All Projects β†’ UnknowUser50 β†’ Octopus

UnknowUser50 / Octopus

Licence: other
Octopus - Network Scan/Infos & Web Scan

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Octopus

Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+10092%)
Mutual labels:  nmap, scanning, red-team
Rustscan
πŸ€– The Modern Port Scanner πŸ€–
Stars: ✭ 5,218 (+20772%)
Mutual labels:  nmap, scanning
Celerystalk
An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.
Stars: ✭ 333 (+1232%)
Mutual labels:  nmap, scanning
Easy hack
Hack the World using Termux
Stars: ✭ 549 (+2096%)
Mutual labels:  nmap, bash-script
showme
Rapid diagnostic system status tool (performance monitoring, network scanning, mysql performance monitoring, kubectl status)
Stars: ✭ 24 (-4%)
Mutual labels:  nmap, network-scanning
searchscan
Search Nmap and Metasploit scanning scripts.
Stars: ✭ 51 (+104%)
Mutual labels:  nmap, network-scanning
active-scanning-techniques
A compilation of network scanning strategies to find vulnerable devices
Stars: ✭ 61 (+144%)
Mutual labels:  nmap, network-scanning
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (+36%)
Mutual labels:  ethical-hacking, red-team
Nmap Erpscan
Nmap custom probes for better detecting SAP services
Stars: ✭ 96 (+284%)
Mutual labels:  nmap, scanning
Eternalview
EternalView is an all in one basic information gathering and vulnerability assessment tool
Stars: ✭ 118 (+372%)
Mutual labels:  nmap, bash-script
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+7196%)
Mutual labels:  nmap, scanning
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+568%)
Mutual labels:  nmap, bash-script
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (+16%)
Mutual labels:  nmap, bash-script
Natlas
Scaling Network Scanning. Changes prior to 1.0 may cause difficult to avoid backwards incompatibilities. You've been warned.
Stars: ✭ 333 (+1232%)
Mutual labels:  nmap, scanning
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+244%)
Mutual labels:  scanning, red-team
Scantron
A distributed nmap / masscan scanning framework complete with an API client for automation workflows
Stars: ✭ 542 (+2068%)
Mutual labels:  nmap, scanning
Dracnmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.
Stars: ✭ 861 (+3344%)
Mutual labels:  nmap, scanning
Unimap
Scan only once by IP address and reduce scan times with Nmap for large amounts of data.
Stars: ✭ 141 (+464%)
Mutual labels:  nmap, scanning
LAZYPARIAH
A tool for generating reverse shell payloads on the fly.
Stars: ✭ 121 (+384%)
Mutual labels:  ethical-hacking, red-team
Ultimate-Hacker-Roadmap
Don't know what to focus on to become a Penetration Tester..? This is the BEST roadmap for becoming a modern penetration tester. Everything you need to know to land a paying job, categorized in 5 skill levels.
Stars: ✭ 132 (+428%)
Mutual labels:  ethical-hacking

Ocotpus-Logo

Octopus script


  • Requirements

    • Nmap
    • WireShark
    • Gobuster/ Dirbuster
    • wget
    • dpkg
    • Alien
  • WARNING

If you are on a Linux subsystem, you can't use nmap. Here is the solution in order to be able to use it : On your Linux, type this command :

root@Debian:~# alias nmap='"/mnt/c/Program Files (x86)/Nmap/nmap.exe"'

Change the path if necessary, but you must have NMAP on your Windows system Link for nmap : https://nmap.org/download.html

  • Installation

root@Debian:~# sudo apt update
root@Debian:~# git clone https://github.com/UnknowUser50/Octopus
root@Debian:~# cd Octopus/
root@Debian:~# sudo chmod 755 * 

if you are on a subsystem, run first :

root@Debian:~# sudo ./Subsystem_WIN.sh

else :

root@Debian:~# sudo ./install.sh
root@Debian:~# sudo ./Octopus.sh

It is advisable to update Octopus regularly, at least once a week. Just run update script : This script will save all files created beforehand, don't worry !

root@Debian:~# sudo ./update.sh

Compatible operating system

  • Linux :

    • Debian
    • Ubuntu
    • Kali
    • Parrot
  • Windows

    • Linux subsytem is requiered

Warning, if you use a system other than Kali Linux, remember to check if the packages necessary for the proper functioning of Octopus are installed.

The install script should install the necessary dependencies.

