Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls to zoomeye, fofa, shodan and other APIs to perform bulk vulnerability verification for multiple targets. (Still in DEV...)
Install
pip3 install -r requestment.txt
Usage
When you run it for the first time, the configuration file
conf/tentacle.conf
will be generated automatically.# Show help for tentacle.
python3 tentacle.py --help
# Show all modual, and you can see it in `script` path.
python3 tentacle.py --show
# Show all function of module by -f show or -f help
python3 tentacle.py -m script/web/web_status -f show
python3 tentacle.py -m script/web/web_status -f help
# Load target by iS/iN/iF/iT/iX/iE/gg/sd/ze/ff.
# Scan port and then it will try to send the poc.
python3 tentacle.py -m script/web/web_status -iS www.examples.com # Load target by url or host
python3 tentacle.py -m script/web/web_status -iN 192.168.111.0/24 # Load target by network
python3 tentacle.py -m script/web/web_status -iF target.txt # Load target by file
python3 tentacle.py -m script/web/web_status -iT dcc54c3e1cc2c2e1 # Load target by recode's target
python3 tentacle.py -m script/web/web_status -iX nmap_xml.xml # Load target by nmap.xml
python3 tentacle.py -m script/web/web_status -iE "powered by discuz" # Load target by baidu/bing/360so
python3 tentacle.py -m script/web/web_status -gg 'intext:powered by discuz' # Load target by google api
python3 tentacle.py -m script/web/web_status -sd 'apache' # Load target by shodan api
python3 tentacle.py -m script/web/web_status -ze 'app:weblogic' # Load target by zoomeye api
python3 tentacle.py -m script/web/web_status -ff 'domain="example.com"' # Load target by fofa api
# Load modual by -m (e.g. script/info/web_status,@web)
python3 tentacle.py -iS 127.0.0.1 -m script/web/web_status # Load web_status module
python3 tentacle.py -iS 127.0.0.1 -m @web # Load all module of web path
python3 tentacle.py -iS 127.0.0.1 -m script/web/web_status,@web # Load all module of web path and web_status module
python3 tentacle.py -iS 127.0.0.1 -m "*" # Load all module of script path
# Set port scan scope
python3 tentacle.py -iS 127.0.0.1 -m script/web/web_status # Scan top 150 ports and then perform bulk vulnerability verification for multiple targets.
python3 tentacle.py -iS 127.0.0.1 -m script/web/web_status -sP # Skip port scan and then it will try the default port number server
python3 tentacle.py -iS 127.0.0.1 -m script/web/web_status -lP 80-90,443 # Scan 80-90 ports and 443 port and then perform bulk vulnerability verification for multiple targets.
# Use function of modual by -m and -f (e.g. -m web_status -f prove), and you should make sure the function of module is exist.
python3 tentacle.py -m script/web/web _status -f prove
# Show task's result by -tS
python3 tentacle.py -tS 8d4b37597aaec25e
# Export task's result by -tS to test.xlsx
python3 tentacle.py -tS 8d4b37597aaec25e -o test
# Update by git
python3 tentacle.py --update
Update
- [2018-11-15] Code refactoring and fix bug.
- [2019-06-08] Code refactoring and add port scan.
- [2020-03-15] Code refactoring and add script.
Thanks
via KitPloit
Related posts
- Tools Used For Hacking
- Hacking Tools Kit
- Pentest Tools Website Vulnerability
- Hacking Tools 2020
- Hack Tools
- Github Hacking Tools
- Hacker Hardware Tools
- Pentest Tools List
- Hacker Tools List
- Termux Hacking Tools 2019
- Hacking Tools Download
- Pentest Tools Review
- Hackrf Tools
- Hacker Tools 2019
- Pentest Tools Open Source
- Hacking Tools Download
- New Hack Tools
- Hacker Tools List
- Blackhat Hacker Tools
- Hacker Tools 2019
- Hack Tools For Ubuntu
- Hacking Tools 2019
- Pentest Automation Tools
- Pentest Tools Android
- Hacking Tools For Beginners
- Hack Tools For Ubuntu
- Growth Hacker Tools
- Pentest Tools Url Fuzzer
- World No 1 Hacker Software
No hay comentarios:
Publicar un comentario