• Stars
    star
    281
  • Rank 147,023 (Top 3 %)
  • Language
    Python
  • Created over 4 years ago
  • Updated almost 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

automated web assets enumeration & scanning [DEPRECATED]

KENZER - Automated web assets enumeration & scanning

[DEPRECATED]

ScanFactory LinkedIn ScanFactory Twitter ScanFactory Telegram Recon Bot

Mentions

A Conceptual Introduction to Automating Bug Bounties

Demo

kenzer

Screenshots

kenzer kenzer

Instructions for running

  1. Run git clone https://github.com/ARPSyndicate/kenzer /home/ubuntu/kenzer && cd /home/ubuntu/kenzer (preferred)
  2. Create an account on Zulip
  3. Navigate to Settings > Your Bots > Add a new bot
  4. Create a new generic bot named kenzer
  5. Add all the configurations in configs/kenzer.conf
  6. Install/Run using -
    • ./install.sh -b [if you need kenzer-compatible binaries to be installed] (preferred)
    • ./install.sh [if you do not need kenzer-compatible binaries to be installed]
    • ./run.sh [if you do not need installation at all]
    • ./service.sh [initialize it as a service post-installation] (preferred)
    • bash swap.sh [in case you are facing memory issues]
  7. Interact with kenzer using Zulip client, by adding bot to a stream or via DM.
  8. Test @**kenzer** man as Zulip input to display available commands.
  9. All the commands can be used by mentioning the chatbot using the prefix @**kenzer** (name of your chatbot).

Some Popular Features

  • Subdomain Enumeration using Subfinder, Amass, CerteX, TLSX, DNSX, NXScan, & ShuffleDNS
  • Port Enumeration using NXScan (Shodan, Netlas, Naabu & Nmap)
  • Web Enumeration using HttpX, Favinizer, Domlock, Gau, GoSpider, URLhunter & Waymore
  • Web Vulnerability Scanning using Freaker, Jaeles, Wapiti, ZAP, Nuclei, Rescro & DalFox
  • Backup Files Scanning using Fuzzuli
  • Git Repository Enumeration & Scanning using RepoHunt & Trufflehog
  • Web Screenshot Identification using Shottie & Perceptic
  • WAF Detection & Avoidance using WafW00f & Nuclei
  • Reputation Scoring using DomREP (GreyNoise, URLHaus, PhishTank)
  • Every task can be distributed over multiple machines
  • Every task can be executed through a single HTTP/SOCKS Proxy

Built-in Modules

  • blacklist <target>,<regex> - initializes & removes blacklisted targets
  • whitelist <target>,<regex> - initializes & keeps only whitelisted targets
  • program <target>,[<name>][<meta>][<link>] - initializes the program to which target belongs
  • subenum[-<mode>[active/passive (default=all)]] <target> - enumerates subdomains
  • repenum <target> - enumerates reputation of subdomains
  • repoenum <target> - enumerates github repositories
  • portenum[-<mode>[100/1000/full/fast (default=1000)]] <target> - enumerates open ports
  • servenum <target> - enumerates services
  • webenum <target> - enumerates webservers
  • headenum <target> - enumerates additional info from webservers
  • urlheadenum <target> - enumerates additional info from urls
  • asnenum <target> - enumerates asn records
  • dnsenum <target> - enumerates dns records
  • conenum <target> - enumerates hidden files & directories
  • urlenum[-<mode>[active/passive (default=all)]] <target> - enumerates urls
  • socenum <target> - enumerates social media accounts
  • keysenum <target> - enumerates sensitive api keys
  • wafscan <target> - scans for firewalls
  • subscan[-<mode>[web/dns (default=all)]] <target> - hunts for subdomain takeovers
  • urlscan[-<mode>[cmdi/crlf/redirect/sqli/ssrf/ssti/xss (default=all)]] <target> - hunts for vulnerabilities in URL parameters
  • reposcan <target> - scans github repositories for api key leaks
  • bakscan <target> - scans for backup files
  • cscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - scan with customized templates
  • cvescan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - hunts for CVEs
  • vulnscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - hunts for other common vulnerabilities
  • idscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - identifies applications running on webservers
  • portscan <target> - scans open ports (nmap)(slow)
  • shodscan <target> - scans open ports (shodan)(fast)
  • xssscan <target> - scans for xss vulnerabilities
  • appscan <target> - scans for webapp vulnerabilities
  • buckscan <target> - hunts for unreferenced aws s3 buckets
  • favscan <target> - fingerprints webservers using favicon
  • vizscan[-<mode>[web/repo (default=web)]] <target> - screenshots websites & repositories
  • enum <target> - runs all enumerator modules
  • scan <target> - runs all scanner modules
  • recon <target> - runs all modules
  • hunt <target> - runs your custom workflow
  • disseminate <command> <target> - splits & distributes input over multiple bots
  • upload - switches upload functionality
  • waf - switches waf avoid functionality"
  • proxy - switches proxy functionality"
  • upgrade - upgrades kenzer to latest version
  • monitor <target> - monitors ct logs for new subdomains
  • monitor normalize - normalizes the enumerations from ct logs
  • monitor db - monitors ct logs for domains in summary/domain.txt
  • monitor autohunt <frequency(default=5)> - starts automated hunt while monitoring
  • sync - synchronizes the local kenzerdb with github
  • freaker <module> [<target>] - runs freaker module
  • kenzer <module> - runs a specific module
  • kenzer man - shows this manual

