Kenzer Save Abandoned

automated web assets enumeration & scanning [DEPRECATED]

Project README

KENZER - Automated web assets enumeration & scanning

[DEPRECATED]

ScanFactory LinkedIn ScanFactory Twitter ScanFactory Telegram Recon Bot

Mentions

A Conceptual Introduction to Automating Bug Bounties

Demo

kenzer

Screenshots

kenzer kenzer

Instructions for running

  1. Run git clone https://github.com/ARPSyndicate/kenzer /home/ubuntu/kenzer && cd /home/ubuntu/kenzer (preferred)
  2. Create an account on Zulip
  3. Navigate to Settings > Your Bots > Add a new bot
  4. Create a new generic bot named kenzer
  5. Add all the configurations in configs/kenzer.conf
  6. Install/Run using -
    • ./install.sh -b [if you need kenzer-compatible binaries to be installed] (preferred)
    • ./install.sh [if you do not need kenzer-compatible binaries to be installed]
    • ./run.sh [if you do not need installation at all]
    • ./service.sh [initialize it as a service post-installation] (preferred)
    • bash swap.sh [in case you are facing memory issues]
  7. Interact with kenzer using Zulip client, by adding bot to a stream or via DM.
  8. Test @**kenzer** man as Zulip input to display available commands.
  9. All the commands can be used by mentioning the chatbot using the prefix @**kenzer** (name of your chatbot).
  • Subdomain Enumeration using Subfinder, Amass, CerteX, TLSX, DNSX, NXScan, & ShuffleDNS
  • Port Enumeration using NXScan (Shodan, Netlas, Naabu & Nmap)
  • Web Enumeration using HttpX, Favinizer, Domlock, Gau, GoSpider, URLhunter & Waymore
  • Web Vulnerability Scanning using Freaker, Jaeles, Wapiti, ZAP, Nuclei, Rescro & DalFox
  • Backup Files Scanning using Fuzzuli
  • Git Repository Enumeration & Scanning using RepoHunt & Trufflehog
  • Web Screenshot Identification using Shottie & Perceptic
  • WAF Detection & Avoidance using WafW00f & Nuclei
  • Reputation Scoring using DomREP (GreyNoise, URLHaus, PhishTank)
  • Every task can be distributed over multiple machines
  • Every task can be executed through a single HTTP/SOCKS Proxy

Built-in Modules

  • blacklist <target>,<regex> - initializes & removes blacklisted targets
  • whitelist <target>,<regex> - initializes & keeps only whitelisted targets
  • program <target>,[<name>][<meta>][<link>] - initializes the program to which target belongs
  • subenum[-<mode>[active/passive (default=all)]] <target> - enumerates subdomains
  • repenum <target> - enumerates reputation of subdomains
  • repoenum <target> - enumerates github repositories
  • portenum[-<mode>[100/1000/full/fast (default=1000)]] <target> - enumerates open ports
  • servenum <target> - enumerates services
  • webenum <target> - enumerates webservers
  • headenum <target> - enumerates additional info from webservers
  • urlheadenum <target> - enumerates additional info from urls
  • asnenum <target> - enumerates asn records
  • dnsenum <target> - enumerates dns records
  • conenum <target> - enumerates hidden files & directories
  • urlenum[-<mode>[active/passive (default=all)]] <target> - enumerates urls
  • socenum <target> - enumerates social media accounts
  • keysenum <target> - enumerates sensitive api keys
  • wafscan <target> - scans for firewalls
  • subscan[-<mode>[web/dns (default=all)]] <target> - hunts for subdomain takeovers
  • urlscan[-<mode>[cmdi/crlf/redirect/sqli/ssrf/ssti/xss (default=all)]] <target> - hunts for vulnerabilities in URL parameters
  • reposcan <target> - scans github repositories for api key leaks
  • bakscan <target> - scans for backup files
  • cscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - scan with customized templates
  • cvescan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - hunts for CVEs
  • vulnscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - hunts for other common vulnerabilities
  • idscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target> - identifies applications running on webservers
  • portscan <target> - scans open ports (nmap)(slow)
  • shodscan <target> - scans open ports (shodan)(fast)
  • xssscan <target> - scans for xss vulnerabilities
  • appscan <target> - scans for webapp vulnerabilities
  • buckscan <target> - hunts for unreferenced aws s3 buckets
  • favscan <target> - fingerprints webservers using favicon
  • vizscan[-<mode>[web/repo (default=web)]] <target> - screenshots websites & repositories
  • enum <target> - runs all enumerator modules
  • scan <target> - runs all scanner modules
  • recon <target> - runs all modules
  • hunt <target> - runs your custom workflow
  • disseminate <command> <target> - splits & distributes input over multiple bots
  • upload - switches upload functionality
  • waf - switches waf avoid functionality"
  • proxy - switches proxy functionality"
  • upgrade - upgrades kenzer to latest version
  • monitor <target> - monitors ct logs for new subdomains
  • monitor normalize - normalizes the enumerations from ct logs
  • monitor db - monitors ct logs for domains in summary/domain.txt
  • monitor autohunt <frequency(default=5)> - starts automated hunt while monitoring
  • sync - synchronizes the local kenzerdb with github
  • freaker <module> [<target>] - runs freaker module
  • kenzer <module> - runs a specific module
  • kenzer man - shows this manual

The Beginner's Workflow

workflow

Although few more modules are available & much more is going to be released in the course of time which can advance this workflow, yet this one is enough to get started with & listed below are few of its successful hunts.

COMPATIBILITY TESTED ON UBUNTU 20.04.5 (x86_64) ONLY
RIGGED WITH LOGIC ISSUES
FEEL FREE TO SUBMIT PULL REQUESTS
THIS IS A VERY SOPHISTICATED AUTOMATION FRAMEWORK
MEANT TO BE DEPLOYED ON AWS UBUNTU 20.04 AMD64 SERVER
ABILITY TO UNDERSTAND PYTHON & BASH IS A PREREQUISITE
WE DO NOT PROVIDE ANY SUPPORT WITH INSTALLATION
ISSUES RELATED TO INSTALLATION WILL BE CLOSED WITHOUT ANY RESOLUTION

Open Source Agenda is not affiliated with "Kenzer" Project. README Source: ARPSyndicate/kenzer

Open Source Agenda Badge

Open Source Agenda Rating