Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
Project description
Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
Features
- Rapid port scanning using multiple techniques
- Integration with Shodan's InternetDB for quick results
- Fallback to Python-based scanning when InternetDB data is unavailable
- Nmap verification for enhanced accuracy
- Multiple output formats: text, JSON, and port-only
- Technology detection using Wappalyzer
- Basic vulnerability information (when available from InternetDB)
Installation
To install Indraa, follow these steps:
pip install indraa
pip install requests json socket Wappalyzer
indraa.py -h
python3 indraa.py -h
Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
USAGE:
indraa [flags]
POSITIONAL ARGUMENTS:
target The target domain, IP address, or CIDR range to scan
FLAGS:
-p, --ports string Ports to scan (e.g. 22,80,443 or 21-30)
-oX, --output-xml Output scan in XML format
-oJ, --output-json Output scan in JSON format
-oN, --output-normal Output scan in normal text format
-oP, --output-port-only Output only IP and port in format ip:port
-iL, --input-list string Input from list of hosts/networks
-h, --help Show this help message and exit
Usage
To use Indraa, run the following command:
python3 indraa.py 1.1.1.1
Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for 1.1.1.1
Host is up
Ports found: 53, 80, 443, 2082, 2083, 2086, 2087, 8443, 8880
PORT STATE SERVICE VERSION TECHNOLOGIES
53/tcp open domain unknown unknown
80/tcp open http unknown Cloudflare
443/tcp open https unknown Cloudflare
2082/tcp open infowave unknown Cloudflare
2083/tcp open http unknown Cloudflare
2086/tcp open gnunet unknown Cloudflare
2087/tcp open http unknown Cloudflare
8443/tcp open https-alt unknown Cloudflare
8880/tcp open cddbp-alt unknown Cloudflare
Scan completed in 63.36 seconds
If your host has some vulnerability
python3 indraa.py hide.ip.add.res
Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up
Ports found: 80
PORT STATE SERVICE VERSION TECHNOLOGIES
80/tcp open http 1.19.0 unknown
Vulnerabilities:
- CVE-2021-23017
- CVE-2023-44487
- CVE-2021-3618
To get output in json
python3 indraa.py hide.ip.add.ress -oJ
Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up
{
"host": {
"status": "up",
"address": "hide.ip.add.ress"
},
"ports": [
{
"port": "80",
"state": "open",
"service": "http",
"version": "1.19.0",
"technologies": [
"unknown"
]
}
],
"start_time": "2024-00-00 00:00:00",
"target": "hide.ip.add.ress",
"host_status": "up",
"duration": "33.25",
"vulnerabilities": [
"CVE-2021-23017",
"CVE-2023-44487",
"CVE-2021-3618"
]
}
Additional Usage Examples
Scanning Multiple Targets
You can scan multiple targets by providing a list of hosts or networks:
python3 indraa.py -iL targets.txt
Where targets.txt contains a list of IP addresses or domain names.
Scanning from Standard Input
You can also provide input directly from the command line:
echo hi.de.ip.ad | python3 indraa.py
Specifying Ports to Scan
To scan specific ports, use the -p flag:
python3 indraa.py 1.1.1.1 -p 22,80,443
Output Formats
indraa supports multiple output formats. Here are some examples:
-
XML Format:
python3 indraa.py 1.1.1.1 -oX
-
JSON Format:
python3 indraa.py 1.1.1.1 -oJ
-
Normal Text Format:
python3 indraa.py 1.1.1.1 -oN
-
Port-Only Format:
python3 indraa.py 1.1.1.1 -oP
License
This project is licensed under the MIT License. To view a copy of this license, visit https://opensource.org/licenses/MIT.
The MIT License is a permissive free software license that allows users to do almost anything they want with the project, such as making and distributing closed-source versions. It also provides an express grant of patent rights from contributors to users. However, it also comes with a limitation of liability and warranty disclaimer, meaning the software is provided "as is" without any guarantees.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file indraa-2.0.tar.gz.
File metadata
- Download URL: indraa-2.0.tar.gz
- Upload date:
- Size: 9.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
911ec5699651dcd862561034b6c39bbd39c19d4e6933b7a05c95e4382b7ef037
|
|
| MD5 |
1b6bb6080b51111472c91a495e667fc3
|
|
| BLAKE2b-256 |
d5dc48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40
|
File details
Details for the file indraa-2.0-py3-none-any.whl.
File metadata
- Download URL: indraa-2.0-py3-none-any.whl
- Upload date:
- Size: 8.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.10.12
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
71e5c11483a1101ed3470759de6127f0b9011e12067490734ccd348867c61053
|
|
| MD5 |
40ac71c52c088c31b9e9a293fc6b02a3
|
|
| BLAKE2b-256 |
bb21ec355300b49a92eab79df9cf30f8f3a34458fb6d4bb0b5290dd9e6fa96c6
|