Osmedeus – Fully Automated Offensive Security Tool for Reconnaissance & Vulnerability Scanning

Osmedeus is a fully automated tool that allows you to run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.

How to use

If you have no idea what are you doing just type the command below or check out the Advance Usage.

./osmedeus.py -t example.com

Installation in detail

For Kali Linux

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

For *nix OS

Check out default shell and package manager in the install and you will be fine

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

For MacOS

Install golang official or using homebrew and nmap, masscan. Setup your GOPATH like in the install file and you’re good to run. Most of those tools are work fine on MacOS but to install massdns you gonna need to change options to install it from make to make nolinux in install.sh.

git clone https://github.com/j3ssie/Osmedeus
cd Osmedeus
./install.sh

This install only focus on Kali linux, check more install on Wiki page

Features

  • Subdomain Scan.
  • Subdomain TakeOver Scan.
  • Screenshot the target.
  • Basic recon like Whois, Dig info.
  • IP Discovery.
  • CORS Scan.
  • SSL Scan.
  • Headers Scan.
  • Port Scan.
  • Vulnerable Scan.
  • Separate workspaces to store all scan output and details logging.
  • REST API.
  • SPA Web UI.
  • Slack notifications.

Osmedeus will run as a Quick Speed:

  • Subdomain Scanning
  • ScreenShot the target
  • Subdomain TakeOver Scanning
  • Scanning for CorsScan
  • Discovery IP space
  • SSL Scan
  • Port Scanning and Vulnerable Scan

List all module

./osmedeus.py -M

Using specific module

Scanning subdomain and Subdomain TakeOver

./osmedeus.py -m subdomain -t example.com

Screenshot the target

./osmedeus.py -m portscan -t example.com

Port Scan and Vulnerable Scan on the target

./osmedeus.py -m portscan -t example.com

Vulnerable Scan on the target

./osmedeus.py -m vuln -t example.com

Doing directory search on the target

./osmedeus.py -m dir -t example.com

Doing brute force on the service result from scanning service

./osmedeus.py -m brute -t example.com

Git repo scanning

./osmedeus.py -m git --git https://github.com/whatever/repo

Doing some stuff with Burp State file

./osmedeus.py -m burp -t example.com --burp yourburpstate.xml

Demo

Disclaimer

Most of this tool done by the authors of the tool that you can see in the module folder. I just put all the pieces together, plus some extra boring stuff that we don’t wanna do everyday.

This tool is for educational purposes only. You are responsible for your own actions. If you mess something up or break any laws while using this software, it’s your fault, and your fault only.

Contribute

Please take a look at CONTRIBUTING.md

CREDITS

Please take a look at CREDITS.md

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials

A sophisticated phishing campaign has been uncovered by Fortinet’s FortiGuard Labs, targeting Windows users with…

7 minutes ago

Cookie-Bite Attack Enables MFA Bypass and Persistent Cloud Server Access

Researchers have exposed a sophisticated cyberattack technique dubbed the "Cookie-Bite Attack," which allows adversaries to…

51 minutes ago

Synology Network File System Vulnerability Allows Unauthorized File Access

A critical security vulnerability in Synology’s Network File System (NFS) service, tracked as CVE-2025-1021, has…

1 hour ago

Super-Smart AI Could Launch Attacks Sooner Than We Think

In a development for cybersecurity, large language models (LLMs) are being weaponized by malicious actors…

2 hours ago

Hackers Deploy New Malware Disguised as Networking Software Updates

A sophisticated backdoor has been uncovered targeting major organizations across Russia, including government bodies, financial…

2 hours ago

CrowdStrike Launches Falcon® Privileged Access with Advanced Identity Protection

CrowdStrike today announced the general availability of Falcon® Privileged Access, a breakthrough module in its…

3 hours ago