SECRET OF CSS

AutoPWN Suite – Project For Scanning Vulnerabilities And Exploiting Systems Automatically


AVvXsEhjTayZlPb6iJTaFuvS67 58lpU1 HTXZ6RgNNu4ufeETtb47TqydYCoerWh0c4zUH2yauB9rSeE3hRO3BkZGs2ilX9pZLliPk1iFzI IxYT2uKAyCIr6uJKt5Rj8 bck8nNEWBBhCCBsVOS U IuMj0e3iixigmn09Lmw fQKfN A gTR5AaYBWmRp=w640 h320

AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.

How does it work?

AutoPWN Suite uses nmap TCP-SYN scan to enumerate the host and detect the version of softwares running on it. After gathering enough information about the host, AutoPWN Suite automatically generates a list of “keywords” to search NIST vulnerability database.

Visit “PWN Spot!” for more information

Demo

AutoPWN Suite has a very user friendly easy to read output.

AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically. (10)

Installation

You can install it using pip. (sudo recommended)

sudo pip install autopwn-suite

OR

You can clone the repo.

git clone https://github.com/GamehunterKaan/AutoPWN-Suite.git

OR

You can download debian (deb) package from releases.

sudo apt-get install ./autopwn-suite_1.1.5.deb

Usage

Running with root privileges (sudo) is always recommended.

Automatic mode (This is the intended way of using AutoPWN Suite.)

Help Menu

vulnerability detection for faster scanning. (Default : None) -y, –yesplease Don’t ask for anything. (Full automatic mode) -m {evade,noise,normal}, –mode {evade,noise,normal} Scan mode. -nt TIMEOUT, –noisetimeout TIMEOUT Noise mode timeout. (Default : None) -c CONFIG, –config CONFIG Specify a config file to use. (Default : None) -v, –version Print version and exit.”>

$ autopwn-suite -h
usage: autopwn.py [-h] [-o OUTPUT] [-t TARGET] [-hf HOSTFILE] [-st {arp,ping}] [-nf NMAPFLAGS] [-s {0,1,2,3,4,5}] [-a API] [-y] [-m {evade,noise,normal}] [-nt TIMEOUT] [-c CONFIG] [-v]

AutoPWN Suite

options:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
Output file name. (Default : autopwn.log)
-t TARGET, --target TARGET
Target range to scan. This argument overwrites the hostfile argument. (192.168.0.1 or 192.168.0.0/24)
-hf HOSTFILE, --hostfile HOSTFILE
File containing a list of hosts to scan.
-st {arp,ping}, --scantype {arp,ping}
Scan type.
-nf NMAPFLAGS, --nmapflags NMAPFLAGS
Custom nmap flags to use for portscan. (Has to be specified like : -nf="-O")
-s {0,1,2,3,4, 5}, --speed {0,1,2,3,4,5}
Scan speed. (Default : 3)
-a API, --api API Specify API key for vulnerability detection for faster scanning. (Default : None)
-y, --yesplease Don't ask for anything. (Full automatic mode)
-m {evade,noise,normal}, --mode {evade,noise,normal}
Scan mode.
-nt TIMEOUT, --noisetimeout TIMEOUT
Noise mode timeout. (Default : None)
-c CONFIG, --config CONFIG
Specify a config file to use. (Default : None)
-v, --version Print version and exit.

TODO

Contributing to AutoPWN Suite

I would be glad if you are willing to contribute this project. I am looking forward to merge your pull request unless its something that is not needed or just a personal preference. Click here for more info!

Legal

You may not rent or lease, distribute, modify, sell or transfer the software to a third party. AutoPWN Suite is free for distribution, and modification with the condition that credit is provided to the creator and not used for commercial use. You may not use software for illegal or nefarious purposes. No liability for consequential damages to the maximum extent permitted by all applicable laws.

Support or Contact

Having trouble using this tool? You can reach me out on discord, create an issue or create a discussion!





News Credit

%d bloggers like this: