Skip to main content

Automated Penetration Testing Suite leveraging Nmap and Metasploit Framework.

Project description

VulnHeist - Automated Penetration Testing Suite

Overview

VulnHeist is a comprehensive tool designed to automate the process of vulnerability scanning and exploitation. It leverages Nmap for scanning and the Metasploit Framework for exploiting identified vulnerabilities. The suite aims to streamline the penetration testing workflow, providing an easy-to-use interface for security professionals.

Features

  • Automated Nmap Scanning: Performs detailed scans using Nmap scripts to identify vulnerabilities.
  • Exploit Searching: Searches Metasploit for available exploits based on the scan results.
  • Automated Exploitation: Attempts to exploit identified vulnerabilities with Metasploit.
  • Session Management: Opens, interacts with, and closes sessions automatically.
  • Logging and Reporting: Generates detailed logs and reports in Markdown and CSV formats.
  • Interactive Console: Provides an interactive console with rich text output for user interactions.

Requirements

  • Python 3.x
  • Metasploit Framework
  • Nmap
  • Required Python packages:
    • pymetasploit3
    • colorama
    • rich
    • libnmap
    • argparse
    • pyfiglet
    • matplotlib

Installation

  1. Clone the repository: bash git clone https://github.com/your-repo/VulnHeist.git cd VulnHeist

  2. Install the required Python packages: bash pip install -r requirements.txt

  3. Ensure Metasploit and Nmap are installed and properly configured on your system.

Usage

The VulnHeist can be executed with various command-line arguments to perform different tasks.

Basic Commands

  • Scan an IP address: bash VulnHeist -S <IP_ADDRESS>

  • Exploit an IP address: bash VulnHeist -E <IP_ADDRESS>

  • Open a specific report file: bash VulnHeist -O <FILE_NAME>

  • Open all report files: bash VulnHeist -Oa

Command-Line Arguments

  • -S: IP address to scan.
  • -O: Open a report file (Exploitable.csv, All_exploits.csv, complete_results.csv).
  • -Oa: Open all CSV files.
  • -x: Disable the banner.
  • -E: Exploit the vulnerabilities of a given IP address.
  • -v: Turn off verbose mode for exploitation.

Example Usage

  1. Scan and Exploit an IP Address: bash VulnHeist -S 192.168.1.1 VulnHeist -E 192.168.1.1

  2. Open the Exploitable Report: bash VulnHeist -O Exploitable.csv

  3. Open All Reports: bash VulnHeist -Oa

Automated Workflow

  1. Scan an IP Address: bash VulnHeist -S 192.168.1.1

  2. Check Results:

    • Review the generated reports (Exploitable.csv, All_exploits.csv, complete_results.csv).
  3. Exploit Discovered Vulnerabilities: bash VulnHeist -E 192.168.1.1

  4. Open Sessions and Interact: The tool will manage Metasploit sessions and provide interaction capabilities for successful exploits.

Contributing

Contributions to VulnHeist are welcome! Feel free to submit issues or pull requests to improve the project.

License

This project is licensed under the BSD 3-Clause License.

Disclaimer

This tool is intended for educational purposes only. Unauthorized use of this tool is prohibited. Always obtain proper authorization before performing any penetration tests or scans on systems.

Authors


Enjoy using VulnHeist to enhance your security testing workflow!

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

VulnHeist-0.0.1.tar.gz (17.7 kB view details)

Uploaded Source

Built Distribution

VulnHeist-0.0.1-py3-none-any.whl (17.9 kB view details)

Uploaded Python 3

File details

Details for the file VulnHeist-0.0.1.tar.gz.

File metadata

  • Download URL: VulnHeist-0.0.1.tar.gz
  • Upload date:
  • Size: 17.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.0 CPython/3.11.8

File hashes

Hashes for VulnHeist-0.0.1.tar.gz
Algorithm Hash digest
SHA256 e038c1ae730c528b606290d419e0bd78fb365a9e75b0c871364993d83b38d7a3
MD5 ced246e19a54f2d36db508a55f611df0
BLAKE2b-256 3d021e1bda1d9eb5564a310e92774ed1117fa59686f596d19d824ca703410761

See more details on using hashes here.

File details

Details for the file VulnHeist-0.0.1-py3-none-any.whl.

File metadata

  • Download URL: VulnHeist-0.0.1-py3-none-any.whl
  • Upload date:
  • Size: 17.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.0 CPython/3.11.8

File hashes

Hashes for VulnHeist-0.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 dff47da3f88765947aacd7a385b7dafbbe9e5ebb475917a4baff9d49afc54f2d
MD5 48d51103b0c7a16874bb031c61387b4f
BLAKE2b-256 405ee60a723fe669c79afe0881d08cdeeef5cb340ca3f7eb549a37fb14ea8431

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page