Kenzer
automated web assets enumeration & scanning [DEPRECATED]
Install / Use
/learn @ARPSyndicate/KenzerREADME
Mentions
A Conceptual Introduction to Automating Bug Bounties<br>
Demo
Screenshots

Instructions for running
- Run
git clone https://github.com/ARPSyndicate/kenzer /home/ubuntu/kenzer && cd /home/ubuntu/kenzer(preferred)<br> - Create an account on Zulip<br>
- Navigate to
Settings > Your Bots > Add a new bot<br> - Create a new generic bot named
kenzer<br> - Add all the configurations in
configs/kenzer.conf<br> - Install/Run using - <br>
./install.sh -b[if you needkenzer-compatiblebinaries to be installed] (preferred)<br>./install.sh[if you do not needkenzer-compatiblebinaries to be installed]<br>./run.sh[if you do not need installation at all]<br>./service.sh[initialize it as a service post-installation] (preferred)<br>bash swap.sh[in case you are facing memory issues]
- Interact with
kenzerusing Zulip client, by adding bot to a stream or via DM.<br> - Test
@**kenzer** manas Zulip input to display available commands.<br> - All the commands can be used by mentioning the chatbot using the prefix
@**kenzer**(name of your chatbot).<br>
Some Popular Features
- Subdomain Enumeration using Subfinder, Amass, CerteX, TLSX, DNSX, NXScan, & ShuffleDNS
- Port Enumeration using NXScan (Shodan, Netlas, Naabu & Nmap)
- Web Enumeration using HttpX, Favinizer, Domlock, Gau, GoSpider, URLhunter & Waymore
- Web Vulnerability Scanning using Freaker, Jaeles, Wapiti, ZAP, Nuclei, Rescro & DalFox
- Backup Files Scanning using Fuzzuli
- Git Repository Enumeration & Scanning using RepoHunt & Trufflehog
- Web Screenshot Identification using Shottie & Perceptic
- WAF Detection & Avoidance using WafW00f & Nuclei
- Reputation Scoring using DomREP (GreyNoise, URLHaus, PhishTank)
- Every task can be distributed over multiple machines
- Every task can be executed through a single HTTP/SOCKS Proxy
Built-in Modules
blacklist <target>,<regex>- initializes & removes blacklisted targetswhitelist <target>,<regex>- initializes & keeps only whitelisted targetsprogram <target>,[<name>][<meta>][<link>]- initializes the program to which target belongssubenum[-<mode>[active/passive (default=all)]] <target>- enumerates subdomainsrepenum <target>- enumerates reputation of subdomainsrepoenum <target>- enumerates github repositoriesportenum[-<mode>[100/1000/full/fast (default=1000)]] <target>- enumerates open portsservenum <target>- enumerates serviceswebenum <target>- enumerates webserversheadenum <target>- enumerates additional info from webserversurlheadenum <target>- enumerates additional info from urlsasnenum <target>- enumerates asn recordsdnsenum <target>- enumerates dns recordsconenum <target>- enumerates hidden files & directoriesurlenum[-<mode>[active/passive (default=all)]] <target>- enumerates urlssocenum <target>- enumerates social media accountskeysenum <target>- enumerates sensitive api keyswafscan <target>- scans for firewallssubscan[-<mode>[web/dns (default=all)]] <target>- hunts for subdomain takeoversurlscan[-<mode>[cmdi/crlf/redirect/sqli/ssrf/ssti/xss (default=all)]] <target>- hunts for vulnerabilities in URL parametersreposcan <target>- scans github repositories for api key leaksbakscan <target>- scans for backup filescscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target>- scan with customized templatescvescan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target>- hunts for CVEsvulnscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target>- hunts for other common vulnerabilitiesidscan[-<severity>[critical/high/medium/low/info/workflow (default=all)]] <target>- identifies applications running on webserversportscan <target>- scans open ports (nmap)(slow)shodscan <target>- scans open ports (shodan)(fast)xssscan <target>- scans for xss vulnerabilitiesappscan <target>- scans for webapp vulnerabilitiesbuckscan <target>- hunts for unreferenced aws s3 bucketsfavscan <target>- fingerprints webservers using faviconvizscan[-<mode>[web/repo (default=web)]] <target>- screenshots websites & repositoriesenum <target>- runs all enumerator modulesscan <target>- runs all scanner modulesrecon <target>- runs all moduleshunt <target>- runs your custom workflowdisseminate <command> <target>- splits & distributes input over multiple botsupload- switches upload functionalitywaf- switches waf avoid functionality"proxy- switches proxy functionality"upgrade- upgrades kenzer to latest versionmonitor <target>- monitors ct logs for new subdomainsmonitor normalize- normalizes the enumerations from ct logsmonitor db- monitors ct logs for domains in summary/domain.txtmonitor autohunt <frequency(default=5)>- starts automated hunt while monitoringsync- synchronizes the local kenzerdb with githubfreaker <module> [<target>]- runs freaker modulekenzer <module>- runs a specific modulekenzer man- shows this manual
The Beginner's Workflow

Although few more modules are available & much more is going to be released in the course of time which can advance this workflow, yet this one is enough to get started with & listed below are few of its successful hunts.<br><br> <img src="screenshots/adobe.png" width="200" height="60"> <img src="screenshots/ibm.png" width="150" height="60"> <img src="screenshots/amazon.png" width="150" height="50"> <img src="screenshots/algolia.png" width="250" height="60">
COMPATIBILITY TESTED ON UBUNTU 20.04.5 (x86_64) ONLY<br> RIGGED WITH LOGIC ISSUES<br> FEEL FREE TO SUBMIT PULL REQUESTS<br> THIS IS A VERY SOPHISTICATED AUTOMATION FRAMEWORK<br> MEANT TO BE DEPLOYED ON AWS UBUNTU 20.04 AMD64 SERVER<br> ABILITY TO UNDERSTAND PYTHON & BASH IS A PREREQUISITE<br> WE DO NOT PROVIDE ANY SUPPORT WITH INSTALLATION<br> ISSUES RELATED TO INSTALLATION WILL BE CLOSED WITHOUT ANY RESOLUTION<br>
