https://github.com/SpoofIMEI/awacs-scanner
Another vulnerability scanner
https://github.com/SpoofIMEI/awacs-scanner
automated-scanner hacking hacking-tool pentesting vulnerability-assessment vulnerability-scanners
Last synced: about 1 month ago
JSON representation
Another vulnerability scanner
- Host: GitHub
- URL: https://github.com/SpoofIMEI/awacs-scanner
- Owner: SpoofIMEI
- License: apache-2.0
- Created: 2022-06-23T10:53:09.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2025-03-08T15:45:00.000Z (about 2 months ago)
- Last Synced: 2025-03-20T11:39:45.395Z (about 2 months ago)
- Topics: automated-scanner, hacking, hacking-tool, pentesting, vulnerability-assessment, vulnerability-scanners
- Language: Python
- Homepage:
- Size: 3.71 MB
- Stars: 18
- Watchers: 2
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: license
Awesome Lists containing this project
- awesome-hacking-lists - SpoofIMEI/awacs-scanner - Another vulnerability scanner (Python)
README
# awacs-scanner V2.3.9
## What's awacs-scanner?
awacs-scanner is a fully automated scanner that uses a combination of genocide_engine, nmap, vulners, osint to get as much as possible info and vulnerabilities about a system/systems. This removes the hassle of googling the version number of a service and trying to find exploits that may or may not even work. Because awacs-scanner supports getting targets from a file you can easily for example save all the target company subdomains to a file and let awacs-scanner handle the rest.## What's awacs? (Airborne Warning & Control System)
"The Boeing AWACS is positioned to provide mission-critical surveillance support as well as assisting military and civilian authorities in coordinating humanitarian relief." -boeing.com
BTW. awacs-scanner has nothing to do with the actual plane, it is just named that because the plane is used for survaillence, so is awacs-scanner.
## Features
* Vulners API to search for exploits
* SearchSploit to search for exploits
* S3 Bucket discovery## Installation
1.
```
git clone https://github.com/SpoofIMEI/awacs-scanner
cd awacs-scanner
pip3 install -r requirements.txt
sudo python3 awacs.py
```
2. If you have Vulners API keys, go to /root/.awacs and put your vulners api key into the configuration.conf file in this format: `vulners_api=THE_KEY`## Usage
```
-h, --help show this help message and exit
-t TARGET, --target TARGET
Targets/target to scan in one of these formats: divided by "," or file of targets.
-f FLAGS, --flags FLAGS
Nmap flags ("-sV -A")
--st ST, --scan-type ST
stealth_flight, vuln_scan, battering_ram (Read more about scans from github)
-c CONFIGURATION, --configuration CONFIGURATION
Configuration file for awacs scanner (Syntax in github).
--company COMPANY Name of the company being scanned. This will be used for s3 bucket scanning ("NULL" if it's not a company)```
## Example usage
```
awacs -t target.txt --st stealth_flight
awacs -t example.com -f "-p 21"
awacs -t example1.example.com,example2.example.com --st battering_ram -c config.conf
awacs -t randomcompany.corp --st battering_ram --company randomcompany
```Showing an example of awacs-scanner’s potential by scanning a russian ftp server.
## Scan modes explained
* stealth_flight
* Syn nmap scan
* Sesitive file discovery by osint
* S3 Bucket discovery
* vuln_scan (default if none provided)
* Nmap scan with version detection
* Use searchsploit to search for exploits
* Use vulners api to search for exploits
* battering_ram
* Full aggressive nmap
* Full genocide_engine treatment
* Same as vuln_scan without the nmap one
* S3 Bucket discoveryDonate Monero: 48ZrWwcf1gpG9VCe7agYru36SJhKwDDyGCgGw4TvkAG92Exd9pN7GBvL23SkwrMMbgdFa7BnFX2k6cD49SzV7pv42B4JDQE