Mass scan IPs for vulnerable services
masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more.
*Shodan integration is optional but when linked, Silver can automatically use Shodan to retrieve service and vulnerability data if a host has a lot of ports open to save resources. Shodan credits used per scan by Silver can be throttled. The minimum number of ports to trigger Shodan can be configured as well.
git clone https://github.com/s0md3v/Silver
Required Python libraries can be installed by executing
pip3 install -r requirements.txtin
Slack WebHook, Shodan API key and limits can be configured by editing respective variables in
:warning: Run Silver as root and with
sudo python3 silver.py
:warning: Silver scans all TCP ports by default i.e. ports
--quickswitch to only scan top ~1000 ports.
python3 silver.py 127.0.0.1 python3 silver.py 127.0.0.1/22 python3 silver.py 127.0.0.1,127.0.0.2,127.0.0.3
python3 silver.py 127.0.0.1 --quick
python3 silver.py 127.0.0.1 --rate 10000
python3 silver.py -i /path/to/targets.txt
Note: If your input file contains any hostnames, use the--resolveflag to tell Silver to resolve them to IPs because masscan only scans IPs.
python3 silver.py -i /path/to/targets.txt -t 4
You can contribute to this project by providing suggestions, reporting sensible issues and spreading the word. Pull requessts for the following will not be accepted: - Typos - coDe qUaLiTY - Docker and .gitignore file