Skip to content

Latest commit

 

History

History
88 lines (68 loc) · 4.01 KB

README.md

File metadata and controls

88 lines (68 loc) · 4.01 KB

Logo

Hold it and Kill all the Vulnerabilities ( う-´)づ︻╦╤──

PythonShell ScriptLinuxMarkdownKaliUbuntu

✨Assaulter is an Automated Vulnerability scanner, that detects many Web Application Vulnerabilities, using a simple hacker's methodology.✨

Installation

Assaulter requires Python v3.5+ to run. Install the dependencies using following commands:

git clone https://github.com/17h4ck3r11/Assaulter.git
cd Assaulter
chmod +x *
sudo bash setup.sh

Features

  • Enumerate Subdomains.
  • Scans IP addresses.
  • Technology Stack, Operating System, and Versions detection.
  • Scanning for various Vulnerabilities, and Exposures.

Tools Stack

Assaulter uses a number of open source projects to work properly:

  • Nmap - For network discovery and security scanning.
  • Nikto - To perform comprehensive tests against web servers.
  • Subfinder - Subdomain discovery tool.
  • Sublist3r - Enumerate subdomains of websites using OSINT.
  • Assetfinder - Subdomain Enumeration Tool.
  • HTTPX - Fast and multi-purpose HTTP toolkit that allows running multiple probes.
  • Amass - Performs network mapping of attack surfaces and external asset discovery.
  • Nuclei - Fast and customisable vulnerability scanner.
  • Subzy - Subdomain takeover tool.
  • Dirsearch - An advanced web path brute-forcer.

And of course Assaulter itself is open source with a Public Repository Assaulter on GitHub.

Modules

Assaulter is currently using multiple Python modules, to work properly. Instructions on how to use them in your own application are linked below:

MODULES DOCUMENTATION
requests Link
bs4 Link
termcolor Link
urllib.parse Link
sys Link

License

Licence

This program is free software: you can redistribute it and/or modify it under the terms of the MIT LICENSE.

Contributor

Before making any contribution, read the Contribution Guide.