choupit0

Hello, 2 years ago I created this Bash script for my own (professional) needs: https://github.com/choupit0/MassVulScan.git I was looking for a way to quickly and efficiently identify all the ports available on different remote sites connected to the Internet. And I wanted to make sure, at the same time, there was no host that exposed a service with known vulnerabilities (CVE). Maybe it could help someone on this forum 😉 and it's fully compatible with Pwnbox from HTB. Script strength * Automatic installation of all the prerequisites (Debian OS family) * 2 modes: automatic and Interactive * Interactive mode: ports to scan, rate level and nmap script * Extremely fast identification of open TCP/UDP ports (masscan) * The output is sorted to gather all ports to be scanned by host * Identification of services and vulnerabilities (nmap + vulners.nse) * Multiple sessions in parallel, one session per host * 2 generated reports: a global HTML and a TXT (vulnerable hosts)

About

Username
choupit0
Joined
Visits
1,411
Last Active
Roles
Member

Activity

  • choupit0 changed their profile picture.
    Thumbnail
    1:12AM
  • braj

    Had a question about Omni. You mentioned having the issue with "This version of BLAH" error which is making it so I can't get my reverse shell. I read your hints but still cant get it to work using multiple options. Can you lead me in the right direction for what specific command I need to run or what architecture in specific i need to be using other than x86? I am also getting basically no output or it is cut off so not sure if that's on my end or not.

    Thanks!

    August 29
Avatar

Howdy, Stranger!

Click here to create an account.