Presentation

Octopus is a script writting in bash. I decide to develop a script for all poeple who are new to computer security to make it easier for them. Each script output/results will also be written to a text file. Octopus using existing tools, it only takes their use. These tools do not belong to me and I do not give them the rights. Today, Octopus has 3 analysis modules and one for connection. The modules are as follow :

Main modules

  • Network Informations
  • Network Scanning
  • Web Scanning

Other modules

  • Connection support
  • Manual module

Description of modules

Network Informations

  • Nslookup :
    • Nslookup for Name System Look Up is a tool allowing to query a name server in order to obtain information concerning a domain or a host Once this module have been selected, all you have to do is enter a host name in order to obtain necessary information.
  • Dig :
    • Dig is a network administration command-line tool for querying the Domain Name System. Dig is useful for network troubleshooting. In Octopus, this is the same operation as nslookup you will be asked for a domain name.
  • Whois :
    • Whois is used to reveal important information about the targeted domain name, this can be useful for social engeneering or OSINT
  • TraceRoute :
    • TraceRoute is a network diagnostic tool. It allow to determine the path followed by a packet. In order to use it, you need to enter a destination address, this will allow you to see the entire path that the packet takes.
  • Recon-ng :
    • Recon-ng is a powerfull tool that can be further explored by viewing throught the list of module. Before using it, you are going to need to install somes packages . First, lunch recon-ng with
      > recon-ng
      > marketplace install all
  • WireShark :
    • WireShark is a tool for scanning and analyzing requests, protocol analyzer on a network card that you choose beforehand.

Network Scanning

  • Nmap & NSE :
    • Nmap : In this module, you will find several nmap scripts placed at your disposal, you just have to give the target IP address, Octopus will take care of performing the nmap scan that you have selected.
  • ZenMap :
    • ZenMap : This module allow you to install and then use the graphical version of Nmap. First, it will recover the files needed for the installation and run it. ZenMap works the same as Nmap.
  • UFW :
    • UFW is a simple netfilter command line configuration tool which is an alternative to the IpTables tool. UFW allows automatic configuration of the firewall when installing the program when it is needed.

Web Scanning

  • Nikto :
    • Nikto is an important Open Source web server scanner which performs comprehensive tests against web server for multiple items, including over 6700 potentially dangerous files/programs.
  • Maltego :
    • Maltego is a software used for open-source intelligence and forensic. Maltego focuses on providing a library of transforms for discovery of data from open-sources and visualizing that informations in a graph format.
  • ZAP :
    • OWASP ZAP is an open-source web application security scanner. It is intended to be used by both those new application security as well as professional penetration testers.
  • Gobuster :
    • Gobuster is a tool used for brute-force URLs, directory and files in web sites. You just have to enter the URL you want targeted as well as the path to the world list. You can find wordlists here :
    • /usr/share/wordlists/ I advise you to use this wordlists which is very complete :
    > /usr/share/wordlists/dirbuster/directory-list-lowercase-2.3-medium.txt
  • DirBuster :
    • Dirbuster is the graphical version of Gobuster, it allows you to perform the same actions as Dirbuster.
  • SPARTA / Legion :
    • The software will depend on the version of Kali you are using. This tool is for network infrastructure pentesting. With it you will simply need to enter an IP address. You can then use NMAP and even Gobuster as well as others tools. I'll let you read the documentation for more informations.
  • SQL-Map :
    • Sql-map is an open-source software that is used to detect and exploit database vulnerabilities and provides options for injecting malicious code into them.

Description of the connection module :

SSH connection

  • SSH for Secure SHell is a secure communication protocol. With Octopus, you just need to enter the session name and the IP address to which you want to establish an SSH connection :
root@Debian:~# ssh [email protected]
  • Stop the SSH service :
root@Debian:~# sudo systemctl stop ssh
  • If you have a problem, use the log :
root@Debian:~# sudo journalctl -n 100
  • You can also use grep to find errors :
root@Debian:~# sudo journalctl -n 100 | grep "error*"
root@Debian:~# sudo journalctl -n 100 | grep "failed*"

DISCLAMER !

Octopus is a tool reserved for professional or educational use ! Under no circumstances should it be used for the purpose of harming others or a system that does not belong to you. As a reminder, any intrusion or attempted intrusion is punishable by law ! I am no way responsible for your actions, thank you for your understanding.

End-Logo Image 1 : AndrΓ©e Wallin Image 2 : Disse86

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].