The Beginner's Workflow

workflow

Although few more modules are available & much more is going to be released in the course of time which can advance this workflow, yet this one is enough to get started with & listed below are few of its successful hunts.

COMPATIBILITY TESTED ON UBUNTU 20.04.5 (x86_64) ONLY
RIGGED WITH LOGIC ISSUES
FEEL FREE TO SUBMIT PULL REQUESTS
THIS IS A VERY SOPHISTICATED AUTOMATION FRAMEWORK
MEANT TO BE DEPLOYED ON AWS UBUNTU 20.04 AMD64 SERVER
ABILITY TO UNDERSTAND PYTHON & BASH IS A PREREQUISITE
WE DO NOT PROVIDE ANY SUPPORT WITH INSTALLATION
ISSUES RELATED TO INSTALLATION WILL BE CLOSED WITHOUT ANY RESOLUTION

More Repositories

1

awesome-intelligence

A collaboratively curated list of awesome Open-Source Intelligence (OSINT) Resources
1,221
star
2

puncia

The Panthera(P.)uncia of Cybersecurity - Official CLI utility for Subdomain Center & Exploit Observer.
Python
632
star
3

cvemon

Monitoring exploits & references for CVEs
201
star
4

bug-bounty-recon-dataset

recon data for public bug bounty programs. due to extreme abuse via automated tools & requests from multiple threat intelligence teams, this project has been archived & moved.
171
star
5

kenzer-templates

essential templates for kenzer [DEPRECATED]
Python
97
star
6

xlocate

the ultimate exploits/references finder
Python
38
star
7

freaker

automation framework for kenzerdb
Python
19
star
8

favinizer

favicon fingerprinting
Python
12
star
9

rescro

regular expression extractor for webpages
Python
10
star
10

certex

monitors certificate transparency logs
Python
8
star
11

NXScan

fast ip scanning with fancy output
Python
6
star
12

dmass

scrapes domains from VDP/BBP scopes
Python
6
star
13

RepoHunt

hunt github repositories by keywords
Python
5
star
14

kenzerdb

A sample git-repo for storing data for/from kenzer & freaker [DEPRECATED]
Shell
5
star
15

S3Hunter

hunts for unreferenced aws s3 buckets
Python
5
star
16

domlock

subdomains to asn & netblocks
Python
5
star
17

kenzer-bin

essential binaries for kenzer(x64) must be tested in a sandboxed environment before pushing to production. [DEPRECATED]
5
star
18

shottie

web screenshot utility
Python
3
star
19

axiom-kenzer

A custom axiom image to quickly deploy kenzer recon chatbot to VPS
Shell
2
star
20

servx

Bash Command as a Service
Python
2
star
21

perceptic

perceptual image hashing
Python
2
star
22

domrep

domain reputation calculator
Python
2
star
23

zstamp

timestamp initializer
Python
1
star
24

YourX

url clusterer
Python
1
star