All Projects → anouarbensaad → Vulnx

anouarbensaad / Vulnx

Licence: gpl-3.0
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Vulnx

Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (-11.1%)
Mutual labels:  hacking, security-tools, pentest, hacking-tool, exploitation, vulnerability-detection, vulnerability-assessment
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+668.29%)
Mutual labels:  hacking, pentest, hacking-tool, exploitation, information-gathering
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-59.07%)
Mutual labels:  hacking, security-tools, hacking-tool, vulnerability-detection, vulnerability-assessment
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-88.5%)
Mutual labels:  hacking, security-tools, hacking-tool, information-gathering
Jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (-36.08%)
Mutual labels:  hacking, security-tools, pentest, hacking-tool
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+12.59%)
Mutual labels:  hacking, security-tools, pentest, hacking-tool
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+129.14%)
Mutual labels:  hacking, hacking-tool, information-gathering, vulnerability-assessment
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-88.5%)
Mutual labels:  hacking, security-tools, pentest, hacking-tool
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (-28.15%)
Mutual labels:  hacking, security-tools, pentest, hacking-tool
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+236.08%)
Mutual labels:  hacking, security-tools, hacking-tool, information-gathering
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-81.17%)
Mutual labels:  hacking, security-tools, hacking-tool, exploitation
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-23.19%)
Mutual labels:  hacking, security-tools, pentest, hacking-tool
Zeebsploit
web scanner - exploitation - information gathering
Stars: ✭ 159 (-84.24%)
Mutual labels:  hacking, hacking-tool, vulnerability, information-gathering
Rebel Framework
Advanced and easy to use penetration testing framework 💣🔎
Stars: ✭ 183 (-81.86%)
Mutual labels:  hacking, security-tools, vulnerability-detection, vulnerability-assessment
Vault
swiss army knife for hackers
Stars: ✭ 346 (-65.71%)
Mutual labels:  crawler, hacking, hacking-tool, information-gathering
Deepweb Scappering
Discover hidden deepweb pages
Stars: ✭ 40 (-96.04%)
Mutual labels:  crawler, hacking, hacking-tool
Whour
Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-98.22%)
Mutual labels:  vulnerability, information-gathering, vulnerability-detection
Habu
Hacking Toolkit
Stars: ✭ 635 (-37.07%)
Mutual labels:  hacking, security-tools, pentest
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+582.06%)
Mutual labels:  pentest, information-gathering, security-tools
Sublert
Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued TLS/SSL certificate.
Stars: ✭ 699 (-30.72%)
Mutual labels:  hacking, pentest, information-gathering


VulnX
VulnX

Vulnx 🕷️ is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms

Screenshot from 2019-06-19 05-22-04

https://github.com/anouarbensaad/vulnx/archive/master.zip

VulnX WikiHow To UseCompatibilityLibrary

Vulnx is An Intelligent Bot Auto Shell Injector that detects vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the target like subdomains, ipaddresses, country, org, timezone, region, ans and more ...

Instead of injecting each and every shell manually like all the other tools do, VulnX analyses the target website checking the presence of a vulnerabilitie if so the shell will be Injected.searching urls with dorks Tool.


🕷️ Features

  • Detects cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
  • Target informations gatherings
  • Target Subdomains gathering
  • Multi-threading on demand
  • Checks for vulnerabilities
  • Auto shell injector
  • Exploit dork searcher
  • Ports Scan High Level
  • Dns-Servers Dump
  • Input multiple target to scan.
  • Dorks Listing by Name& by ExploitName.
  • Export multiple target from Dorks into a logfile.

🕷️ DNS-Map-Results

To do this,run a scan with the --dns flag and -d for subdomains. To generate a map of isetso.rnu.tn, you can run the command vulnx -u isetso.rnu.tn --dns -d --output $PATHin a new terminal.

$PATH : Where the graphs results will be stored.

vokoscreen-2019-06-19_05-44-07

Let's generates an image displaying target Subdomains,MX & DNS data.

demo


🕷️ Exploits

Exploits Running

Joomla
Wordpress
Drupal
PrestaShop
Opencart

🕷️ VulnxMode

NEW vulnx now have an interactive mode. URLSET

vulnxmode_url

DORKSET

vulnxmode_dorks


🕷️ Available command line options

READ VULNX WIKI

usage: vulnx [options]

  -u --url              url target
  -D --dorks            search webs with dorks
  -o --output           specify output directory
  -t --timeout          http requests timeout
  -c --cms-info         search cms info[themes,plugins,user,version..]
  -e --exploit          searching vulnerability & run exploits
  -w --web-info         web informations gathering
  -d --domain-info      subdomains informations gathering
  -l, --dork-list       list names of dorks exploits
  -n, --number-page     number page of search engine(Google)
  -p, --ports           ports to scan
  -i, --input           specify domains to scan from an input file 
  --threads             number of threads
  --dns                 dns informations gathering

🕷️ Docker

VulnX in DOCKER !!.

$ git clone https://github.com/anouarbensaad/VulnX.git
$ cd VulnX
$ docker build -t vulnx ./docker/
$ docker run -it --name vulnx vulnx:latest -u http://example.com

run vulnx container in interactive mode

vokoscreen-2019-06-23_11-53-20

to view logfiles mount it in a volume like so:

$ docker run -it --name vulnx -v "$PWD/logs:/VulnX/logs" vulnx:latest -u http://example.com

change the mounting directory..

VOLUME [ "$PATH" ]

🕷️ Install vulnx on Ubuntu

$ git clone https://github.com/anouarbensaad/vulnx.git
$ cd VulnX
$ chmod +x install.sh
$ ./install.sh

Now run vulnx

vokoscreen-2019-07-05_03-59-48

🕷️ Install vulnx on Termux

$ pkg update
$ pkg install -y git
$ git clone http://github.com/anouarbensaad/vulnx
$ cd vulnx
$ chmod +x install.sh
$ ./install.sh

CLICK HERE TO SHOW THE RESULT

🕷️ Install vulnx in Windows

  • click here to download vulnx
  • download and install python3
  • unzip vulnx-master.zip in c:/
  • open the command prompt cmd.
> cd c:/vulnx-master
> python vulnx.py

example command with options : settimeout=3 , cms-gathering = all , -d subdomains-gathering , run --exploits

vulnx -u http://example.com --timeout 3 -c all -d -w --exploit

example command for searching dorks : -D or --dorks , -l --list-dorks

vulnx --list-dorks return table of exploits name. vulnx -D blaze return urls found with blaze dork


🕷️ Versions


⚠️ Warning!

I Am Not Responsible of any Illegal Use


🕷️ Contribution & License

You can contribute in following ways:

  • Report bugs & add issues
  • Search for new vulnerability
  • Develop plugins
  • Searching Exploits
  • Give suggestions (Ideas) to make it better

Do you want to have a conversation in private? email me : [email protected]

VulnX is licensed under GPL-3.0 License

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].