All Projects → Gr1mmie → Autoenum

Gr1mmie / Autoenum

Automatic Service Enumeration Script

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Autoenum

Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+24.63%)
Mutual labels:  enumeration, nmap, recon
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+1261.19%)
Mutual labels:  snmp, enumeration, nmap
Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (+32.09%)
Mutual labels:  automation, recon, enumeration
Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+170.9%)
Mutual labels:  automation, scans
Natlas
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (+148.51%)
Mutual labels:  recon, nmap
Celerystalk
An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
Stars: ✭ 333 (+148.51%)
Mutual labels:  enumeration, nmap
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (-78.36%)
Mutual labels:  enumeration, nmap
Nullinux
Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Stars: ✭ 451 (+236.57%)
Mutual labels:  recon, enumeration
Aiodnsbrute
Python 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (+176.12%)
Mutual labels:  recon, enumeration
Amass
In-depth Attack Surface Mapping and Asset Discovery
Stars: ✭ 6,284 (+4589.55%)
Mutual labels:  recon, enumeration
Deksterecon
Web Application recon automation
Stars: ✭ 109 (-18.66%)
Mutual labels:  automation, recon
Legion
Automatic Enumeration Tool based in Open Source tools
Stars: ✭ 280 (+108.96%)
Mutual labels:  enumeration, nmap
fransRecon
Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated using Sublist3r.
Stars: ✭ 31 (-76.87%)
Mutual labels:  enumeration, recon
Docker Onion Nmap
Scan .onion hidden services with nmap using Tor, proxychains and dnsmasq in a minimal alpine Docker container.
Stars: ✭ 345 (+157.46%)
Mutual labels:  recon, nmap
Winpwn
Automation for internal Windows Penetrationtest / AD-Security
Stars: ✭ 1,303 (+872.39%)
Mutual labels:  automation, recon
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-13.43%)
Mutual labels:  recon, enumeration
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+185.07%)
Mutual labels:  enumeration, nmap
Penta
Open source all-in-one CLI tool to semi-automate pentesting.
Stars: ✭ 130 (-2.99%)
Mutual labels:  automation, nmap
ivre
Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, collect and analyse network intelligence from your sensors, and much more!
Stars: ✭ 2,712 (+1923.88%)
Mutual labels:  nmap, scans
asnap
asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the user to automate initial port and service scanning.
Stars: ✭ 28 (-79.1%)
Mutual labels:  nmap, recon
                 __                                      
  ____ _ __  __ / /_ ____   ___   ____   __  __ ____ ___ 
 / __ `// / / // __// __ \ / _ \ / __ \ / / / // __ `__ \
/ /_/ // /_/ // /_ / /_/ //  __// / / // /_/ // / / / / /
\__,_/ \__,_/ \__/ \____/ \___//_/ /_/ \__,_//_/ /_/ /_/ 
                                                         

Summary

Autoenum is a recon tool which performs automatic enumeration of services discovered. I built this to save some time during CTFs and pen testing environments (i.e. HTB, VulnHub, OSCP) and draws a bit from a number of existing tools including AutoRecon (https://github.com/Tib3rius/AutoRecon), Auto-Recon (https://github.com/Knowledge-Wisdom-Understanding/Auto-Recon), and nmapautomator (https://github.com/21y4d/nmapAutomator). Could also be used in a real-life pentesting engagment. Currently has only been tested in kali. If you notice a bug or have a feature request not in to-do, please submit an issue or let know some other way(discord preferred). Thanks and enjoy autoenum!

How it Works

Autoenum first runs 2 nmap scans in tandem, one scan looks specifically for service versions to run against searchsploit and the other is a scan dependent on the argument. Every scan profile checks for services running, the type of scan is the only difference. After the scans are finished, the services/ports open and operating systems along with script output (if avaliable) is extracted and further analyzed. If a certain service is found, Autoenum will begin enumerating by firing off a number of tools and create a dir for that service (i.e detecting http starts up nikto, wafw00f, gobuster, and others). If a dependency required is not detected, that dependency will be auto installed and checked if there is a new update everytime the tool is run. Autoenum outputs this information in 2 main sections(scan type and loot dirs) with sub directories branching off depending on what is found.

Installation

git clone https://github.com/Gr1mmie/autoenum.git
chmod +x autoenum/autoenum.sh

What's new

Version 1.1

  • First version, HTTP and SMB enumeration added as well as functionalized mess of code it was before
  • Aggressive scan added, included nmap-to-searchsploit scan for version exploit searching
  • Added getopts for argument parsing to replace patchwork position-based conditionals

Version 1.2

  • Added help menu and logic to detect dependencies
  • Fixed terminal breaking issue (kinda, open to ideas if there is anything better than clearing terminal output).

Version 1.3

  • Fixed simultaneous scan issue so that both scans fire at the same time now and have a few tools for certain service enumerations to run in background as others stay in foreground to save time

Version 1.4

  • Added enumeration for various services including LDAP, SNMP, SMTP, oracle and FTP and banner
  • Added file containing all commands run in case a command failed
  • installs tools not detected and checks if all are up-to-date

Version 1.4.1

  • fixed searchsploit encoding issue where parts were being displayed as encoded when read from a text editor

Version 2.0

  • Autoenum now runs as a console tool similar to msfconsole.

Version 2.0.1

  • persistent shell command

Version 2.1

  • imap, mysql,redis enumeration

Version 3.0

  • Polished UI
  • Cleaned up shell util errors and fixed escape keywords
  • Added more scan options:
    • top 1k scan
    • top 10k scan
    • UDP scan
  • Added Combination scans (vuln scan can be added onto any other scan)
  • Added Auxilary scans:
    • Quick scan added
    • Vuln scan added
  • Fixed update throwing errors issue
  • Now supports URLs and FQDNs
  • Verifies the IP entered is a valid one
  • aggr + reg scans now scan top 1k ports first
  • Performs basic OS detecting using ttl
  • searchsploit output is now sent to a JSON file for easy viewing
  • nfs enum now attempts to mount discovered nfs shares
  • Fixed http multiple ports not being detected issue

Version 3.0.1

  • Removed ports 47001 and 5985 from ports list to prevent them from being run through http enum
  • added -nr flag when starting autoenum to set autoenum to not attempt to resolve an IP passed (this is good if a machine is blocking pings but we know its up)
    • Usage: ./autoenum -nr

Dependencies

Your OS may or may not have some installed by default. Not to worry, autoenum recognizes tools not installed and installs them for you, even updating if they aren't up-to-date!

  • nmap
  • nikto
  • gobuster
  • whatweb
  • onesixtyone
  • snmp-check
  • snmpwalk
  • fierce
  • dnsenum
  • dnsrecon
  • sslscan
  • uniscan
  • snmp-user-enum
  • oscanner
  • wafw00f
  • odat
  • searchsploit
  • rpcbind
  • tput
  • jq
  • wpscan

Thanks

Dievus

Featured

https://www.kitploit.com/2020/07/autoenum-automatic-service-enumeration.html

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].