Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Go to file
Sam Stepanyan 52fcf41df7
Merge pull request #873 from OWASP/securestep9-readthedocs-readme-patch-1
docs README.md update
2024-08-25 02:20:27 +01:00
.data Fix typo 2022-04-12 17:33:02 -04:00
.github Create pypi_publish.yml 2024-08-25 00:00:23 +01:00
docs docs README.md update 2024-08-25 02:11:42 +01:00
nettacker Run scan in a separate thread when started via API 2024-08-23 17:45:01 -07:00
tests Change the entry point name/location 2024-08-11 11:31:18 -07:00
.gitattributes Create .gitattributes 2023-07-03 10:25:07 +01:00
.gitignore Nettacker code base major refactoring 2024-08-08 11:04:35 -07:00
.pre-commit-config.yaml Nettacker code base major refactoring 2024-08-08 11:04:35 -07:00
.readthedocs.yml mkdocs 2024-08-25 01:56:35 +01:00
CODE_OF_CONDUCT.md create code of conduct 2017-12-24 18:11:58 +03:30
CONTRIBUTING.md Change old hardcoded reference to OWASP repo #363 2021-01-11 18:59:13 +05:30
Dockerfile Update Dockerfile 2024-08-19 09:34:55 -07:00
EXTERNAL_LIBRARIES_LICENSES.md Add license for intro.js 2018-06-29 01:32:53 +05:30
LICENSE update license to apache version 2.0 2017-08-27 18:29:07 +04:30
README.md Update README.md - fixed broken images 2024-08-25 00:45:31 +01:00
SECURITY.md Create SECURITY.md 2024-08-25 00:23:18 +01:00
docker-compose.yml Update docker-compose.yml 2024-08-19 09:42:57 -07:00
mkdocs.yml mkdocs 2024-08-25 01:56:35 +01:00
nettacker.py Change the entry point name/location 2024-08-11 11:31:18 -07:00
poetry.lock Update release name/version handling 2024-08-21 08:28:19 -07:00
pyproject.toml Update release name/version handling 2024-08-21 08:28:19 -07:00

README.md

OWASP Nettacker

Build Status Apache License Twitter GitHub contributors repo size

DISCLAIMER

  • THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. YOU MUST USE THIS SOFTWARE IN A RESPONSIBLE AND ETHICAL MANNER. DO NOT TARGET SYSTEMS OR APPLICATIONS WITHOUT OBTAINING PERMISSIONS OR CONSENT FROM THE SYSTEM OWNERS OR ADMINISTRATORS. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

2018-01-19_0-45-07

OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanners making it one of the best.


Quick Setup & Run

$ docker-compose up -d && docker exec -it nettacker-nettacker-1 /bin/bash
# poetry run python nettacker.py -i owasp.org -s -m port_scan

Thanks to our awesome contributors

Awesome Contributors


IoT Scanner

  • Python Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner
  • Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… )
  • Asset Discovery & Network Service Analysis
  • Services Brute Force Testing
  • Services Vulnerability Testing
  • HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …
  • HTML, JSON, CSV and Text Outputs
  • API & WebUI
  • This project is at the moment in research and development phase
  • Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks:


Stargazers over time

Stargazers over time