{"id":13585507,"url":"https://github.com/maldevel/intelspy","last_synced_at":"2025-04-13T04:10:34.562Z","repository":{"id":68239574,"uuid":"245607755","full_name":"maldevel/intelspy","owner":"maldevel","description":"Perform automated network reconnaissance scans","archived":false,"fork":false,"pushed_at":"2023-05-04T15:05:11.000Z","size":271,"stargazers_count":227,"open_issues_count":3,"forks_count":48,"subscribers_count":9,"default_branch":"master","last_synced_at":"2025-03-24T09:20:01.716Z","etag":null,"topics":["enumeration","gathering","hacking","information","information-gathering","intelligence","intelligence-gathering","port-scanning","ports","reconnaissance","rightclickhack","services"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/maldevel.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2020-03-07T09:56:54.000Z","updated_at":"2025-02-15T05:28:42.000Z","dependencies_parsed_at":"2023-06-14T02:00:34.916Z","dependency_job_id":null,"html_url":"https://github.com/maldevel/intelspy","commit_stats":null,"previous_names":[],"tags_count":3,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/maldevel%2Fintelspy","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/maldevel%2Fintelspy/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/maldevel%2Fintelspy/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/maldevel%2Fintelspy/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/maldevel","download_url":"https://codeload.github.com/maldevel/intelspy/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248661704,"owners_count":21141450,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["enumeration","gathering","hacking","information","information-gathering","intelligence","intelligence-gathering","port-scanning","ports","reconnaissance","rightclickhack","services"],"created_at":"2024-08-01T15:04:59.017Z","updated_at":"2025-04-13T04:10:34.529Z","avatar_url":"https://github.com/maldevel.png","language":"Python","readme":"![Alt text](logo.png?raw=true \"IntelSpy\")\n\nPerform automated network reconnaissance scans to gather network intelligence.\n\nIntelSpy is a multi-threaded network intelligence tool which performs automated network services enumeration. It performs live hosts detection scans, port scans, services enumeration scans, web content scans, brute-forcing, detailed off-line exploits searches and more. \n\nThe tool will also launch further enumeration scans for each detected service using a number of different tools.\n\n---\n\n### Features\n\n* Scans multiple targets in the form of IP addresses, IP ranges (CIDR notation) and resolvable hostnames.\n* Scans targets concurrently.\n* Detects live hosts in an IP range (CIDR) network.\n* Customizable port scanning profiles and service enumeration commands.\n* Creates a directory structure for results gathering and reporting.\n* Logs every command that was executed.\n* Generates shell scripts containing commands to be run manually.\n* Extracts important information in txt and markdown format for further inspection.\n* Stores data to an SQLite database.\n* Generates an HTML report.\n\n---\n\n### Requirements\n\n* Python 3 (``` sudo apt install python3 ```)\n* Linux (preferably Kali Linux or any other hacking distribution containing the tools below.)\n  * https://www.kali.org/downloads/\n* toml (https://github.com/toml-lang/toml)\n* seclists (https://github.com/danielmiessler/SecLists)\n* curl (*prerequisite*) (``` sudo apt install curl ```)\n* enum4linux (*prerequisite*) (``` sudo apt install enum4linux ```)\n* gobuster (*prerequisite*) (``` sudo apt install gobuster ```)\n* hydra (*optional*) (``` sudo apt install hydra ```)\n* ldapsearch (*optional*) (``` sudo apt install ldap-utils ```)\n* medusa (*optional*) (``` sudo apt install medusa ```)\n* nbtscan (*prerequisite*) (``` sudo apt install nbtscan ```)\n* nikto (*prerequisite*) (``` sudo apt install nikto ```)\n* nmap (*prerequisite*) (``` sudo apt install nmap ```)\n* onesixtyone (*prerequisite*) (``` sudo apt install onesixtyone ```)\n* oscanner (*optional*) (``` sudo apt install oscanner ```)\n* pandoc (*prerequisite*) (``` sudo apt install pandoc ```)\n* patator (*optional*) (``` sudo apt install patator ```)\n* showmount (*prerequisite*) (``` sudo apt install nfs-common ```)\n* smbclient (*prerequisite*) (``` sudo apt install smbclient ```)\n* smbmap (*prerequisite*) (``` sudo apt install smbmap ```)\n* smtp-user-enum (*prerequisite*) (``` sudo apt install smtp-user-enum ```)\n* snmpwalk (*prerequisite*) (``` sudo apt install snmp ```)\n* sslscan (*prerequisite*) (``` sudo apt install sslscan ```)\n* svwar (*prerequisite*) (``` sudo apt install sipvicious ```)\n* tnscmd10g (*prerequisite*) (``` sudo apt install tnscmd10g ```)\n* whatweb (*prerequisite*) (``` sudo apt install whatweb ```)\n* wkhtmltoimage (*prerequisite*) (``` sudo apt install wkhtmltopdf ```)\n* wpscan (*optional*) (``` sudo apt install wpscan ```)\n\n\n```\npip3 install -r requirements.txt\n```\n\n---\n\n### Usage\n\n```\n$ python3 intelspy.py -h\n\n ___               __        \n  |  ._ _|_  _  | (_  ._     \n _|_ | | |_ (/_ | __) |_) \\/ \n                      |   /  \n                                \nIntelSpy v2.0 - Perform automated network reconnaissance scans to gather network intelligence.