All Projects → Leviathan36 → Trigmap

Leviathan36 / Trigmap

Licence: gpl-3.0
A wrapper for Nmap to quickly run network scans

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Trigmap

Thc Hydra
hydra
Stars: ✭ 5,645 (+4176.52%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+30.3%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
Pwncat
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
Stars: ✭ 904 (+584.85%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
Kaboom
A tool to automate penetration tests
Stars: ✭ 322 (+143.94%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
Jwtxploiter
A tool to test security of json web token
Stars: ✭ 130 (-1.52%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
Justtryharder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+240.91%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
YAPS
Yet Another PHP Shell - The most complete PHP reverse shell
Stars: ✭ 35 (-73.48%)
Mutual labels:  penetration-testing, pentesting, pentest, pentest-tool
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (+259.09%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
Habu
Hacking Toolkit
Stars: ✭ 635 (+381.06%)
Mutual labels:  pentesting, penetration-testing, pentest, pentest-tool
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+487.12%)
Mutual labels:  pentesting, pentest, pentest-tool
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+509.09%)
Mutual labels:  pentesting, penetration-testing, pentest
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-12.12%)
Mutual labels:  pentesting, pentest, pentest-tool
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+478.79%)
Mutual labels:  pentesting, penetration-testing, pentest-tool
Lockdoor Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
Stars: ✭ 677 (+412.88%)
Mutual labels:  pentesting, penetration-testing, pentest-tool
Gorsair
Gorsair hacks its way into remote docker containers that expose their APIs
Stars: ✭ 678 (+413.64%)
Mutual labels:  pentesting, penetration-testing, nmap
Babysploit
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+568.94%)
Mutual labels:  pentesting, penetration-testing, pentest-tool
Eyes
👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?" 🔍 🕵️
Stars: ✭ 38 (-71.21%)
Mutual labels:  pentesting, penetration-testing, pentest-tool
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+5389.39%)
Mutual labels:  pentesting, penetration-testing, pentest-tool
Cve 2016 8610 Poc
CVE-2016-8610 (SSL Death Alert) PoC
Stars: ✭ 26 (-80.3%)
Mutual labels:  pentesting, pentest, pentest-tool
Nmap Nse Info
Browse and search through nmap's NSE scripts.
Stars: ✭ 54 (-59.09%)
Mutual labels:  pentesting, pentest-tool, nmap

Release Language License LastUpdate TestedOn




About

Trigmap is a bash wrapper for Nmap. You can use it to easily run nmap scans and, especially, to collect information into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms.

Details

Trigmap can performs several tasks using Nmap scripting engine (NSE):

  • Port Scan
  • Service and Version Detection
  • Web Resources Enumeration
  • Vulnerability Assessment
  • Common Vulnerabilities Test
  • Common Exploits Test
  • Dictionary Attacks Against Active Services
  • Default Credentials Test

Usage

Trigmap can be used in two ways:

  • Interactive mode:

trigmap [ENTER], and the script does the rest

  • NON-interactive mode:

trigmap -h|--host <target/s> [-tp|--tcp TCP ports] [-up|--udp UDP ports] [-f|--file file path] [-s|--speed time profile] [-n|--nic NIC] [-p|--phase phases]


If you want to see the help:

trigmap --help to print this helper


For more screenshots see the relative directory of the repository.

Dir Hierarchy

Customization

It's possible to customize the script by changing the value of variables at the beginning of the file. In particularly you can choose the wordlists used by the Nmap scripts and the most important Nmap scan parameters (ping, scan, timing and script).

##############################################
###              PARAMETERS                ###
##############################################
GENERAL_USER_LIST='general_user_wordlist_short.txt'
WIN_USER_LIST='win_user_wordlist_short.txt'
UNIX_USER_LIST='unix_user_wordlist_short.txt'
SHORT_PASS_LIST='fasttrack.txt'
LONG_PASS_LIST='passwords.lst'

##############################################
###             NMAP SETTING               ###
##############################################

# PE (echo req), PP (timestamp-request)
# you can add a port on every ping scan
NMAP_PING='-PE -PS80,443,22,25,110,445 -PU -PP -PA80,443,22,25,110,445'

NMAP_OTHER='-sV --allports -O --fuzzy --min-hostgroup 256'

SCRIPT_VA='(auth or vuln or exploit or http-* and not dos)'

SCRIPT_BRUTE='(auth or vuln or exploit or http-* or brute and not dos)'

SCRIPT_ARGS="userdb=$GENERAL_USER_LIST,passdb=$SHORT_PASS_LIST"

CUSTOM_SCAN='--max-retries 3 --min-rate 250'	# LIKE UNICORNSCAN

Twin Brother

This project is very similar to Kaboom, but it has a different philosophy; infact, it uses only Nmap, while Kaboom uses different tools, one for each task. The peculiarity of Trigmap is the portability and the efficient, but it's recommended to use both the tools to scan the targets in a such way to gather more evidence with different tools (redundancy and reliability).




Disclaimer:

Author assume no liability and are not responsible for any misuse or damage caused by this program.

Trigmap is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.

License:

Trigmap is released under GPLv3 license. See LICENSE for more details.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].