Osmedeus – Fully Automated Offensive Security Tool for Reconnaissance & Vulnerability Scanning

Osmedeus is a fully automated tool that allows you to run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.

How to use

If you have no idea what are you doing just type the command below or check out the Advance Usage.

./osmedeus.py -t example.com

Installation in detail

For Kali Linux

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

For *nix OS

Check out default shell and package manager in the install and you will be fine

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

For MacOS

Install golang official or using homebrew and nmap, masscan. Setup your GOPATH like in the install file and you’re good to run. Most of those tools are work fine on MacOS but to install massdns you gonna need to change options to install it from make to make nolinux in install.sh.

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

This install only focus on Kali linux, check more install on Wiki page

Features

  • Subdomain Scan.
  • Subdomain TakeOver Scan.
  • Screenshot the target.
  • Basic recon like Whois, Dig info.
  • IP Discovery.
  • CORS Scan.
  • SSL Scan.
  • Headers Scan.
  • Port Scan.
  • Vulnerable Scan.
  • Separate workspaces to store all scan output and details logging.
  • REST API.
  • SPA Web UI.
  • Slack notifications.

Osmedeus will run as a Quick Speed:

  • Subdomain Scanning
  • ScreenShot the target
  • Subdomain TakeOver Scanning
  • Scanning for CorsScan
  • Discovery IP space
  • SSL Scan
  • Port Scanning and Vulnerable Scan

List all module

./osmedeus.py -M

Using specific module

Scanning subdomain and Subdomain TakeOver

./osmedeus.py -m subdomain -t example.com

Screenshot the target

./osmedeus.py -m portscan -t example.com

Port Scan and Vulnerable Scan on the target

./osmedeus.py -m portscan -t example.com

Vulnerable Scan on the target

./osmedeus.py -m vuln -t example.com

Doing directory search on the target

./osmedeus.py -m dir -t example.com

Doing brute force on the service result from scanning service

./osmedeus.py -m brute -t example.com

Git repo scanning

./osmedeus.py -m git --git https://github.com/whatever/repo

Doing some stuff with Burp State file

./osmedeus.py -m burp -t example.com --burp yourburpstate.xml

Demo

Disclaimer

Most of this tool done by the authors of the tool that you can see in the module folder. I just put all the pieces together, plus some extra boring stuff that we don’t wanna do everyday.

This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.

Contribute

Please take a look at CONTRIBUTING.md

CREDITS

Please take a look at CREDITS.md

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

12 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

12 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

15 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

18 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

19 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

20 hours ago