Need help with Xerror?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

Chudry
276 Stars 63 Forks 58 Commits 18 Opened issues

Description

fully automated pentesting tool

Services available

!
?

Need anything else?

Contributors list

Xerror

Xerror is an automated penetration tool , which will help security professionals and non professionals to automate their pentesting tasks. Xerror will perform all tests and, at the end generate two reports for executives and analysts.

Xerror provides GUI easy to use menu driven options.Iinternally it supports openVas for vulnerability scanning, Metasploit for exploitation and gives GUI based options after successful exploitation e.g Meterpreter sessoins. Building in python as major.

Xerror build on python2 as a primary language and Django2 as web framework along with, websockets(django channel) on celery server and Redis srver to achieve asynchronization. On front side it supports Djanog default template enging language which is jinga2 and jquery.

How to use this porject: 1.Activate virtual enviroment by using following command( make sure you have pre-installed py virtual env) souce env/bin/activate 2. Start redis server service redis-server start 3. start python srver 1. cd xerror 2. python manage.py runserver 4. start celery server( run this in new terminal) 1. cd xerror 2. celery -A xerror worker -l info 5. start msfrpc server for metasploit msfrpcd -P 123 -S -a 127.0.0.1 6. start openvas server and set OMP server credientials to [email protected] 127.0.0.1 9392

You are goog to go

This is xerror Beta version, soon complete version will be uploaded with complete explanation and detail of each step ...

alt text

alt text

alt text

alt text

alt text

alt text

alt text

alt text

alt text

alt text

alt text

Contact : [email protected]

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.