flipkart-incubator / Rta

Licence: apache-2.0
Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Rta

Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-63.69%)
Mutual labels:  security-tools, websecurity
Horn3t
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (-66.48%)
Mutual labels:  security-tools, websecurity
Cerberus
一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能
Stars: ✭ 389 (+8.66%)
Mutual labels:  security-tools, websecurity
Recsech
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .
Stars: ✭ 173 (-51.68%)
Mutual labels:  security-tools, websecurity
Ssh Mitm
ssh mitm server for security audits supporting public key authentication, session hijacking and file manipulation
Stars: ✭ 335 (-6.42%)
Mutual labels:  security-tools
Prowler
Prowler is a security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 200 controls covering CIS, ISO27001, GDPR, HIPAA, SOC2, ENS and other security frameworks.
Stars: ✭ 4,561 (+1174.02%)
Mutual labels:  security-tools
Xxe Injection Payload List
🎯 XML External Entity (XXE) Injection Payload List
Stars: ✭ 304 (-15.08%)
Mutual labels:  websecurity
Dotdotslash
Search for Directory Traversal Vulnerabilities
Stars: ✭ 297 (-17.04%)
Mutual labels:  security-tools
Webshell Sniper
🔨 Manage your website via terminal
Stars: ✭ 359 (+0.28%)
Mutual labels:  security-tools
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (-3.63%)
Mutual labels:  security-tools
Awesome Dotnet Security
Awesome .NET Security Resources
Stars: ✭ 325 (-9.22%)
Mutual labels:  security-tools
Raptor
Web-based Source Code Vulnerability Scanner
Stars: ✭ 314 (-12.29%)
Mutual labels:  security-tools
Shodansploit
🔎 shodansploit > v1.3.0
Stars: ✭ 342 (-4.47%)
Mutual labels:  security-tools
Polichombr
Collaborative malware analysis framework
Stars: ✭ 307 (-14.25%)
Mutual labels:  security-tools
Impost3r
👻Impost3r -- A linux password thief
Stars: ✭ 355 (-0.84%)
Mutual labels:  security-tools
Ethereum Lists
A repository for maintaining lists of things like malicious URLs, fake token addresses, and so forth. We love lists.
Stars: ✭ 300 (-16.2%)
Mutual labels:  security-tools
Reconnote
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
Stars: ✭ 322 (-10.06%)
Mutual labels:  security-tools
Super
Secure, Unified, Powerful and Extensible Rust Android Analyzer
Stars: ✭ 340 (-5.03%)
Mutual labels:  security-tools
Hackertarget
🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Stars: ✭ 320 (-10.61%)
Mutual labels:  security-tools
Modlishka
Modlishka. Reverse Proxy.
Stars: ✭ 3,634 (+915.08%)
Mutual labels:  security-tools

Red Team Arsenal   Tweet

Red Team Arsenal

Github Release Version Github Release Version License RTA loves Open source

Red Team Arsenal is a web/network security scanner which has the capability to scan all company's online facing assets and provide an holistic security view of any security anomalies. It's a closely linked collections of security engines to conduct/simulate attacks and monitor public facing assets for anomalies and leaks.

It's an intelligent scanner detecting security anomalies in all layer 7 assets and gives a detailed report with integration support with nessus. As companies continue to expand their footprint on INTERNET via various acquisitions and geographical expansions, human driven security engineering is not scalable, hence, companies need feedback driven automated systems to stay put.

Installation

Supported Platforms

RTA has been tested both on Ubuntu/Debian (apt-get based distros) and as well as Mac OS. It should ideally work with any linux based distributions with mongo and python installed (install required python libraries from install/py_dependencies manually).

Prerequisites:

There are a few packages which are necessary before proceeding with the installation:

  • Git client: sudo apt-get install git
  • Python 2.7, which is installed by default in most systems
  • Python pip: sudo apt-get install python-pip
  • MongoDB: Read the official installation guide to install it on your machine.

Finally run python install/install.py

There are also optional packages/tools you can install (highly recommended):

Integrating Nessus {OPTIONAL}:

Integrating Nessus into Red Team Arsenal can be done is simple 3 steps:

  • Download and install Nessus community edition (if you don’t have a paid edition). If you already have an installation (it can be remote installation as well), then go to step (2).

  • Update the config file (present on the root directory of RTA) with Nessus URL, username and password.

