Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ethicalhackingplayground/erebus
Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.
https://github.com/ethicalhackingplayground/erebus
erebus-engine parameter-testing vulnerability-assessment vulnerability-detection vulnerability-scanner
Last synced: about 2 months ago
JSON representation
Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei.
- Host: GitHub
- URL: https://github.com/ethicalhackingplayground/erebus
- Owner: ethicalhackingplayground
- License: gpl-3.0
- Created: 2021-02-26T12:48:03.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2021-07-11T11:20:28.000Z (over 3 years ago)
- Last Synced: 2024-11-08T20:41:36.404Z (2 months ago)
- Topics: erebus-engine, parameter-testing, vulnerability-assessment, vulnerability-detection, vulnerability-scanner
- Language: Go
- Homepage:
- Size: 3.02 MB
- Stars: 130
- Watchers: 7
- Forks: 27
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - ethicalhackingplayground/erebus - Erebus is a fast tool for parameter-based vulnerability scanning using a Yaml based template engine like nuclei. (Go)
README
Fast and customisable parameter based vulnerability scanner based on simple YAML Rules
How •
Install •
Templates •
Interceptor •
Usage •
Join Discord---
Erebus is used to test every parameter across targets based on Yaml templates leading to zero false positives and providing fast scanning on large number of hosts. Erebus offers many useful features including an intercepting proxy which allows researchers to browse the web, click on links and erebus will test every parameter that passes through the proxy.
We have a [dedicated repository](https://github.com/ethicalhackingplayground/erebus-templates) that houses various types of vulnerability templates.
## How templates work
# Install Erebus
```sh
▶ GO111MODULE=off go get -u -v github.com/ethicalhackingplayground/erebus/erebus
```# Install Templates
```sh
▶ erebus -ut
```
### Erebus Templates
Erebus has had built-in support for automatic update/download templates (https://github.com/ethicalhackingplayground/erebus/releases/latest). [**Erebus-Templates**](https://github.com/ethicalhackingplayground/erebus-templates) project provides a community-contributed list of ready-to-use templates that can be used with part of your testing.
You may use the `-ut` flag to update the nuclei templates at any time.
### Setup Erebus Interceptor
Make sure to setup a proxy in your browser before you use the **erebus interceptor** for firefox go to
▶ Settings ▶ General ▶ Network Settings ▶ Manual proxy configuration
type in **127.0.0.1** in HTTP Proxy then for the port type in **8080** make sure to enable **Also use this proxy for FTP and HTTPS**
### Install the SSL Certificates to use HTTPS
I have provided the certificates for you to use for **HTTPS** testing, all you need to do is install these by:
▶ Settings ▶ Privacy & Security ▶ Certificates ▶ View Certificates ▶ Import ▶
Select the **.crt** file in the erebus directory and proceed by trusting and installing.
### Usage
```sh
erebus -h
```This will display help for the tool. Here are all the switches it supports.
👉 erebus help menu 👈
```
Usage of erebus:
-burp-sitemap string
scan burp xml sitemap (without base64 decoded)
-c int
the number of concurrent requsts (default 100)
-crawl
crawl through each intercepted request
-depth int
the crawl depth (default 5)
-interceptor
intercept the requests through the proxy and test each parameter
-o string
output results to a file
-p string
the port on which the interception proxy will listen on (default "8080")
-scope string
the scope for the proxy intercetor
-secure
determaines if the connection is secure or not
-silent
silent (only show vulnerable urls)
-t string
use the templates with all our yaml rules instead
-tc string
Use other tools by executing an os command (default "qsreplace")
-ut
Install or update the erebus-templates
```# Usage
Here are a few examples on how to use the erebus scanner for part of your testing.
### Intercept and Crawl on HTTP
Scanning for XSS vulnerabilities using the intercepting proxy with all of paypal inscope while crawling on HTTP domains.
```sh
▶ erebus -t erebus-templates/xss-reflected.yaml -interceptor -crawl -scope ".*.\.paypal.com"
```### Intercept and Crawl on HTTPS
Scanning for XSS vulnerabilities using the intercepting proxy with all of paypal inscope while crawling on HTTPS domains.
```sh
▶ erebus -t erebus-templates/xss-reflected.yaml -interceptor -crawl -secure -scope ".*.\.paypal.com"
```### Tool Chaining Usage
Scanning for XSS vulnerabilities across range of subdomains using subfinder and Gau
```sh
▶ echo "paypal.com" | gau | erebus -t erebus-templates/xss-reflected.yaml
```Scan subdomains from a file in the format **https://** or **http://**
```sh
▶ cat alive | gau | erebus -t erebus-templates/xss-reflected.yaml
```[![asciicast](https://asciinema.org/a/424487.svg)](https://asciinema.org/a/424487)
### License
Erebus is distributed under [GPL-3.0 License](https://github.com/ethicalhackingplayground/erebus/blob/main/LICENSE)