Browse Source

Update README.md

Umar Farook 8 years ago
parent
commit
754ede8a73
1 changed files with 94 additions and 0 deletions
  1. 94 0
      README.md

+ 94 - 0
README.md

@@ -20,4 +20,98 @@ you can use this script for many times to create  temporary mail id to get nessu
 Next  my  Python script is to  get activation code for Nessus Professional Version..
 
 Thank You......
+
+
+#ANSE SCANNER v1.0:
+##What is ANSE Scanner?
+    ANSE Scanner is tool developed mainly for creating awareness among infosec folks to utilize Nmap(NSE script) completely 
+and also to make them understand every NSE script purpose.So we developed this tool with easy interface for everyone to work 
+with it and also to create new path in cyber security for future.
+For Further info regarding about NSE script [HERE] (https://nmap.org/nsedoc/scripts/)
+
+##Updates
+If you want new features create a issue report and label it enhancement. Or start a pull request. we don't have enough time 
+to daily change ANSE scanner.
+
+##:scroll:Changelog
+ANSE Scanner gets updates with new features, improvements and bugfixes. Be sure to check out the Changelog
+
+##Getting Started
+    git clone https://github.com/
+    cd ANSE-SCANNER
+    chmod +x ANSE.py 
+    python3 ANSE.py
+
+##:octocat:How to contribute
+All contributions are welcome, from code to documentation, to design suggestions, to bug reports.
+Please use GitHub to its fullest-- submit pull requests, contribute tutorials or other wiki content-- whatever 
+you have to offer, we can use it!
+
+##Support us !
+ANSE Scanner is developed with intended to create cyber security awareness in IT industry.if you want to support us 
+in a any possible way,please do it.Here is our official Email address:contact@briskinfosec.com
+
+##:heavy_exclamation_mark:Requirements
+     1.inux operating system with python3 (Kali linux (or) other Linux OS)
+           Kali 2 & 2016 support the latest Nmap versions.
+     2.ython3.x must installed in linux for this tool to work 
+           In python2.x does not support some module.       
+
+##:book:How it works
+     1.Run:Python3 ANSE.py
+     2.Enter your IP or host address without Protocol(http/https)
+      	Example:Target Host or Ip Adderss:
+      	Enter you Host IP:127.0.0.1 (or)www.example.com
+     3.Select your option for Task 
+      	Example:For Service NSE Script
+      	Enter you Option no:1
+     4.Select your Service Type no:
+      	Example:For http Service
+      	Enter your Service no[int]:54
+     5.Select your Particular NSE script and Enter it no:
+        Example:If http-enum is your Choosen NSE script for http service
+        Enter your NSE script no:31
+     6.Read the manual displayed about NSE script for Usage
+     7.Select your option according to your requirement in testing 
+        Y/N/NIL(or)y/n/nill
+             y  -Default Option 
+             n  -custom option i.e custom port,other option like -Pn,-sn
+             nil-no port for the script
+     8.Enter your argument if any need
+        At first run script with no argument(mostly works)
+        If not worked use argument to get result as you excepted.
+        Example:if you need script argument for any script (or)  
+                 if you need other parameter like -sn,-sV,-Pn,
+        Enter argument if u need or just press enter:-sn -sV --script-args=your argument
+     9.Enter your file name to save ANSE result
+        Example:For www.example.com if you run http-enum NSE script
+        Enter your file name to save:test
+        ANSE scanner output stored directory:ANSE SCANNER/output/
+        Output file name format:www.example.com-"file_name-you-enter".txt
+        Final output:ANSE SCANNER/output/www.example.com-test.txt      
+    10.Common Keyword usage
+        [0] back
+        For example:Enter 0 for moving back to previous menu.
+       
+##:octocat:Credits:
+
+##Tutorial ?
+      Coming Soon
+
+##Useful links:
+ 1. [Brisk Infosec] (www.briskinfosec.com/)
+ 2. [NCDRC] (http://www.ncdrc.res.in/)
+ 3. [Kali] (https://www.kali.org/)
+ 4. [NSE Script] (https://nmap.org/nsedoc/scripts/)
+ 
+##Disclaimer:
+
+***Note: ANSE Scanner is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts
+you own or have permission to test. Any other use is not the responsibility of the developer(s). Be sure that you understand and
+are complying with the ANSE Scanner licenses and laws in your area.***
+
+
+
+
+
 `