\nIntelSpy is an open source tool licensed under GPLv3.\nWritten by: @maldevel | Logisek ICT\nWeb: https://logisek.com | https://pentest-labs.com\nProject: https://github.com/maldevel/intelspy\n\n\nusage: intelspy.py [-h] [-ts TARGET_FILE] -p PROJECT_NAME -w WORKING_DIR\n                   [--exclude \u003chost1[,host2][,host3],...\u003e] [-s SPEED]\n                   [-ct \u003cnumber\u003e] [-cs \u003cnumber\u003e] [--profile PROFILE_NAME]\n                   [--livehost-profile LIVEHOST_PROFILE_NAME]\n                   [--heartbeat HEARTBEAT] [-v]\n                   [targets [targets ...]]\n\npositional arguments:\n  targets               IP addresses (e.g. 10.0.0.1), CIDR notation (e.g.\n                        10.0.0.1/24), or resolvable hostnames (e.g.\n                        example.com) to scan.\n\noptional arguments:\n  -h, --help            show this help message and exit\n  -ts TARGET_FILE, --targets TARGET_FILE\n                        Read targets from file.\n  -p PROJECT_NAME, --project-name PROJECT_NAME\n                        project name\n  -w WORKING_DIR, --working-dir WORKING_DIR\n                        working directory\n  --exclude \u003chost1[,host2][,host3],...\u003e\n                        exclude hosts/networks\n  -s SPEED, --speed SPEED\n                        0-5, set timing template (higher is faster) (default:\n                        4)\n  -ct \u003cnumber\u003e, --concurrent-targets \u003cnumber\u003e\n                        The maximum number of target hosts to scan\n                        concurrently. Default: 5\n  -cs \u003cnumber\u003e, --concurrent-scans \u003cnumber\u003e\n                        The maximum number of scans to perform per target\n                        host. Default: 10\n  --profile PROFILE_NAME\n                        The port scanning profile to use (defined in port-\n                        scan-profiles.toml). Default: default\n  --livehost-profile LIVEHOST_PROFILE_NAME\n                        The live host scanning profile to use (defined in\n                        live-host-scan-profiles.toml). Default: default\n  --heartbeat HEARTBEAT\n                        Specifies the heartbeat interval (in seconds) for task\n                        status messages. Default: 60\n  -v, --verbose         Enable verbose output. Repeat for more verbosity (-v,\n                        -vv, -vvv).\n```\n\n---\n\n### Usage Examples\n\nScanning single target\n\n```\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -v\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -vv\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 -vvv\n```\n\nScanning a hostname\n\n```\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ example.com\n```\n\nScanning a network range(CIDR)\n\n```\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.0/24\n```\n\nScanning multiple targets (comma separated)\n\n```\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ 192.168.10.15 192.168.10.0/24 example.com\n```\n\nScanning targets from file\n\n```\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ -ts /home/user/targets.txt\n```\n\nExcluding one host\n\n```\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ --exclude 192.168.10.9 192.168.10.0/24\n```\n\nExcluding many hosts\n\n```\nsudo python3 intelspy.py -p MyProjectName -w /home/user/pt/projects/ --exclude 192.168.10.9,192.168.10.24 192.168.10.0/24\n```\n\n---\n\n### Credits\n\nI started working on IntelSpy when I discovered [AutoRecon](https://github.com/Tib3rius/AutoRecon). Instead of reinventing the wheel, IntelSpy is the result of merging IntelSpy with the best features of the AutoRecon to create a network reconnaissance tool suitable for Penetration Testing engagements.\n\n---\n","funding_links":[],"categories":["Python"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmaldevel%2Fintelspy","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fmaldevel%2Fintelspy","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fmaldevel%2Fintelspy/lists"}