https://github.com/kdandy/RedOps
DevTools is a network and security testing tool. Key features: subdomain discovery, port scanning, and vulnerability testing. New features: Reverse DNS Lookup, DNS Zone Transfer Testing, Open Redirect Testing, Command Injection Testing, and CVE Exploit Checker.
https://github.com/kdandy/RedOps
csrf ddos domain find injection pentesting sql ssl vunerability xss
Last synced: 9 months ago
JSON representation
DevTools is a network and security testing tool. Key features: subdomain discovery, port scanning, and vulnerability testing. New features: Reverse DNS Lookup, DNS Zone Transfer Testing, Open Redirect Testing, Command Injection Testing, and CVE Exploit Checker.
- Host: GitHub
- URL: https://github.com/kdandy/RedOps
- Owner: kdandy
- License: mit
- Created: 2024-11-03T16:14:12.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-11-10T19:39:27.000Z (over 1 year ago)
- Last Synced: 2024-11-10T20:27:53.581Z (over 1 year ago)
- Topics: csrf, ddos, domain, find, injection, pentesting, sql, ssl, vunerability, xss
- Language: Python
- Homepage:
- Size: 38.1 KB
- Stars: 1
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# RedOps Code Documentation
RedOps is a multifunctional tool designed for basic security testing on web applications and servers. The tool allows users to execute various testing functions for reconnaissance and vulnerability assessment, including:
1. **Subdomain Discovery**: Searches for subdomains associated with a given domain using the `crt.sh` database.
2. **GET Request Flooding**: Sends multiple repeated GET requests to a specified URL for testing request handling and rate-limiting detection.
3. **Comprehensive Port Scanning**: Scans all ports (1-65535) on a target server to identify open ports.
4. **Directory and Sensitive File Bruteforcing**: Attempts to access common directories and sensitive files on the target URL.
5. **SQL Injection Testing**: Checks for SQL Injection vulnerabilities by injecting various SQL payloads into the URL parameters.
6. **Cross-Site Scripting (XSS) Testing**: Tests for XSS vulnerabilities by injecting potential malicious scripts into URL parameters.
7. **HTTP Header and SSL/TLS Inspection**: Inspects HTTP headers and SSL/TLS certificates for security insights.
8. **CSRF Testing**: Attempts to detect CSRF vulnerabilities by simulating form submissions with common CSRF payloads.
9. **Reverse DNS Lookup**: Performs reverse DNS lookup on a specified IP address to retrieve associated hostnames.
10. **DNS Zone Transfer Testing**: Attempts to perform a DNS zone transfer on a target domain to discover hidden subdomains and DNS records.
11. **Open Redirect Testing**: Tests for open redirect vulnerabilities by appending various payloads to URL parameters.
12. **Command Injection Testing**: Injects command injection payloads into URL parameters to check for command execution vulnerabilities.
13. **CVE Exploit Checker**: Checks the target server for known vulnerabilities (e.g., Log4Shell, Spring4Shell) based on a predefined list of CVEs.
## Features
### **Subdomain Discovery**
Retrieves subdomains for a specified domain using the `crt.sh` database, which aggregates publicly available SSL/TLS certificates. This feature helps uncover additional assets and services linked to the target domain that may otherwise remain hidden. Subdomain discovery is a crucial step in expanding the attack surface during reconnaissance.
### **Spam GET Requests**
Sends configurable batches of GET requests to a specified URL, helping to test server performance under load and identify rate-limiting mechanisms. This feature can:
- Detect potential DoS vulnerabilities.
- Reveal if the server implements throttling to mitigate abuse.
- Simulate high-traffic scenarios to evaluate server resilience.
### **Full Port Scanning**
Performs a comprehensive scan of all 65,535 ports on the target server to identify open ports. Open ports can indicate running services such as:
- **SSH** (22)
- **FTP** (21)
- **HTTP/HTTPS** (80/443)
- **Database Services** (MySQL, PostgreSQL, etc.)
This feature helps in identifying misconfigured services or unauthorized services running on the server.
### **Directory and Sensitive File Bruteforcing**
Attempts to access commonly known directories and sensitive files by brute-forcing predictable paths. Examples include:
- **Directories**: `/admin`, `/config`, `/backup`
- **Files**: `.env`, `wp-config.php`, `database.sql`
These paths can reveal critical information like environment variables, database credentials, or even backup files that should not be publicly accessible.