  • Create a nessus policy where you can configure the type of scans and plugins to run and name it RTA (Case sensitive - use full uppercase).

  • Once the config file has the correct Nessus information (url, username, password), use the flag --nessus while running RTA to launch nessus scan over the entire subdomains gathered by RTA (one single scan initiated with all the subdomains gathered).

Usage

Short Form Long Form Description
-u --url Domain URL to scan
-v --verbose Enable the verbose mode and display results in realtime
-n --nessus Launch a Nessus scan with all the subdomains
-s --scraper Run scraper based on config keywords
-h --help show the help message and exit

Sample Output

[email protected] /RTA (master*) $ python rta.py --url "0daylabs.com" -v -s

              ____          _   _____                         _                              _
             |  _ \ ___  __| | |_   _|__  __ _ _ __ ___      / \   _ __ ___  ___ _ __   __ _| |
             | |_) / _ \/ _` |   | |/ _ \/ _` | '_ ` _ \    / _ \ | '__/ __|/ _ \ '_ \ / _` | |
             |  _ <  __/ (_| |   | |  __/ (_| | | | | | |  / ___ \| |  \__ \  __/ | | | (_| | |
             |_| \_\___|\__,_|   |_|\___|\__,_|_| |_| |_| /_/   \_\_|  |___/\___|_| |_|\__,_|_|


[i] Checking for Zonetransfer
[i] Zone Transfer is not enabled

[i] Checking for SPF records
[+] SPF record lookups is good. Current value is: 9

[-] Enumerating subdomains now for 0daylabs.com
[-] Searching now in Baidu..
[-] Searching now in Yahoo..
[-] Searching now in Google..
[-] Searching now in Bing..
[-] Searching now in Ask..
[-] Searching now in Netcraft..
[-] Searching now in DNSdumpster..
[-] Searching now in Virustotal..
[-] Searching now in ThreatCrowd..
[-] Searching now in SSL Certificates..
[-] Searching now in PassiveDNS..
[-] Total Unique Subdomains Found: 3
blog.0daylabs.com
www.0daylabs.com
test.0daylabs.com

[+] Verifying Subdomains and takeover options

[+] Possible subdomain takeovers (Manual verification required):
 
 test.0daylabs.com

[i] Verified and Analyzed Subdomains:

[i] URL: blog.0daylabs.com
[i] Wappalyzer: [u'jQuery', u'Varnish', u'Font Awesome', u'Twitter Bootstrap', u'Google Analytics', u'Google Font API', u'Disqus', u'Google AdSense']

[i] Scraper Results

[+] Shodan
Hostname: test.0daylabs.com                 IP: 139.59.63.111       Ports: 179
Hostname: test.0daylabs.com                 IP: 139.59.63.111       Ports: 179

[+] Twitter
URL: https://twitter.com/tweetrpersonal9/status/832624003751694340      search string: 0daylabs
URL: https://twitter.com/ratokeshi/status/823957535564644355            search string: 0daylabs

Notifications

Configuring Slack:

RTA can also do push notifications to slack which includes the main scan highlight along with Nessus and other integrated scanner reports divided on the basis of severity.

  • In your slack, create an incoming webhook and point it to the channel where you need the RTA to send the report. You can read more about creating incoming webhooks on slack documentation.

  • In the config file, update the URL in the slack section with full URL (including https://) for the incoming webhook.

Once slack is configured, you will automatically start getting reports on your configured slack channel

Roadmap

Here are couple of ideas which we have in mind to do going ahead with RTA. If you have any ideas/feature requests which is not listed below, feel free to raise an issue in github.

  • Email the results once the scan is completed.

  • Extend the current RTA API so that we can launch custom scans with required options via the API.

  • Launch custom scans based on Wappalyzer results (eg: wpscan if wordpress is detected)

  • Investigate and integrate more web security scanners including but not limited to Arachni, Wapiti, Skipfish and others !

  • JSON/XML output formatting for the RTA scan result.

  • Improving the logic for Subdomain takeover.

  • Multi threading support for faster scan comple.

Contributors

Awesome people who built this project:

Lead Developers:

Anirudh Anand (@a0xnirudh)

Project Contributors:

Mohan KK (@MohanKallepalli)
Ankur Bhargava (@_AnkurB)
Prajal Kulkarni (@prajalkulkarni)
Himanshu Kumar Das (@mehimansu)

Special Thanks

Sublist3r

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].