AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
How does it work?
AutoPWN Suite uses nmap TCP-SYN scan to enumerate the host and detect the version of softwares running on it. After gathering enough information about the host, AutoPWN Suite automatically generates a list of “keywords” to search NIST vulnerability database.
Visit “PWN Spot!” for more information
Demo
AutoPWN Suite has a very user friendly easy to read output.
Installation
You can install it using pip. (sudo recommended)
sudo pip install autopwn-suite
OR
You can clone the repo.
git clone https://github.com/GamehunterKaan/AutoPWN-Suite.git
OR
You can download debian (deb) package from releases.
sudo apt-get install ./autopwn-suite_1.1.5.deb
Usage
Running with root privileges (sudo) is always recommended.
Automatic mode (This is the intended way of using AutoPWN Suite.)
autopwn-suite -y
Help Menu
<div class="highlight highlight-text-shell-session notranslate position-relative overflow-auto" data-snippet-clipboard-copy-content="$ autopwn-suite -h usage: autopwn.py [-h] [-o OUTPUT] [-t TARGET] [-hf HOSTFILE] [-st {arp,ping}] [-nf NMAPFLAGS] [-s {0,1,2,3,4,5}] [-a API] [-y] [-m {evade,noise,normal}] [-nt TIMEOUT] [-c CONFIG] [-v] AutoPWN Suite options: -h, –help show this help message and exit -o OUTPUT, –output OUTPUT Output file name. (Default : autopwn.log) -t TARGET, –target TARGET Target range to scan. This argument overwrites the hostfile argument. (192.168.0.1 or 192.168.0.0/24) -hf HOSTFILE, –hostfile HOSTFILE File containing a list of hosts to scan. -st {arp,ping}, –scantype {arp,ping} Scan type. -nf NMAPFLAGS, –nmapflags NMAPFLAGS Custom nmap flags to use for portscan. (Has to be specified like : -nf="-O") -s {0,1,2,3,4,5}, –speed {0,1,2,3,4,5} Scan speed. (Default : 3) -a API, –api API Specify API key for vulnerability detection for faster scanning. (Default : None) -y, –yesplease Don’t ask for anything. (Full automatic mode) -m {evade,noise,normal}, –mode {evade,noise,normal} Scan mode. -nt TIMEOUT, –noisetimeout TIMEOUT Noise mode timeout. (Default : None) -c CONFIG, –config CONFIG Specify a config file to use. (Default : None) -v, –version Print version and exit.”>
$ autopwn-suite -h
usage: autopwn.py [-h] [-o OUTPUT] [-t TARGET] [-hf HOSTFILE] [-st {arp,ping}] [-nf NMAPFLAGS] [-s {0,1,2,3,4,5}] [-a API] [-y] [-m {evade,noise,normal}] [-nt TIMEOUT] [-c CONFIG] [-v]AutoPWN Suite
options:
-h, --help show this help message and exit
-o OUTPUT, --output OUTPUT
Output file name. (Default : autopwn.log)
-t TARGET, --target TARGET
Target range to scan. This argument overwrites the hostfile argument. (192.168.0.1 or 192.168.0.0/24)
-hf HOSTFILE, --hostfile HOSTFILE
File containing a list of hosts to scan.
-st {arp,ping}, --scantype {arp,ping}
Scan type.
-nf NMAPFLAGS, --nmapflags NMAPFLAGS
Custom nmap flags to use for portscan. (Has to be specified like : -nf="-O")
-s {0,1,2,3,4, 5}, --speed {0,1,2,3,4,5}
Scan speed. (Default : 3)
-a API, --api API Specify API key for vulnerability detection for faster scanning. (Default : None)
-y, --yesplease Don't ask for anything. (Full automatic mode)
-m {evade,noise,normal}, --mode {evade,noise,normal}
Scan mode.
-nt TIMEOUT, --noisetimeout TIMEOUT
Noise mode timeout. (Default : None)
-c CONFIG, --config CONFIG
Specify a config file to use. (Default : None)
-v, --version Print version and exit.