evait-security / envizon

network visualization & pentest reporting

Home Page:https://evait-security.github.io/envizon/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

envizon - by evait security

EOL

#130

We (evait security) moved to https://gitlab.com/invuls/pentest-projects/pcf for internal project documentation.

network visualization & pentest reporting

Version 5.0

This tool is designed, developed and supported by evait security. In order to give something back to the security community, we publish our internally used and developed, state of the art network visualization and vulnerability reporting tool, 'envizon'. We hope your feedback will help to improve and hone it even further.

Website

https://evait-security.github.io/envizon/

Wiki

https://github.com/evait-security/envizon/wiki

Requirements

This is not a low-resource application. It is not recommended to run this software on embedded devices such as a raspberry pi. You should use a 64-bit architecture and at least 8 GB of RAM to get full experience (e.g. screenshotting multiple web services).

Use Case

We use envizon for our pentests in order to get an overview of a network and quickly identify the most promising targets. The version 3.0 introduce new features such as screenshotting web services, organizing vulnerabilities or generating reports with custom docx templates.

Core Features:

  • Scan networks with predefined or custom nmap queries
  • Order clients with preconfigured or custom groups
  • Search through all attributes of clients and create complex linked queries
  • Get an overview of your targets during pentests with predefined security labels or the subnet view
  • Screenshot Visualize all http-like applications of your targets using chrome-headless (selenium) - VNC soon™
  • Save and reuse your most used nmap scans
  • Collaborate with your team on the project in realtime (all users share the same password / workspace)
  • Export selected clients in a text file to connect other tools fast
  • Manage issue template and create vulnerabilities linked to hosts in the database
  • Create customer pentest reports with docx templates
  • Take notes no nearly any object (WIP)

Okay, i will use this tool - how to start?

https://github.com/evait-security/envizon/wiki/How-to-start

Usage instructions

https://github.com/evait-security/envizon/wiki/Usage

About

network visualization & pentest reporting

https://evait-security.github.io/envizon/

License:MIT License


Languages

Language:Ruby 59.5%Language:HTML 29.4%Language:JavaScript 6.2%Language:SCSS 2.8%Language:Shell 1.6%Language:Dockerfile 0.5%