ANSE SCANNER v1.0:
What is ANSE Scanner?
ANSE Scanner is tool developed mainly for creating awareness among infosec folks to utilize Nmap(NSE script) completely
and also to make them understand every NSE script purpose.So we developed this tool with easy interface for everyone to work
with it and also to create new path in cyber security for future.
For Further info regarding about NSE script HERE
Updates
If you want new features create a issue report and label it enhancement. Or start a pull request. we don't have enough time
to daily change ANSE scanner.
Changelog
ANSE Scanner gets updates with new features, improvements and bugfixes. Be sure to check out the Changelog
Getting Started
git clone https://github.com/
cd ANSE-SCANNER
chmod +x ANSE.py
python3 ANSE.py
How to contribute
All contributions are welcome, from code to documentation, to design suggestions, to bug reports.
Please use GitHub to its fullest-- submit pull requests, contribute tutorials or other wiki content-- whatever
you have to offer, we can use it!
Support us !
ANSE Scanner is developed with intended to create cyber security awareness in IT industry.if you want to support us
in a any possible way,please do it.Here is our official Email address:contact@briskinfosec.com
Requirements
1)Linux operating system with python3 (Kali linux (or) other Linux OS)
Kali 2 & 2016 support the latest Nmap versions.
2)Python3.x must installed in linux for this tool to work
In python2.x does not support some module.
How it works
1)Run:Python3 ANSE.py
2)Enter your IP or host address without Protocol(http/https)
Example:Target Host or Ip Adderss:
Enter you Host IP:127.0.0.1 (or)www.example.com
3)Select your option for Task
Example:For Service NSE Script
Enter you Option no:1
4)Select your Service Type no:
Example:For http Service
Enter your Service no[int]:54
5)Select your Particular NSE script and Enter it no:
Example:If http-enum is your Choosen NSE script for http service
Enter your NSE script no:31
6)Read the manual displayed about NSE script for Usage
7)Select your option according to your requirement in testing
Y/N/NIL(or)y/n/nill
y -Default Option
n -custom option i.e custom port,other option like -Pn,-sn
nil-no port for the script
8)Enter your argument if any need
At first run script with no argument(mostly works)
If not worked use argument to get result as you excepted.
Example:if you need script argument for any script (or)
if you need other parameter like -sn,-sV,-Pn,
Enter argument if u need or just press enter:-sn -sV --script-args=your argument
9)Enter your file name to save ANSE result
Example:For www.example.com if you run http-enum NSE script
Enter your file name to save:test
ANSE scanner output stored directory:ANSE SCANNER/output/
Output file name format:www.example.com-"file_name-you-enter".txt
Final output:ANSE SCANNER/output/www.example.com-test.txt
10)Common Keyword usage:
[0] back
For example:Enter 0 for moving back to previous menu.
Credits:
Tutorial ?
Coming Soon.......
you can visit my channel : https://www.youtube.com/channel/
Useful links:
1.BRISK INFOSEC
2.KALI
3.NSE Script
4.NCDRC
Disclaimer
Note: ANSE Scanner is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts
you own or have permission to test. Any other use is not the responsibility of the developer(s). Be sure that you understand and
are complying with the ANSE Scanner licenses and laws in your area. In other words, don't be stupid, don't be an asshole, and use
this tool responsibly and legally.