All Projects → hahwul → A2sv

hahwul / A2sv

Licence: mit
Auto Scanning to SSL Vulnerability

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to A2sv

Shellshockhunter
It's a simple tool for test vulnerability shellshock
Stars: ✭ 52 (-90.08%)
Mutual labels:  hacking, scanner, vulnerability
V3n0m Scanner
Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns
Stars: ✭ 847 (+61.64%)
Mutual labels:  hacking, scanner, vulnerability
Droid Hunter
(deprecated) Android application vulnerability analysis and Android pentest tool
Stars: ✭ 256 (-51.15%)
Mutual labels:  hacking, scanner, vulnerability
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-21.18%)
Mutual labels:  hacking, scanner, vulnerability
Api
Vulners Python API wrapper
Stars: ✭ 313 (-40.27%)
Mutual labels:  scanner, vulnerability
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+568.51%)
Mutual labels:  hacking, scanner
Iblessing
iblessing is an iOS security exploiting toolkit, it mainly includes application information collection, static analysis and dynamic analysis. It can be used for reverse engineering, binary analysis and vulnerability mining.
Stars: ✭ 326 (-37.79%)
Mutual labels:  scanner, vulnerability
Vault
swiss army knife for hackers
Stars: ✭ 346 (-33.97%)
Mutual labels:  hacking, scanner
mondoo
🕵️‍♀️ Mondoo Cloud-Native Security & Vulnerability Risk Management
Stars: ✭ 60 (-88.55%)
Mutual labels:  scanner, vulnerability
Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+617.56%)
Mutual labels:  hacking, scanner
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-2.86%)
Mutual labels:  hacking, scanner
Arachni
Web Application Security Scanner Framework
Stars: ✭ 2,942 (+461.45%)
Mutual labels:  hacking, scanner
Dumpall
一款信息泄漏利用工具,适用于.git/.svn源代码泄漏和.DS_Store泄漏
Stars: ✭ 250 (-52.29%)
Mutual labels:  hacking, scanner
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-48.66%)
Mutual labels:  hacking, scanner
Hack Tools
hack tools
Stars: ✭ 488 (-6.87%)
Mutual labels:  hacking, vulnerability
Billcipher
Information Gathering tool for a Website or IP address
Stars: ✭ 332 (-36.64%)
Mutual labels:  hacking, scanner
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (-27.1%)
Mutual labels:  hacking, vulnerability
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-21.18%)
Mutual labels:  hacking, scanner
log4jscanwin
Log4j Vulnerability Scanner for Windows
Stars: ✭ 142 (-72.9%)
Mutual labels:  scanner, vulnerability
NSE-scripts
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (-79.96%)
Mutual labels:  scanner, vulnerability

MIT License

1. A2SV?

Auto Scanning to SSL Vulnerability.

HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc

A. Support Vulnerability

- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN

B. Dev Plan

- PLAN] SSL ACCF
- PLAN] SSL Information Analysis

2. How to Install?

A. Download(clone) & Unpack A2SV

$ git clone https://github.com/hahwul/a2sv.git
$ cd a2sv

B. Install Python Package / OpenSSL

$ pip install argparse
$ pip install netaddr

$ apt-get install openssl

C. Run A2SV

$ python a2sv.py -h

3. How to Use?

usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]

optional arguments:
  -h, --helpshow this help message and exit
  -t TARGET, --target TARGET
Target URL and IP Address
 $ e.g -t 127.0.0.1
  -tf TARGETFILE, --targetfile TARGETFILE
Target file(list) URL and IP Address
 $ e.g -tf ./target.list
  -p PORT, --port PORT  Custom Port / Default: 443
 $ e.g -p 8080
  -m MODULE, --module MODULE
Check SSL Vuln with one module
[anonymous]: Anonymous Cipher
[crime]: Crime(SPDY)
[heart]: HeartBleed
[ccs]: CCS Injection
[poodle]: SSLv3 POODLE
[freak]: OpenSSL FREAK
[logjam]: OpenSSL LOGJAM
[drown]: SSLv2 DROWN
  -d DISPLAY, --display DISPLAY
Display output
[Y,y] Show output
[N,n] Hide output
  -o OUT, --out OUT Result write to file
 $ e.g -o /home/yourdir/result.txt
  -u, --update  Update A2SV (GIT)
  -v, --version Show Version

[Scan SSL Vulnerability]

$ python a2sv.py -t 127.0.0.1

$ python a2sv.py -t 127.0.0.1 -m heartbleed

$ python a2sv.py -t 127.0.0.1 -d n

$ python a2sv.py -t 127.0.0.1 -p 8111

$ python a2sv.py -tf target_list.txt

[Update A2SV]

$ python a2sv.py -u

$ python a2sv.py --update

4. Support

The answer is very slow because it's a project that I could't careful about.

5. Donate

I like coffee! I'm a coffee addict.
Buy Me A Coffee

6. Screen shot

7. Code Reference Site

- poodle : https://github.com/supersam654/Poodle-Checker

- heartbleed : https://github.com/sensepost/heartbleed-poc

- ccs injection : https://github.com/Tripwire/OpenSSL-CCS-Inject-Test

- freak : https://gist.github.com/martinseener/d50473228719a9554e6a
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].