copies ZrE into the primary PATH directory (/usr/local/bin) as zeroe for quick updating when changes are made alias zrepath='sudo cp /path/to/zero-e.sh /usr/local/bin/zeroe && sudo chmod +x /usr/local/bin/zeroe'installzre.sh or your aliaszeroe if zrepath.sh was used, or whatever you named it if set up manually, with or without options: sudo zeroe [options]-S option with no argumentsy to resumeOption 1:
-S option with the desired stage nameOption 2:
--top-ports to discover alive hostsFor more information click here.
Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive…
Managing files efficiently is a core skill for anyone working in Linux, whether you're a…
Open ports act as communication endpoints between your Linux system and the outside world. Every…
Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…
Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…
Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…