amunchet / Silver

Mass scan IPs for vulnerable services

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool


Silver
Silver

Mass Vulnerability Scanner

Introduction

masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more.

demo

Features

  • Resumable scanning
  • Slack notifcations
  • Multi-core utilization
  • Supports: IPs, CIDR & hostnames
  • Vulnerability data caching
  • Smart Shodan integration*

*Shodan integration is optional but when linked, Silver can automatically use Shodan to retrieve service and vulnerability data if a host has a lot of ports open to save resources. Shodan credits used per scan by Silver can be throttled. The minimum number of ports to trigger Shodan can be configured as well.

Setup

Downloading Silver

git clone https://github.com/s0md3v/Silver

Requirements

External Programs

Python libraries

  • psutil
  • requests

Required Python libraries can be installed by executing pip3 install -r requirements.txt in Silver directory.

Configuration

Slack WebHook, Shodan API key and limits can be configured by editing respective variables in /core/memory.py

Setting up Slack notifications

  • Create a workspace on slack, here
  • Create an app, here
  • Enable WebHooks from the app and copy the URL from there to Silver's /core/memory.py file.

Usage

Before you start

⚠️ Run Silver as root and with python3 i.e. with sudo python3 silver.py <your input>

⚠️ Silver scans all TCP ports by default i.e. ports 0-65535. Use --quick switch to only scan top ~1000 ports.

Scan host(s) from command line

python3 silver.py 127.0.0.1
python3 silver.py 127.0.0.1/22
python3 silver.py 127.0.0.1,127.0.0.2,127.0.0.3
Scan top ~1000 ports
python3 silver.py 127.0.0.1 --quick
Choose packets to be sent per seconds
python3 silver.py 127.0.0.1 --rate 10000
Scan hosts from a file
python3 silver.py -i /path/to/targets.txt

Note: If your input file contains any hostnames, use the --resolve flag to tell Silver to resolve them to IPs because masscan only scans IPs.

Set max number of parallel nmap instances
python3 silver.py -i /path/to/targets.txt -t 4

Contribution

You can contribute to this project by providing suggestions, reporting sensible issues and spreading the word. Pull requessts for the following will not be accepted:

  • Typos
  • coDe qUaLiTY
  • Docker and .gitignore file

About

Mass scan IPs for vulnerable services

License:GNU General Public License v3.0


Languages

Language:Python 100.0%