0neXo0r / vulnx

Vulnx 🕷️ Cms and vulnerabilites detector, & An intelligent bot auto shell injector

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool


VulnX
VulnX

Vulnx 🕷️ Cms And Vulnerabilites Detector And An Intelligent Bot Auto Shell Injector

demo

VulnX WikiHow To UseCompatibility

Vulnx is a cms and vulnerabilites detection, an intelligent auto shell injector, fast cms detection of target and fast scanner and informations gathering like subdomains, ipaddresses, country, org, timezone, region, ans and more ...

Instead of injecting shell and checking it works like all the other tools do, vulnx analyses the response with and recieve if shell success uploaded or no. vulnx is searching for urls with dorks.

Features

  • Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
  • Target informations gatherings
  • Target Subdomains gathering
  • Multi-threading on demand
  • Checks for vulnerabilites
  • Auto shell injector
  • Exploit dork searcher
  • Ports Scan High Level
  • Dns-Servers Dump

DNS-Map-Results

To do this, we'll run a scan with the --dns flag and -d for subdomains. To generate a map of isetso.rnu.tn, you can run the command vulnx -u isetso.rnu.tn --dns -d --output $PATHin a terminal window.

$PATH : Where export the graphs ?

Screenshot from 2019-05-26 04-43-10

Let's zoom in and look at the Subdomains,MX & DNS Records.

demo

Exploits

Exploits Running

Joomla

Wordpress

Drupal

PrestaShop

Opencart

Available command line options

READ VULNX WIKI

usage: vulnx [options]

  -u --url              url target to scan
  -D --dorks            search webs with dorks
  -o --output           specify output directory
  -t --timeout          http requests timeout
  -c --cms-info         search cms info[themes,plugins,user,version..]
  -e --exploit          searching vulnerability & run exploits
  -w --web-info         web informations gathering
  -d --domain-info      subdomains informations gathering
  -l, --dork-list       list names of dorks exploits
  -n, --number-page     number page of search engine(Google)
  -p, --ports           ports to scan
  -i, --input           specify input file of domains to scan
  --threads             number of threads
  --dns                 dns informations gathering

Docker

VulnX can be launched in docker.

$ git clone https://github.com/anouarbensaad/VulnX.git
$ cd VulnX
$ docker build -t vulnx ./docker/
$ docker run -it --name vulnx vulnx:latest -u http://exemple.com

make a local volume to view the results into a logfile

$ docker run -it --name vulnx -v "$PWD/logs:/VulnX/logs" vulnx:latest -u http://exemple.com

Install vulnx on Ubuntu

$ git clone https://github.com/anouarbensaad/vulnx.git
$ cd VulnX
$ chmod +x install.sh
$ ./install.sh

Now run vulnx

Install vulnx on Termux

$ pkg update
$ pkg install -y git
$ git clone http://github.com/anouarbensaad/vulnx
$ cd vulnx
$ chmod +x install.sh
$ ./install.sh

CLICK HERE TO SHOW THE RESULT

example command with options : settimeout=3 , cms-gathering = all , -d subdomains-gathering , run --exploits

vulnx -u http://example.com --timeout 3 -c all -d -w --exploit

example command for searching dorks : -D or --dorks , -l --list-dorks

vulnx --list-dorks return table of exploits name. vulnx -D blaze return urls found with blaze dork

Versions

  • Fix parsing url
  • Fix Robot Detected when you searching for dorks.
  • Deserialize json data from dnsdumpster
  • Added Bot Automate Scan
  • Fix Modules Name
  • Exports Dorks Search into file
  • Added vulnx to PyPi
  • Added a ports scanner plugin.
  • Improve dorks google searching.
  • Added termux compatibility & fix pip package.
  • Use of ThreadPoolExecutor for more speed
  • Added pip packages.
  • Added travis.yml continuous integration
  • Added shields to README.MD
  • Added --timeout , --exploits , --cms-info , --domains-info , options
  • Added Dorks list
  • Fixed Dork Search
  • Added wordpress, joomla ,prestashop, drupal , lokomedia , magento , opencart CMS DETECT.
  • Disabled SSL Warning
  • Added WP-Exploits
  • Fixed Dockerfile

⚠️ Warning !!

I don't Accept any responsibility for any illegal usage.

Contribution & License

You can contribute in following ways:

Do you want to have a conversation in private? email me : Bensaad.tig@gmail.com

VulnX is licensed under MIT License **

About

Vulnx 🕷️ Cms and vulnerabilites detector, & An intelligent bot auto shell injector

License:MIT License


Languages

Language:Python 88.8%Language:Shell 7.1%Language:Dockerfile 3.1%Language:PHP 0.9%