Intelspy Perform automated network authentication scans to collect network information.
IntelSpy is a multi-threaded information retrieval tool that performs automated network service scanning. Performs scanning for active servers, port scanning, service scanning, web content scans, brute-force, detailed offline exploration searches and more.
The program will also start further scans for each service detected using a large number of different tools.
Character
- It scans many targets in the form of IP addresses, IP bandwidth (CIDR note) and solvable host names.
- It scans the targets at the same time.
- Detects servers in IP range network (CIDR).
- Customizable port scan profiles and service enumeration commands.
- Creates a directory structure for collecting results.
- Records commands executed.
- Creates Shel with commands that will be executed manually.
- Exports important information in txt and markdown format.
- Stores data in an SQLite database.
- Creates an HTML report.
Requirements
- Python 3
- colorama
- toml (https://github.com/toml-lang/toml)
- seclists
- curl
- enum4linux
- gobuster
- nbtscan
- no one
- Nmap
- onesixtyone
- oscanner
- smbclient
- smbmap
- smtp-user-enum
- Snmpwalk
- sslscan
- svwar
- tnscmd10g
- whatweb
- wkhtmltoimage
- pandoc
- Hydra
- jellyfish
- wpscan
- ldapsearch
- patter
pip3 install -r requirements.txt |
|
sudo apt install seclists |
Use
___ __ |
|
| ._ _|_ _ | (_ ._ |
|
_|_ | | |_ (/_ | __) |_) \/ |
|
| / |
|
|
|
IntelSpy v1.0 - Perform automated network reconnaissance scans to gather network intelligence. |
|
IntelSpy is an open source tool licensed under GPLv3. |
|
Written by: @maldevel | @LOGISEK_LTD |
|
https://logisek.com | https://pentest-labs.com |
|
https://github.com/maldevel/intelspy |
|
|
|
|
|
usage: intelspy.py [-h] [-ts TARGET_FILE] -p PROJECT_NAME -w WORKING_DIR |
|
[--exclude &host1[, host2][, host3],...>] [-s SPEED] |
|
[-ct < number>] [-cs < number>] [--profile PROFILE_NAME] |
|
[--livehost-profile LIVEHOST_PROFILE_NAME] |
|
[--heartbeat HEARTBEAT] [-v] |
|
[targets [targets ...]] |
|
|
|
positional arguments: |
|
targets IP addresses (e.g. 10.0.0.1), CIDR notation (e.g. |
|
10.0.0.1/24), or resolvable hostnames (e.g. |
|
example.com) to scan. |
|
|
|
optional arguments: |
|
-h, --help show this help message and exit |
|
-ts TARGET_FILE, --targets TARGET_FILE |
|
Read targets from file. |
|
-p PROJECT_NAME, --project-name PROJECT_NAME |
|
project name |
|
-w WORKING_DIR, --working-dir WORKING_DIR |
|
working directory |
|
--exclude &host1[, host2][, host3],...> |
|
exclude hosts/networks |
|
-s SPEED, --speed SPEED |
|
0-5, set timing template (higher is faster) (default: |
|
4) |
|
-ct < number> ;, --competitor-targets < number> |
|
The maximum number of target hosts to scan |
|
concurrently. Default: 5 |
|
-cs < number> ;, --competitor-scans < number> |
|
The maximum number of scans to perform per target |
|
host. Default: 10 |
|
--profile PROFILE_NAME |
|
The port scanning profile to use (defined in port- |
|
scan-profiles.TomL). Default: default |
|
--livehost-profile LIVEHOST_PROFILE_NAME |
|
The live host scanning profile to use (defined in |
|
live-host-scan-profiles.TomL). Default: default |
|
--heartbeat HEARTBEAT |
|
Specifies the heartbeat interval (in seconds) for task |
|
status messages. Default: 60 |
|
-v, --verbose Enable verbose output. Repeat for more verbosity (-v, |
|
-vv, -vvv). |
Examples of use
Scan a single target
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 |
|
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -v |
|
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -vv |
|
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -vvv |
Scanning a computer
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ example.com |
Scanning network bandwidth (CIDR)
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.0/24 |
Multi-objective scanning (comma separated)
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 192.168.10.0/24 example.com |
Scan targets from a file
sudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ -ts /home/user/targets.txt |
Application snapshots
You can download the program from here.
Read them Technology News from all over the world, with the validity of iGuRu.gr
Follow us on Google News
Comment Policy:
IGuRu.gr does not publish the comments immediately. Malicious comments, comments that include ads, or comments that are offensive are deleted without notice. We do not adopt the opinions expressed by our readers.
Your comments will be displayed after approval by the administrators