Automated Penetration Testing Suite leveraging Nmap and Metasploit Framework.
Project description
VulnHeist - Automated Penetration Testing Suite
Overview
VulnHeist is a comprehensive tool designed to automate the process of vulnerability scanning and exploitation. It leverages Nmap for scanning and the Metasploit Framework for exploiting identified vulnerabilities. The suite aims to streamline the penetration testing workflow, providing an easy-to-use interface for security professionals.
Features
- Automated Nmap Scanning: Performs detailed scans using Nmap scripts to identify vulnerabilities.
- Exploit Searching: Searches Metasploit for available exploits based on the scan results.
- Automated Exploitation: Attempts to exploit identified vulnerabilities with Metasploit.
- Session Management: Opens, interacts with, and closes sessions automatically.
- Logging and Reporting: Generates detailed logs and reports in Markdown and CSV formats.
- Interactive Console: Provides an interactive console with rich text output for user interactions.
Requirements
- Python 3.x
- Metasploit Framework
- Nmap
- Required Python packages:
- pymetasploit3
- colorama
- rich
- libnmap
- argparse
- pyfiglet
- matplotlib
Installation
-
Clone the repository: bash git clone https://github.com/your-repo/VulnHeist.git cd VulnHeist
-
Install the required Python packages: bash pip install -r requirements.txt
-
Ensure Metasploit and Nmap are installed and properly configured on your system.
Usage
The VulnHeist can be executed with various command-line arguments to perform different tasks.
Basic Commands
-
Scan an IP address: bash VulnHeist -S <IP_ADDRESS>
-
Exploit an IP address: bash VulnHeist -E <IP_ADDRESS>
-
Open a specific report file: bash VulnHeist -O <FILE_NAME>
-
Open all report files: bash VulnHeist -Oa
Command-Line Arguments
- -S: IP address to scan.
- -O: Open a report file (Exploitable.csv, All_exploits.csv, complete_results.csv).
- -Oa: Open all CSV files.
- -x: Disable the banner.
- -E: Exploit the vulnerabilities of a given IP address.
- -v: Turn off verbose mode for exploitation.
Example Usage
-
Scan and Exploit an IP Address: bash VulnHeist -S 192.168.1.1 VulnHeist -E 192.168.1.1
-
Open the Exploitable Report: bash VulnHeist -O Exploitable.csv
-
Open All Reports: bash VulnHeist -Oa
Automated Workflow
-
Scan an IP Address: bash VulnHeist -S 192.168.1.1
-
Check Results:
- Review the generated reports (Exploitable.csv, All_exploits.csv, complete_results.csv).
-
Exploit Discovered Vulnerabilities: bash VulnHeist -E 192.168.1.1
-
Open Sessions and Interact: The tool will manage Metasploit sessions and provide interaction capabilities for successful exploits.
Contributing
Contributions to VulnHeist are welcome! Feel free to submit issues or pull requests to improve the project.
License
This project is licensed under the BSD 3-Clause License.
Disclaimer
This tool is intended for educational purposes only. Unauthorized use of this tool is prohibited. Always obtain proper authorization before performing any penetration tests or scans on systems.
Authors
Enjoy using VulnHeist to enhance your security testing workflow!
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file VulnHeist-0.0.1.tar.gz
.
File metadata
- Download URL: VulnHeist-0.0.1.tar.gz
- Upload date:
- Size: 17.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.0 CPython/3.11.8
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e038c1ae730c528b606290d419e0bd78fb365a9e75b0c871364993d83b38d7a3 |
|
MD5 | ced246e19a54f2d36db508a55f611df0 |
|
BLAKE2b-256 | 3d021e1bda1d9eb5564a310e92774ed1117fa59686f596d19d824ca703410761 |
File details
Details for the file VulnHeist-0.0.1-py3-none-any.whl
.
File metadata
- Download URL: VulnHeist-0.0.1-py3-none-any.whl
- Upload date:
- Size: 17.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.0 CPython/3.11.8
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | dff47da3f88765947aacd7a385b7dafbbe9e5ebb475917a4baff9d49afc54f2d |
|
MD5 | 48d51103b0c7a16874bb031c61387b4f |
|
BLAKE2b-256 | 405ee60a723fe669c79afe0881d08cdeeef5cb340ca3f7eb549a37fb14ea8431 |