GithubHelp home page GithubHelp logo

arpsyndicate / kenzer Goto Github PK

View Code? Open in Web Editor NEW
287.0 13.0 61.0 1.59 MB

automated web assets enumeration & scanning [DEPRECATED]

Home Page: https://asm.arpsyndicate.io

Shell 1.54% Python 98.46%
kenzer favinizer s3hunter domlock certex freaker freakerdb zulip nuclei jaeles

kenzer's Introduction

KENZER - Automated web assets enumeration & scanning

[DEPRECATED]

ScanFactory LinkedIn ScanFactory Twitter ScanFactory Telegram Recon Bot

Mentions

A Conceptual Introduction to Automating Bug Bounties

Demo

kenzer

Screenshots

kenzer kenzer

Instructions for running

  1. Run git clone https://github.com/ARPSyndicate/kenzer /home/ubuntu/kenzer && cd /home/ubuntu/kenzer (preferred)
  2. Create an account on Zulip
  3. Navigate to Settings > Your Bots > Add a new bot
  4. Create a new generic bot named kenzer
  5. Add all the configurations in configs/kenzer.conf
  6. Install/Run using -
    • ./install.sh -b [if you need kenzer-compatible binaries to be installed] (preferred)
    • ./install.sh [if you do not need kenzer-compatible binaries to be installed]
    • ./run.sh [if you do not need installation at all]
    • ./service.sh [initialize it as a service post-installation] (preferred)
    • bash swap.sh [in case you are facing memory issues]
  7. Interact with kenzer using Zulip client, by adding bot to a stream or via DM.
  8. Test @**kenzer** man as Zulip input to display available commands.
  9. All the commands can be used by mentioning the chatbot using the prefix @**kenzer** (name of your chatbot).

Some Popular Features

  • Subdomain Enumeration using Subfinder, Amass, CerteX, TLSX, DNSX, NXScan, & ShuffleDNS
  • Port Enumeration using NXScan (Shodan, Netlas, Naabu & Nmap)
  • Web Enumeration using HttpX, Favinizer, Domlock, Gau, GoSpider, URLhunter & Waymore
  • Web Vulnerability Scanning using Freaker, Jaeles, Wapiti, ZAP, Nuclei, Rescro & DalFox
  • Backup Files Scanning using Fuzzuli
  • Git Repository Enumeration & Scanning using RepoHunt & Trufflehog
  • Web Screenshot Identification using Shottie & Perceptic
  • WAF Detection & Avoidance using WafW00f & Nuclei
  • Reputation Scoring using DomREP (GreyNoise, URLHaus, PhishTank)
  • Every task can be distributed over multiple machines
  • Every task can be executed through a single HTTP/SOCKS Proxy

Built-in Modules

  • blacklist <target>,<regex> - initializes & removes blacklisted targets
  • whitelist <target>,<regex> - initializes & keeps only whitelisted targets
  • program <target>,[<name>][<meta>][<link>] - initializes the program to which target belongs
  • subenum[-<mode>[active/passive (default=all)]] <target> - enumerates subdomains
  • repenum <target> - enumerates reputation of subdomains
  • repoenum <target> - enumerates github repositories
  • portenum[-<mode>[100/1000/full/fast (default=1000)]] <target> - enumerates open ports
  • servenum <target> - enumerates services
  • webenum <target> - enumerates webservers
  • headenum <target> - enumerates additional info from webservers
  • urlheadenum <target> - enumerates additional info from urls
  • asnenum <target> - enumerates asn records
  • dnsenum <target> - enumerates dns records
  • conenum <target> - enumerates hidden files & directories
  • urlenum[-<mode>[active/passive (default=all)]] <target> - enumerates urls
  • socenum <target> - enumerates social media accounts
  • keysenum <target> - enumerates sensitive api keys
  • wafscan <target> - scans for firewalls
  • subscan[-<mode>[web/dns (default=all)]] <target> - hunts for subdomain takeovers
  • urlscan[-<mode>[cmdi/crlf/redirect/sqli/ssrf/ssti/xss (default=all)]] <target> - hunts for vulnerabilities in URL parameters
  • reposcan <target> - scans github repositories for api key leaks
  • bakscan <target> - scans for backup files
  • cscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - scan with customized templates
  • cvescan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - hunts for CVEs
  • vulnscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - hunts for other common vulnerabilities
  • idscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - identifies applications running on webservers
  • portscan <target> - scans open ports (nmap)(slow)
  • shodscan <target> - scans open ports (shodan)(fast)
  • xssscan <target> - scans for xss vulnerabilities
  • appscan <target> - scans for webapp vulnerabilities
  • buckscan <target> - hunts for unreferenced aws s3 buckets
  • favscan <target> - fingerprints webservers using favicon
  • vizscan[-<mode>[web/repo (default=web)]] <target> - screenshots websites & repositories
  • enum <target> - runs all enumerator modules
  • scan <target> - runs all scanner modules
  • recon <target> - runs all modules
  • hunt <target> - runs your custom workflow
  • disseminate <command> <target> - splits & distributes input over multiple bots
  • upload - switches upload functionality
  • waf - switches waf avoid functionality"
  • proxy - switches proxy functionality"
  • upgrade - upgrades kenzer to latest version
  • monitor <target> - monitors ct logs for new subdomains
  • monitor normalize - normalizes the enumerations from ct logs
  • monitor db - monitors ct logs for domains in summary/domain.txt
  • monitor autohunt <frequency(default=5)> - starts automated hunt while monitoring
  • sync - synchronizes the local kenzerdb with github
  • freaker <module> [<target>] - runs freaker module
  • kenzer <module> - runs a specific module
  • kenzer man - shows this manual

The Beginner's Workflow

workflow

Although few more modules are available & much more is going to be released in the course of time which can advance this workflow, yet this one is enough to get started with & listed below are few of its successful hunts.

COMPATIBILITY TESTED ON UBUNTU 20.04.5 (x86_64) ONLY
RIGGED WITH LOGIC ISSUES
FEEL FREE TO SUBMIT PULL REQUESTS
THIS IS A VERY SOPHISTICATED AUTOMATION FRAMEWORK
MEANT TO BE DEPLOYED ON AWS UBUNTU 20.04 AMD64 SERVER
ABILITY TO UNDERSTAND PYTHON & BASH IS A PREREQUISITE
WE DO NOT PROVIDE ANY SUPPORT WITH INSTALLATION
ISSUES RELATED TO INSTALLATION WILL BE CLOSED WITHOUT ANY RESOLUTION

kenzer's People

Contributors

g147 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

kenzer's Issues

Invalid configurations - kenzer.conf wiki

Hey,

Could you please provide further information to configure kenzer.conf, please ?
I keep getting "[!] invalid configurations" and I'm not sure on which parameters I'm doing wrong.

Thanks,
RDMDR

Some questions about this project!

Can this project be scanned offline? How do I install and run it? Just like nuclei, can I install it to Kali Linux? In many cases, my computer is offline, but I want to scan my internal server and application website. Another thing, can kenzer's vulnerability template also be added to nuclei I for vulnerability scanning

No results

I dont get any results from the tool, is that normal ?

Bot doesn`t reply

I did the configuration and configured the bot and nothing happen when i type a command

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.