• Stars
    star
    211
  • Rank 180,170 (Top 4 %)
  • Language
    Python
  • License
    GNU General Publi...
  • Created about 4 years ago
  • Updated about 1 year ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Perform automated network reconnaissance scans

Alt text

Perform automated network reconnaissance scans to gather network intelligence.

IntelSpy is a multi-threaded network intelligence tool which performs automated network services enumeration. It performs live hosts detection scans, port scans, services enumeration scans, web content scans, brute-forcing, detailed off-line exploits searches and more.

The tool will also launch further enumeration scans for each detected service using a number of different tools.


Features

  • Scans multiple targets in the form of IP addresses, IP ranges (CIDR notation) and resolvable hostnames.
  • Scans targets concurrently.
  • Detects live hosts in an IP range (CIDR) network.
  • Customizable port scanning profiles and service enumeration commands.
  • Creates a directory structure for results gathering and reporting.
  • Logs every command that was executed.
  • Generates shell scripts containing commands to be run manually.
  • Extracts important information in txt and markdown format for further inspection.
  • Stores data to an SQLite database.
  • Generates an HTML report.

Requirements

  • Python 3 (sudo apt install python3)
  • Linux (preferably Kali Linux or any other hacking distribution containing the tools below.)
  • toml (https://github.com/toml-lang/toml)
  • seclists (https://github.com/danielmiessler/SecLists)
  • curl (prerequisite) (sudo apt install curl)
  • enum4linux (prerequisite) (sudo apt install enum4linux)
  • gobuster (prerequisite) (sudo apt install gobuster)
  • hydra (optional) (sudo apt install hydra)
  • ldapsearch (optional) (sudo apt install ldap-utils)
  • medusa (optional) (sudo apt install medusa)
  • nbtscan (prerequisite) (sudo apt install nbtscan)
  • nikto (prerequisite) (sudo apt install nikto)
  • nmap (prerequisite) (sudo apt install nmap)
  • onesixtyone (prerequisite) (sudo apt install onesixtyone)
  • oscanner (optional) (sudo apt install oscanner)
  • pandoc (prerequisite) (sudo apt install pandoc)
  • patator (optional) (sudo apt install patator)
  • showmount (prerequisite) (sudo apt install nfs-common)
  • smbclient (prerequisite) (sudo apt install smbclient)
  • smbmap (prerequisite) (sudo apt install smbmap)
  • smtp-user-enum (prerequisite) (sudo apt install smtp-user-enum)
  • snmpwalk (prerequisite) (sudo apt install snmp)
  • sslscan (prerequisite) (sudo apt install sslscan)
  • svwar (prerequisite) (sudo apt install sipvicious)
  • tnscmd10g (prerequisite) (sudo apt install tnscmd10g)
  • whatweb (prerequisite) (sudo apt install whatweb)
  • wkhtmltoimage (prerequisite) (sudo apt install wkhtmltopdf)
  • wpscan (optional) (sudo apt install wpscan)
pip3 install -r requirements.txt

Usage

$ python3 intelspy.py -h

 ___               __        
  |  ._ _|_  _  | (_  ._     
 _|_ | | |_ (/_ | __) |_) \/ 
                      |   /  
                                
IntelSpy v2.0 - Perform automated network reconnaissance scans to gather network intelligence.
IntelSpy is an open source tool licensed under GPLv3.
Written by: @maldevel | Logisek ICT
Web: https://logisek.com | https://pentest-labs.com
Project: https://github.com/maldevel/intelspy


usage: intelspy.py [-h] [-ts TARGET_FILE] -p PROJECT_NAME -w WORKING_DIR
                   [--exclude <host1[,host2][,host3],...>] [-s SPEED]
                   [-ct <number>] [-cs <number>] [--profile PROFILE_NAME]
                   [--livehost-profile LIVEHOST_PROFILE_NAME]
                   [--heartbeat HEARTBEAT] [-v]
                   [targets [targets ...]]

positional arguments:
  targets               IP addresses (e.g. 10.0.0.1), CIDR notation (e.g.
                        10.0.0.1/24), or resolvable hostnames (e.g.
                        example.com) to scan.

