Need help with rapidscan?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

skavngr
802 Stars 240 Forks GNU General Public License v2.0 172 Commits 3 Opened issues

Description

:new: The Multi-Tool Web Vulnerability Scanner.

Services available

!
?

Need anything else?

Contributors list

# 22,117
Python
penetra...
kali-sc...
kali-li...
150 commits
# 163,769
Go
penetra...
offensi...
kali-sc...
3 commits
# 165,053
Python
penetra...
kali-sc...
kali-li...
1 commit
# 260,433
Python
penetra...
kali-sc...
kali-li...
1 commit
# 157,224
noise-r...
vulkan
C++
penetra...
1 commit

GitHub issues GitHub issues GitHub forks GitHub stars GitHub license

:redsquare: RapidScan - _The Multi-Tool Web Vulnerability Scanner

Evolution:

It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning tools one after the other) sans automation. Unless you are a pro at automating stuff, it is a herculean task to perform binge-scan for each and every engagement. The ultimate goal of this program is to solve this problem through automation; viz. running multiple scanning tools to discover vulnerabilities, effectively judge false-positives, collectively correlate results and saves precious time; all these under one roof.

Enter RapidScan.

Features

  • one-step installation.
  • executes a multitude of security scanning tools, does other custom coded checks and prints the results spontaneously.
  • some of the tools include
    nmap, dnsrecon, wafw00f, uniscan, sslyze, fierce, lbd, theharvester, dnswalk, golismero
    etc executes under one entity.
  • saves a lot of time, indeed a lot time!.
  • checks for same vulnerabilities with multiple tools to help you zero-in on false positives effectively.
  • legends to help you understand which tests may take longer time, so you can
    Ctrl+C
    to skip if needed.
  • association with OWASP Top 10 2017 on the list of vulnerabilities discovered. (under development)
  • critical, high, medium, low and informational classification of vulnerabilities.
  • vulnerability definitions guides you what the vulnerability actually is and the threat it can pose. (~under development~)
  • remediations tells you how to plug/fix the found vulnerability. (~under development~)
  • executive summary gives you an overall context of the scan performed with critical, high, low and informational issues discovered. (under development)
  • artificial intelligence to deploy tools automatically depending upon the issues found. for eg; automates the launch of
    wpscan
    and
    plecost
    tools when a wordpress installation is found. (under development)
  • detailed comprehensive report in a portable document format (*.pdf) with complete details of the scans and tools used. (under development)

FYI:

  • program is still under development, works and currently supports 81 vulnerability tests.
  • parallel processing is not yet implemented, may be coded as more tests gets introduced.

Vulnerability Checks

  • :heavycheckmark: DNS/HTTP Load Balancers & Web Application Firewalls.
  • :heavycheckmark: Checks for Joomla, WordPress and Drupal
  • :heavycheckmark: SSL related Vulnerabilities (HEARTBLEED, FREAK, POODLE, CCS Injection, LOGJAM, OCSP Stapling).
  • :heavycheckmark: Commonly Opened Ports.
  • :heavycheckmark: DNS Zone Transfers using multiple tools (Fierce, DNSWalk, DNSRecon, DNSEnum).
  • :heavycheckmark: Sub-Domains Brute Forcing (DNSMap, amass, nikto)
  • :heavycheckmark: Open Directory/File Brute Forcing.
  • :heavycheckmark: Shallow XSS, SQLi and BSQLi Banners.
  • :heavycheckmark: Slow-Loris DoS Attack, LFI (Local File Inclusion), RFI (Remote File Inclusion) & RCE (Remote Code Execution).
  • & more coming up...

Requirements

  • Python 2.7
  • Kali OS (Preferred, as it is shipped with almost all the tools)
  • Tested with Parrot & Ubuntu Operating Systems.

Usage (One Liner to Initiate the Scan - For Non-Forkers & Non-Cloners)

Download the script, allow executable permissions & start the scan immediately -

wget -O rapidscan.py https://raw.githubusercontent.com/skavngr/rapidscan/master/rapidscan.py && chmod +x rapidscan.py && ./rapidscan.py example.com

With Docker

To run a scan for

example.com
the command below has to be run. After completion reports can be found in the current path under
reports
.
docker run -t --rm -v $(pwd)/reports:/reports kanolato/rapidscan example.com

Help

rapidscan help

Output

rapidscan intro rapidscan outro

Contribution

  • https://gist.github.com/MarcDiethelm/7303312

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.