Vulnerous is a linux script that aggregates several network security and analysis features into an easy to understand package. Vulnerous provides a simplified commandline interface which is best suited for beginners and security enthusiasts trying to dive into cybersecurity.
Vulnerous-web© by Ankush Sharma support provided. Make comprehensive Vulnerability reports of any website by Vulnerous-web! Over 80 different checks and 20 different tools available! HUGE UI CHANGE! Vulnerous now comprises of terminal colors. Better interactive experience and more modules support. Bug fixes.
Wider Encryption support to be added soon for the Encryptor! Support for windows coming soon!! A Java based Aes-256 encryption locker to be available soon!
Vulnerous is still in development and consists of the following suites :-
- IP Finder Suite - The IP Finder helps you to find both your public and private IP's with a quick command.
- Reconnaissance Suite - The reconnaissance suite integrates several features from N-Map to intelligently find and document your results. Reports are generated to document analysed networks.
- The Encryptor© - The Encryptor allows for a wider cryptographic access within Vulnerous. Read more about the encryptor at Encryptor©
- Vulnerous-web© - Vulnerous-web allows for comprehensive Vulnerability analysis for any url/website/webapp. Read more about Vulnerous-web at Vulnerous-web©
The best thing about vulnerous is its simplicity and ease of use. You don't have to understand a lot of tools and networking to generate reports! This is a true chill dream!!
The Vulnerous source code is written in Bash script. It easy enough to understand and contributions to the script are always welcome.
A snippet of the script is shown below:
PRIV_IP_ADDR=`hostname -I | awk '{print $1}'`
- N-Map --> Easily download N-map using the official Link. N-Map
or using the commandline utility on debian systems
sudo apt-get install N-MAP
- Command Line Calculator --> Download the 'bc' calculator using following commands.
sudo apt-get install bc
- Linux OS - Kali linux is preferred.
- To start Vulnerous, clone the repository and install any prerequisite package.
- Make the script executable by typing following as root in terminal :
chmod u+x killer.sh
- Execute the script using the following command :
./killer.sh
Vulnerous is still in development and to contribute to this awesome software please contact the author.
- Medium
- Mail - [email protected]
I code, I write, I hack, I preach.
Always available for any opportunities! (Pssst...I am really passionate about cybersecurity).
Copyright (C) 2019 Ankush Sharma @ AINC
This program is free software: you can redistribute it and/or modify
it under the terms of the MIT License as it is published.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
MIT License for more details.
You should have received a copy of the Mit License
along with this program.
- Shout out to Offensive Security for their awesome blogs and documentation.
- Respect for nachoparker for his amazing tutorial on creating a cool progress bar