This tool aims to determine all attack surfaces of the given target in URL format
1 - Clone the repository.
2 - Build the Docker image.
sudo docker build -t kali .3 - Run the container.
sudo docker run -i -t --name assetenumeration -p 5000:5000 -v $(pwd):/root:rw kali4 - Install the requirements
pip3 install -r requirements.txt
5 - Run flask
python3 flask_app.py6 - Open your browser and go to http://127.0.0.1:5000
Get help
python3 main.py -hRun on Terminal
python3 main.py -u $TARGET_URLIf you want to use Shodan API, you shoould enter your API key in config.py file as string format.
GET /shodan/host/search
| Parameter | Type | Description |
|---|---|---|
api_key |
string |
Optional. Your Shodan API key |
- Web Interface
- Terminal Execution
- Command Line Arguement
Here are some tools requiered for project. If the tools below do not work from each directory, execute the command below.
cp $tool /usr/bin/
- Timestamp is the exact time of beginning of the scan process.
- During port scanning, each IP address is scanned once. Therefore, changes during the scan may not affact the result.
If you have any feedback, please reach out to us.