optional arguments:
  -h, --help            show this help message and exit
  -ts TARGET_FILE, --targets TARGET_FILE
                        Read targets from file.
  -p PROJECT_NAME, --project-name PROJECT_NAME
                        project name
  -w WORKING_DIR, --working-dir WORKING_DIR
                        working directory
  --exclude <host1[,host2][,host3],...>
                        exclude hosts/networks
  -s SPEED, --speed SPEED
                        0-5, set timing template (higher is faster) (default:
                        4)
  -ct <number>, --concurrent-targets <number>
                        The maximum number of target hosts to scan
                        concurrently. Default: 5
  -cs <number>, --concurrent-scans <number>
                        The maximum number of scans to perform per target
                        host. Default: 10
  --profile PROFILE_NAME
                        The port scanning profile to use (defined in port-
                        scan-profiles.toml). Default: default
  --livehost-profile LIVEHOST_PROFILE_NAME
                        The live host scanning profile to use (defined in
                        live-host-scan-profiles.toml). Default: default
  --heartbeat HEARTBEAT
                        Specifies the heartbeat interval (in seconds) for task
                        status messages. Default: 60
  -v, --verbose         Enable verbose output. Repeat for more verbosity (-v,
                        -vv, -vvv).

Usage Examples

Scanning single target

sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -v
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -vv
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -vvv

Scanning a hostname

sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ example.com

Scanning a network range(CIDR)

sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.0/24

Scanning multiple targets (comma separated)

sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 192.168.10.0/24 example.com

Scanning targets from file

sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ -ts /home/user/targets.txt

Excluding one host

sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ --exclude 192.168.10.9 192.168.10.0/24

Excluding many hosts

sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ --exclude 192.168.10.9,192.168.10.24 192.168.10.0/24

Credits

I started working on IntelSpy when I discovered AutoRecon. Instead of reinventing the wheel, IntelSpy is the result of merging IntelSpy with the best features of the AutoRecon to create a network reconnaissance tool suitable for Penetration Testing engagements.


More Repositories

1

IPGeoLocation

Retrieve IP Geolocation information
Python
835
star
2

EmailHarvester

Email addresses harvester
Python
747
star
3

PenTestKit

Tools, scripts and tips useful during Penetration Testing engagements.
Shell
589
star
4

gdog

A fully featured Windows backdoor that uses Gmail as a C&C server
Python
479
star
5

canisrufus

A stealthy Python based Windows backdoor that uses Github as a command and control server
Python
259
star
6

blue-team

Blue Team Scripts
Shell
239
star
7

driver-loader

Load a Windows Kernel Driver
C++
91
star
8

clearlogs

Clear All Windows System Logs - AntiForensics
C#
52
star
9

gophish

GoPhish automation
Python
36
star
10

RSA2048

RSA 2048 encryption using CryptoAPI and C
C
31
star
11

PEdumper

Dump Windows PE file information in C
C
23
star
12

OverTheWire

OverTheWire Wargames write-ups
Python
19
star
13

AES256

AES 256 CBC encryption and Base64 encoding with CryptoAPI and C
C
18
star
14

WinRC4

RC4 Encryption with CryptoAPI and C
C
15
star
15

training

Notes on offensive training
15
star
16

dicerosbicornis

A fully featured Windows backdoor that uses email as a C&C server
Python
14
star
17

exploitation

Software exploitation training material
Python
14
star
18

osint

Tools, scripts and tips useful during OSINT investigations and reconnaissance.
11
star
19

email-providers

Free Email Providers
10
star
20

exploits

Various exploits
Python
10
star
21

RSA2048Sharp

RSA 2048 encryption using CryptoAPI and C#
C#
9
star
22

RC4

RC4 Encryption with OpenSSL RC4 in C
C
8
star
23

youtube-video-image

Download youtube video cover image.
Python
6
star
24

nsl00kup

Query the Domain Name System (DNS)
Python
6
star
25

AES256CBC

OpenSSL AES 256 CBC encryption and Base64 Encoding
C
5
star
26

SHA256

Calculate SHA 256 with CryptoAPI and C
C++
5
star
27

ServiceInstaller

Creates a service to load a driver (.sys) into kernel.
C
5
star
28

AES256Sharp

AES 256 CBC encryption and Base64 encoding with CryptoAPI and C#
C#
5
star
29

HashSHA512

Calculate SHA 512 with CryptoAPI and C
C
4
star
30

MetaScrub

Remove personal metadata from files.
C
4
star
31

maldevel.github.io

me
HTML
3
star
32

Peteb

Access Windows 8.1 TEB/PEB (x86 process)
C
3
star
33

misc

Miscellaneous scripts, code and other random stuff
Shell
3
star
34

SG2015

SG2015 Conference Material
2
star
35

zlibCompression

Compress and uncompress data buffers with zlib in C.
C
2
star
36

HashSHA256

Calculate SHA 256 with OpenSSL and C
C
1
star