12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394 |
- ANSE SCANNER v1.0:
- What is ANSE Scanner?
- ANSE Scanner is tool developed mainly for creating awareness among infosec folks to utilize Nmap(NSE script) completely
- and also to make them understand every NSE script purpose.So we developed this tool with easy interface for everyone to work
- with it and also to create new path in cyber security for future.
- For Further info regarding about NSE script <a href="https://nmap.org/nsedoc/scripts/">HERE</a>
- Updates
- If you want new features create a issue report and label it enhancement. Or start a pull request. we don't have enough time
- to daily change ANSE scanner.
- Changelog
- ANSE Scanner gets updates with new features, improvements and bugfixes. Be sure to check out the Changelog
- Getting Started
- git clone https://github.com/
- cd ANSE-SCANNER
- chmod +x ANSE.py
- python3 ANSE.py
- How to contribute
- All contributions are welcome, from code to documentation, to design suggestions, to bug reports.
- Please use GitHub to its fullest-- submit pull requests, contribute tutorials or other wiki content-- whatever
- you have to offer, we can use it!
- Support us !
- ANSE Scanner is developed with intended to create cyber security awareness in IT industry.if you want to support us
- in a any possible way,please do it.Here is our official Email address:contact@briskinfosec.com
- Requirements
- 1)Linux operating system with python3 (Kali linux (or) other Linux OS)
- Kali 2 & 2016 support the latest Nmap versions.
- 2)Python3.x must installed in linux for this tool to work
- In python2.x does not support some module.
- How it works
- 1)Run:Python3 ANSE.py
- 2)Enter your IP or host address without Protocol(http/https)
- Example:Target Host or Ip Adderss:
- Enter you Host IP:127.0.0.1 (or)www.example.com
- 3)Select your option for Task
- Example:For Service NSE Script
- Enter you Option no:1
- 4)Select your Service Type no:
- Example:For http Service
- Enter your Service no[int]:54
- 5)Select your Particular NSE script and Enter it no:
- Example:If http-enum is your Choosen NSE script for http service
- Enter your NSE script no:31
- 6)Read the manual displayed about NSE script for Usage
- 7)Select your option according to your requirement in testing
- Y/N/NIL(or)y/n/nill
- y -Default Option
- n -custom option i.e custom port,other option like -Pn,-sn
- nil-no port for the script
- 8)Enter your argument if any need
- At first run script with no argument(mostly works)
- If not worked use argument to get result as you excepted.
- Example:if you need script argument for any script (or)
- if you need other parameter like -sn,-sV,-Pn,
- Enter argument if u need or just press enter:-sn -sV --script-args=your argument
- 9)Enter your file name to save ANSE result
- Example:For www.example.com if you run http-enum NSE script
- Enter your file name to save:test
- ANSE scanner output stored directory:ANSE SCANNER/output/
- Output file name format:www.example.com-"file_name-you-enter".txt
- Final output:ANSE SCANNER/output/www.example.com-test.txt
- 10)Common Keyword usage:
- [0] back
- For example:Enter 0 for moving back to previous menu.
- Credits:
- Tutorial ?
- Coming Soon.......
- you can visit my channel : https://www.youtube.com/channel/
- Useful links:
- 1.<a href="www.briskinfosec.com">BRISK INFOSEC</a>
- 2.<a href="https://www.kali.org/">KALI</a>
- 3.<a href="https://nmap.org/nsedoc/scripts/">NSE Script</a>
- 4.<a href="http://www.ncdrc.res.in/">NCDRC</a>
- Disclaimer
- Note: ANSE Scanner is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts
- you own or have permission to test. Any other use is not the responsibility of the developer(s). Be sure that you understand and
- are complying with the ANSE Scanner licenses and laws in your area. In other words, don't be stupid, don't be an asshole, and use
- this tool responsibly and legally.
-
|