A scanner for the first day of a pentest
Spitzer is a Day Zero Scanner for a pentest. The idea of the scanner is to chart the network and find all open ports with possible outdated services. Spitzer does not exploit anything, it merely scans for possible exploits and errors. This tool was developed during an internship at HackDefense in 2019.
Spitzer was developed on Kali 2019.3 with Python 3.7.3. Spitzer makes use of a lot of pre-installed tools on kali, so I recommend to only use this on kali. If you want to use another Linux-dist, here is a list of the tools.
Clone the project and install it:
git clone https://github.com/Riqky/Spitzer cd Spitzer ./install.sh
and then start the script to get the interactive shell:
From the interactive shell you can run a range of commands. Here is the output of the help command:
> help Documented commands (type help <topic>): ======================================== EOF exit exploit help options quit run scan set shell
this runs both the exploit and the scan command.
Exits the application gracefully
Runs all the exploit modules in
data.json. These modules do not actually exploit, I'm just bad at naming. You can easily add an module to this command, see: Adding Module
displays the help for all commands. To get more information about the command, use
? can also be used
Shows all the options for running the scans and exploits.
Runs the scan modules. The module first executes
masscan multiple 3 times (amount can be set in
info). Then it runs
nmap with the options
-sV -nP and the given options from
Is used the set the options from
set <key> <value>
Can be used to run shell commands in the working directory with
shell <command> or
Quits the pogram. This is executed when you press
The 'exploit' modules are loaded in at run-time, meaning that you can easily add another exploit to the script.
First you need to create a new python file with an unique name in the folder
Spitzer/exploiters. This script must contain the following method:
def exploit(host, nmap, port):
host host is the hostname or IP-address of the target,
nmap is a dict with the results of the nmap-scan (see python-nmap for more information) and
port is the port where the running service is found.
Within the function you can run test the service for vulnerabilities. You can use the
result script to export the results to a file after testing.
Then, you'll need to add the script to
data.json. This file contains all the ports and corresponding modules. In
data.json add a new entry in
"http":["websploit"] "ftp":["ftp", "ftp-anon"]
The follwing tools are currently used by Spitzer, non-Kali tools are installed by
setup.sh. The rest you'll need to install manualy if you want to use Spitzer outside of Kali.
Not in Kali, and thus installed by
- HackDefense for giving me the room and help to create this script.
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
|Filename, size||File type||Python version||Upload date||Hashes|
|Filename, size SpitzerSec-0.1.8.tar.gz (21.1 kB)||File type Source||Python version None||Upload date||Hashes View hashes|