Skip to main content

Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.

Project description

Logo


Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.

Features

  • Rapid port scanning using multiple techniques
  • Integration with Shodan's InternetDB for quick results
  • Fallback to Python-based scanning when InternetDB data is unavailable
  • Nmap verification for enhanced accuracy
  • Multiple output formats: text, JSON, and port-only
  • Technology detection using Wappalyzer
  • Basic vulnerability information (when available from InternetDB)

Installation

To install Indraa, follow these steps:

pip install indraa
pip install requests json socket Wappalyzer


indraa.py -h

python3 indraa.py -h

Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.

USAGE:

    indraa [flags]

POSITIONAL ARGUMENTS:

    target                The target domain, IP address, or CIDR range to scan

FLAGS:
    -p, --ports             string    Ports to scan (e.g. 22,80,443 or 21-30)
    -oX, --output-xml                 Output scan in XML format
    -oJ, --output-json                Output scan in JSON format
    -oN, --output-normal              Output scan in normal text format
    -oP, --output-port-only           Output only IP and port in format ip:port
    -iL, --input-list       string    Input from list of hosts/networks
    -h, --help                        Show this help message and exit

Usage

To use Indraa, run the following command:

python3 indraa.py 1.1.1.1

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa  scan report for 1.1.1.1
Host is up

Ports found: 53, 80, 443, 2082, 2083, 2086, 2087, 8443, 8880

PORT      STATE  SERVICE      VERSION      TECHNOLOGIES

53/tcp    open   domain       unknown      unknown
80/tcp    open   http         unknown      Cloudflare
443/tcp   open   https        unknown      Cloudflare
2082/tcp  open   infowave     unknown      Cloudflare
2083/tcp  open   http         unknown      Cloudflare
2086/tcp  open   gnunet       unknown      Cloudflare
2087/tcp  open   http         unknown      Cloudflare
8443/tcp  open   https-alt    unknown      Cloudflare
8880/tcp  open   cddbp-alt    unknown      Cloudflare

Scan completed in 63.36 seconds

If your host has some vulnerability

python3 indraa.py hide.ip.add.res

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up

Ports found: 80

PORT      STATE  SERVICE      VERSION      TECHNOLOGIES
80/tcp    open   http         1.19.0       unknown


Vulnerabilities:
- CVE-2021-23017
- CVE-2023-44487
- CVE-2021-3618

To get output in json

python3 indraa.py hide.ip.add.ress -oJ

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up

{
    "host": {
        "status": "up",
        "address": "hide.ip.add.ress"
    },
    "ports": [
        {
            "port": "80",
            "state": "open",
            "service": "http",
            "version": "1.19.0",
            "technologies": [
                "unknown"
            ]
        }
    ],
    "start_time": "2024-00-00 00:00:00",
    "target": "hide.ip.add.ress",
    "host_status": "up",
    "duration": "33.25",
    "vulnerabilities": [
        "CVE-2021-23017",
        "CVE-2023-44487",
        "CVE-2021-3618"
    ]
}

Additional Usage Examples

Scanning Multiple Targets

You can scan multiple targets by providing a list of hosts or networks:

python3 indraa.py -iL targets.txt

Where targets.txt contains a list of IP addresses or domain names.

Scanning from Standard Input

You can also provide input directly from the command line:

echo hi.de.ip.ad | python3 indraa.py

Specifying Ports to Scan

To scan specific ports, use the -p flag:

python3 indraa.py 1.1.1.1 -p 22,80,443

Output Formats

indraa supports multiple output formats. Here are some examples:

  • XML Format:

    python3 indraa.py 1.1.1.1 -oX
    
  • JSON Format:

    python3 indraa.py 1.1.1.1 -oJ
    
  • Normal Text Format:

    python3 indraa.py 1.1.1.1 -oN
    
  • Port-Only Format:

    python3 indraa.py 1.1.1.1 -oP
    

License

This project is licensed under the MIT License. To view a copy of this license, visit https://opensource.org/licenses/MIT.

The MIT License is a permissive free software license that allows users to do almost anything they want with the project, such as making and distributing closed-source versions. It also provides an express grant of patent rights from contributors to users. However, it also comes with a limitation of liability and warranty disclaimer, meaning the software is provided "as is" without any guarantees.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

indraa-2.0.tar.gz (9.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

indraa-2.0-py3-none-any.whl (8.6 kB view details)

Uploaded Python 3

File details

Details for the file indraa-2.0.tar.gz.

File metadata

  • Download URL: indraa-2.0.tar.gz
  • Upload date:
  • Size: 9.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.10.12

File hashes

Hashes for indraa-2.0.tar.gz
Algorithm Hash digest
SHA256 911ec5699651dcd862561034b6c39bbd39c19d4e6933b7a05c95e4382b7ef037
MD5 1b6bb6080b51111472c91a495e667fc3
BLAKE2b-256 d5dc48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40

See more details on using hashes here.

File details

Details for the file indraa-2.0-py3-none-any.whl.

File metadata

  • Download URL: indraa-2.0-py3-none-any.whl
  • Upload date:
  • Size: 8.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.10.12

File hashes

Hashes for indraa-2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 71e5c11483a1101ed3470759de6127f0b9011e12067490734ccd348867c61053
MD5 40ac71c52c088c31b9e9a293fc6b02a3
BLAKE2b-256 bb21ec355300b49a92eab79df9cf30f8f3a34458fb6d4bb0b5290dd9e6fa96c6

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page