Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Go to file
Ehsan Nezami c7f33627bf
Merge pull request #471 from OWASP/CVE-2021-1497
add new module cisco CVE 2021 1497
2021-10-02 18:58:38 +04:00
.data enhancements 2021-08-12 11:49:32 +02:00
.github parent d2e504ed26 2021-09-11 17:42:43 +02:00
api bug fix in webui export name and mimetype 2021-10-01 18:50:00 +02:00
core mark the md5 functionality to be fixed later 2021-10-02 15:33:58 +02:00
database bug fix in exporting results from webui 2021-10-01 18:36:12 +02:00
lib sort modules and profiles in cli and webui 2021-09-28 19:53:52 +02:00
modules add description and ref cve 2019 19781 2021-10-02 18:45:34 +04:00
web add filter to long contents 2021-09-27 22:25:07 +02:00
.gitignore apply git ignore 2021-08-25 19:57:04 +02:00
CODE_OF_CONDUCT.md create code of conduct 2017-12-24 18:11:58 +03:30
CONTRIBUTING.md Change old hardcoded reference to OWASP repo #363 2021-01-11 18:59:13 +05:30
Dockerfile Bump python from 3.10.0b4 to 3.10.0rc2 2021-10-01 22:18:04 +00:00
EXTERNAL_LIBRARIES_LICENSES.md Add license for intro.js 2018-06-29 01:32:53 +05:30
ISSUE_TEMPLATE.md Issue and PR Template Fixes 2020-12-19 09:21:38 -05:00
LICENSE update license to apache version 2.0 2017-08-27 18:29:07 +04:30
PULL_REQUEST_TEMPLATE.md update template 2021-08-08 20:50:37 +02:00
config.py remove unused newrelic api 2021-09-13 14:28:26 +02:00
docker-compose.yml enhacements 2021-08-11 23:12:03 +02:00
logo.txt replace zdr 2021-08-12 21:17:59 +02:00
nettacker.py ditching py2 msg 2021-07-30 14:48:24 +02:00
readme.md add contributors and quick setup in readme file 2021-10-02 15:47:35 +02:00
requirements-apt-get.txt docker improvement, apt dependencies fixed and censys bump down(latest verison have issues) 2021-06-16 08:50:27 +05:30
requirements-dev.txt Bump ipython from 7.27.0 to 7.28.0 2021-09-27 22:34:03 +00:00
requirements.txt Bump pyopenssl from 20.0.1 to 21.0.0 2021-09-29 22:15:44 +00:00
version.txt change version 2021-09-09 21:18:40 +02:00

readme.md

OWASP Nettacker

Build Status Apache License Twitter GitHub contributors repo size

DISCLAIMER

  • THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

2018-01-19_0-45-07

OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.


Quick Setup & Run

$ docker-compose up -d && docker exec -it nettacker_nettacker_1 /bin/bash
# python nettacker.py -i owasp.org -s -m port_scan

Thanks to our awesome contributors

Awesome Contributors


  • *** IoT Scanner***
  • Python Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner
  • Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… )
  • Asset Discovery & Network Service Analysis
  • Services Brute Force Testing
  • Services Vulnerability Testing
  • HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …
  • HTML, JSON, CSV and Text Outputs
  • API & WebUI
  • This project is at the moment in research and development phase
  • Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks: