{"id":13468900,"url":"https://github.com/utkusen/leviathan","last_synced_at":"2025-03-26T05:31:24.355Z","repository":{"id":90155976,"uuid":"89508705","full_name":"utkusen/leviathan","owner":"utkusen","description":"wide range mass audit toolkit","archived":true,"fork":false,"pushed_at":"2018-10-03T15:40:48.000Z","size":1370,"stargazers_count":989,"open_issues_count":2,"forks_count":236,"subscribers_count":80,"default_branch":"master","last_synced_at":"2024-12-24T22:02:41.257Z","etag":null,"topics":["brute-force","exploitation","port-scanning","python","service-discovery","sql-injection"],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/utkusen.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2017-04-26T17:28:59.000Z","updated_at":"2024-12-09T02:14:13.000Z","dependencies_parsed_at":null,"dependency_job_id":"ebcc0b64-014f-472f-a988-8e77126e971f","html_url":"https://github.com/utkusen/leviathan","commit_stats":null,"previous_names":["tearsecurity/leviathan"],"tags_count":5,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/utkusen%2Fleviathan","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/utkusen%2Fleviathan/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/utkusen%2Fleviathan/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/utkusen%2Fleviathan/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/utkusen","download_url":"https://codeload.github.com/utkusen/leviathan/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245597334,"owners_count":20641865,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["brute-force","exploitation","port-scanning","python","service-discovery","sql-injection"],"created_at":"2024-07-31T15:01:21.538Z","updated_at":"2025-03-26T05:31:23.306Z","avatar_url":"https://github.com/utkusen.png","language":"Python","readme":"\u003cp align=\"center\"\u003e\n\u003cimg src=\"levlogo.png\" width=\"50%\"\u003e\u003c/img\u003e\n\u003c/p\u003e\n\u003cp align=\"center\"\u003e\n\u003ca href=\"https://www.blackhat.com/us-17/arsenal.html#leviathan-framework\"\u003e\u003cimg src=\"https://img.shields.io/badge/Blackhat%20USA%2017-Arsenal-blue.svg\"\u003e\u003c/a\u003e \u003ca href=\"https://www.defcon.org/html/defcon-25/dc-25-demolabs.html\"\u003e\u003cimg src=\"https://img.shields.io/badge/DEF%20CON%2025-Demo%20Labs-red.svg\"\u003e \u003ca href=\"http://www.toolswatch.org/2018/01/black-hat-arsenal-top-10-security-tools/\"\u003e\u003cimg src=\"https://tearsecurity.com/assets/images/toolswatch.svg\"\u003e\u003c/a\u003e\n\u003c/p\u003e\n\nLeviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open source tools such masscan, ncrack, dsss and gives you the flexibility of using them with a combination.\n\nThe main goal of this project is auditing as many system as possible in country-wide or in a wide IP range.\n\n## Main Features\n\n**Discovery**: Discover FTP, SSH, Telnet, RDP, MYSQL services running inside a specific country or in an IP range via Shodan, Censys. It's also possible to manually discover running services on a IP range by integrated “masscan” tool. \n\nShort Demo: https://asciinema.org/a/617bsxl1y84bav9f5bcwllx7r\n\n**Brute Force**: You can brute force the discovered services with integrated “ncrack” tool. It has wordlists which includes most popular combinations and default passwords for specific services.\n\nShort Demo: https://asciinema.org/a/43y2j38zu7hbnuahrj233d5r0\n\n**Remote Command Execution**: You can run system commands remotely on compromised devices.\n\nShort Demo: https://asciinema.org/a/0xcrhd12f2lpkbktjldwtab16\n\n**SQL Injection Scanner**: Discover SQL injection vulnerabilities on websites with specific country extension or with your custom Google Dork.\n\nShort Demo: https://asciinema.org/a/2mwfmd9afsuyg5p0vzcq5e6si\n\n**Exploit Specific Vulnerabilities**: Discover vulnerable targets with Shodan, Censys or masscan and mass exploit them by providing your own exploit or using preincluded exploits.\n\nShort Demo: https://asciinema.org/a/9uqsjvnru780h0ue6ok9j9ktb\n\n## Integrated Tools\n\n**Masscan**: It’s a very fast TCP port scanner by Robert David Graham. Leviathan uses masscan for detecting services on a huge IP range. https://github.com/robertdavidgraham/masscan\n\n**Ncrack**: Ncrack is a high-speed network authentication cracking tool. Leviathan uses ncrack to brute force services such as FTP, SSH, RDP, Telnet, MYSQL etc. https://github.com/nmap/ncrack\n\n**DSSS (Damn Small SQLi Scanner)**: DSSS is a fully functional and minimal SQL injection vulnerability scanner by Miroslav Stampar. Leviathan uses DSSS to identify SQL Injection vulnerabilities on specific URLs. https://github.com/stamparm/DSSS\n\n## Installation\nFor detailed installiation, please visit our [wiki](https://github.com/leviathan-framework/leviathan/wiki) page.\n\n### Kali Linux:\n\nDownload leviathan by cloning the Git repository:\n\n`git clone https://github.com/leviathan-framework/leviathan.git`\n\nGo inside the folder\n\n`cd leviathan`\n\nInstall Python libraries:\n\n`pip install -r requirements.txt`\n\nIt's done!\n\n### Debian/Ubuntu:\n\nDownload leviathan by cloning the Git repository:\n\n`git clone https://github.com/leviathan-framework/leviathan.git`\n\nGo inside the folder\n\n`cd leviathan`\n\nRun installiation script. It will setup required tools (ncrack, masscan) and python libraries.\n\n`bash scripts/debian_install.sh`\n\nIt's done!\n\n### macOS:\n\nIf homebrew is not installed on your system, please install it first:\n\n`/usr/bin/ruby -e \"$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)\"`\n\nDownload leviathan by cloning the Git repository:\n\n`git clone https://github.com/leviathan-framework/leviathan.git`\n\nGo inside the folder\n\n`cd leviathan`\n\nRun installiation script. It will setup required tools (ncrack, masscan) and python libraries.\n\n`bash scripts/macos_install.sh`\n\nIt's done!\n\n### Requirements\nPython version 2.7.x is required for running this program.\n\n**Supported platforms**: Linux (Kali Linux, Debian, Ubuntu), macOS\n\n## Usage\nRun the program with following command: \n\n`python leviathan.py`\n\nYou can get basic usage information inside the menus. For detailed usage manual, visit our [wiki](https://github.com/leviathan-framework/leviathan/wiki) page.\n\n## Screenshots\n\n\u003cimg src=\"screenshots/levsc1.png\" width=\"32%\"\u003e\u003c/img\u003e \n\u003cimg src=\"screenshots/levsc2.png\" width=\"32%\"\u003e\u003c/img\u003e \n\u003cimg src=\"screenshots/levsc3.png\" width=\"32%\"\u003e\u003c/img\u003e\n\u003cimg src=\"screenshots/levsc4.png\" width=\"32%\"\u003e\u003c/img\u003e\n\u003cimg src=\"screenshots/levsc5.png\" width=\"32%\"\u003e\u003c/img\u003e\n\u003cimg src=\"screenshots/levsc6.png\" width=\"32%\"\u003e\u003c/img\u003e\n\n## Authors\nThis project is written by Utku Sen and Ozge Barbaros\n\n# Legal Warning\n\nWhile this may be helpful for some, there are significant risks.\nYou could go to jail on obstruction of justice charges just for running leviathan,\neven though you are innocent. Your are on notice, that using this tool outside your\n\"own\" environment is considered malicious and is against the law. Use with caution.\n","funding_links":[],"categories":["Python","Uncategorized","\u003ca id=\"df8a5514775570707cce56bb36ca32c8\"\u003e\u003c/a\u003e审计\u0026\u0026安全审计\u0026\u0026代码审计","Tools","Python (1887)"],"sub_categories":["Uncategorized","\u003ca id=\"34569a6fdce10845eae5fbb029cd8dfa\"\u003e\u003c/a\u003e代码审计"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Futkusen%2Fleviathan","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Futkusen%2Fleviathan","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Futkusen%2Fleviathan/lists"}