### **SQL Injection Testing**
Injects various SQL payloads into URL parameters to check for SQL Injection vulnerabilities. SQL Injection allows attackers to manipulate database queries, potentially leading to:
- Unauthorized data access.
- Database schema disclosure.
- Data modification or deletion.
The tool tests for both error-based and time-based SQL Injection techniques.
### **XSS Testing**
Tests for Cross-Site Scripting (XSS) vulnerabilities by injecting malicious JavaScript payloads into URL parameters. If a web application fails to properly sanitize user input, this can lead to:
- **Session hijacking**.
- **Phishing attacks**.
- **Defacement or malware distribution**.
The tool covers a range of XSS vectors, including stored, reflected, and DOM-based XSS.
### **HTTP Header and SSL/TLS Inspection**
Analyzes HTTP headers and SSL/TLS certificates to evaluate server security configurations. This feature helps in:
- Detecting insecure HTTP headers such as `X-Frame-Options`, `Content-Security-Policy`, and `Strict-Transport-Security`.
- Verifying SSL/TLS certificate validity, issuer, and expiration.
- Identifying potential misconfigurations that could lead to man-in-the-middle (MITM) attacks or downgrade vulnerabilities.
### **CSRF Testing**
Simulates form submissions with common Cross-Site Request Forgery (CSRF) payloads to test for vulnerabilities. CSRF attacks trick authenticated users into executing unwanted actions, such as:
- Changing account settings.
- Transferring funds.
- Deleting data.
This feature helps identify web applications that lack anti-CSRF protections, such as CSRF tokens.
### **Reverse DNS Lookup**
Performs a reverse DNS lookup on a specified IP address to find associated hostnames. This feature helps:
- Identify multiple services hosted on the same IP.
- Expand the attack surface by discovering additional domains pointing to the same server.
### **DNS Zone Transfer Testing**
Attempts to perform a DNS zone transfer, which can reveal detailed DNS records if misconfigured. This includes:
- **Subdomains**.
- **Mail servers**.
- **TXT records** (e.g., SPF, DKIM configurations).
Zone transfer is typically restricted to authorized hosts, but if left open, it can expose valuable information for further exploitation.
### **Open Redirect Testing**
Checks for open redirect vulnerabilities by appending payloads to URL parameters. Open redirect vulnerabilities can be exploited to:
- Redirect users to malicious websites.
- Facilitate phishing attacks.
- Bypass URL filters.
The tool tests various endpoints and parameters to identify unvalidated redirects.
### **Command Injection Testing**
Injects command injection payloads into URL parameters to test for arbitrary command execution. If a web application improperly handles user input in system commands, it can lead to:
- Unauthorized command execution.
- File system manipulation.
- Server compromise.
This feature tests common payloads to identify such vulnerabilities in web applications or APIs.
### **CVE Exploit Checker**
Checks the target server for known vulnerabilities based on a list of Common Vulnerabilities and Exposures (CVE). This feature allows you to quickly assess whether the server is vulnerable to widely known exploits, such as:
- **Log4Shell (CVE-2021-44228)**: A critical vulnerability in the Log4j library.
- **Spring4Shell (CVE-2022-22965)**: A vulnerability in the Spring framework.
- **BlueKeep (CVE-2019-0708)**: A critical vulnerability in Microsoft Remote Desktop Services.
Regularly updating the CVE list ensures the tool covers the latest threats.
## Requirements
This tool requires Python 3.7 or higher and the `aiohttp` library. Make sure Python and required packages are installed on your system.
### Installation
1. **Clone the repository**:
```bash
git clone https://github.com/kdandy/redops.git
cd RedOps
2. **Install dependencies**:
```bash
pip install -r requirements.txt
### Installation python3-venv
1. **Install python3-venv (if not installed)**:
```bash
sudo apt install python3-venv
python3 -m venv myenv
source myenv/bin/activate
pip install -r requirements.txt
2. **Once done, you can deactivate the environment by**:
```bash
deactivate
## Usage
1. **Run the program**:
```bash
python3 redops.py
## LICENSE
This tool was developed by [kdandy](https://github.com/kdandy/devtools/blob/main/LICENSE) and is available on GitHub. Please use it responsibly and only for purposes that comply with service policies.