Note : You can run it in parallel to cover a vast majority of assets in less time. I suggest to give it a try
git clone https://github.com/Deepanjalkumar/Attacksurfacemanagement.git
cd Attacksurfacemanagement
source notebook/bin/activate
pip3 install -r requirements.txt
./install.sh
Note : If you want to get a customize theme like me then use this :
pip install jupyterthemes
jt -t monokai
jupyter-notebook --allow-root
select the directory offensive-notebook
Inside it there all lots of engine which covers various aspect of hacking. Choose as per your requirement and start hacking.
Now lets look at the other feature of it i.e sharing information on a real time .
uvicorn api:app --reload ( Uvicorn running on http://127.0.0.1:8000 )
/web/subdomain
/web/web-service
/web/internet-archive
/web/crawler
/web/all-files
/web/cve-paths
/web/juicy-paths
/web/leaky-misconfigs
/web/juicy-paths
/network/ipv4
It is flexible as you can create your own endpoints
For visual inspection and monitor mode i have used streamlit to have a visual analysis of whole AttackSurfaceManagement framework.
streamlit run dashboard.py
Local URL: http://localhost:8501
Network URL: http://192.168.43.20:8501
Monitor the AttackSurfaceManagement framework as per your needs.
If you have any feedback, please reach out to us at Linkedin Deepanjal kumar
Programming Language: PYTHON, HTML, CSS JS, GOLANG
IDE: VSCODE
API: Fastapi
Dashboard: Streamlit
Notebook: Jupyter
Database: SQLITE
For support, contact me over linkeding Deepanjal kumar
Contributions are always welcome!
Credits goes to all the contributor whose tool has been integrated into attack surface management !


