Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
Go to file
tristanlatr db443ff78a
Fix typo
2022-04-12 17:33:02 -04:00
.data Fix typo 2022-04-12 17:33:02 -04:00
.github add CI test 2021-12-05 00:31:40 +01:00
api bug534 fix 2022-01-08 08:24:38 +05:30
core fix race condition error and sorting steps 2021-12-17 01:52:27 +01:00
database increase sleep time 2021-12-15 02:21:42 +01:00
lib Update hi.yaml 2021-12-17 15:48:23 +05:30
modules possible race condition 2021-12-18 12:42:48 +01:00
web update project info in home screen 2021-10-29 01:19:54 +05:30
.gitignore apply git ignore 2021-08-25 19:57:04 +02:00
CODE_OF_CONDUCT.md create code of conduct 2017-12-24 18:11:58 +03:30
CONTRIBUTING.md Change old hardcoded reference to OWASP repo #363 2021-01-11 18:59:13 +05:30
Dockerfile Bump python from 3.10.0b4 to 3.10.0rc2 2021-10-01 22:18:04 +00:00
EXTERNAL_LIBRARIES_LICENSES.md Add license for intro.js 2018-06-29 01:32:53 +05:30
ISSUE_TEMPLATE.md Issue and PR Template Fixes 2020-12-19 09:21:38 -05:00
LICENSE update license to apache version 2.0 2017-08-27 18:29:07 +04:30
PULL_REQUEST_TEMPLATE.md update template 2021-08-08 20:50:37 +02:00
config.py auto service discovery 2021-12-04 23:43:20 +01:00
docker-compose.yml enhacements 2021-08-11 23:12:03 +02:00
logo.txt replace zdr 2021-08-12 21:17:59 +02:00
nettacker.py ditching py2 msg 2021-07-30 14:48:24 +02:00
readme.md Update readme.md 2021-12-17 16:01:43 +05:30
requirements-apt-get.txt docker improvement, apt dependencies fixed and censys bump down(latest verison have issues) 2021-06-16 08:50:27 +05:30
requirements-dev.txt Bump ipython from 7.30.0 to 7.30.1 2021-12-02 22:19:19 +00:00
requirements.txt Merge pull request #510 from OWASP/dependabot/pip/paramiko-2.8.1 2021-12-02 16:19:23 +01:00
version.txt change version 2021-09-09 21:18:40 +02:00

readme.md

OWASP Nettacker

Build Status Apache License Twitter GitHub contributors repo size

DISCLAIMER

  • THIS SOFTWARE WAS CREATED FOR AUTOMATED PENETRATION TESTING AND INFORMATION GATHERING. CONTRIBUTORS WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

2018-01-19_0-45-07

OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanner making it one of the bests.


Quick Setup & Run

$ docker-compose up -d && docker exec -it nettacker_nettacker_1 /bin/bash
# python nettacker.py -i owasp.org -s -m port_scan

Thanks to our awesome contributors

Awesome Contributors


IoT Scanner

  • Python Multi Thread & Multi Process Network Information Gathering Vulnerability Scanner
  • Service and Device Detection ( SCADA, Restricted Areas, Routers, HTTP Servers, Logins and Authentications, None-Indexed HTTP, Paradox System, Cameras, Firewalls, UTM, WebMails, VPN, RDP, SSH, FTP, TELNET Services, Proxy Servers and Many Devices like Juniper, Cisco, Switches and many more… )
  • Asset Discovery & Network Service Analysis
  • Services Brute Force Testing
  • Services Vulnerability Testing
  • HTTP/HTTPS Crawling, Fuzzing, Information Gathering and …
  • HTML, JSON, CSV and Text Outputs
  • API & WebUI
  • This project is at the moment in research and development phase
  • Thanks to Google Summer of Code Initiative and all the students who contributed to this project during their summer breaks: