Hacksaw
Uses a variety of open-source tools to automate initial testing on internal and external pentests, exports testing in txt, xml, and html formats, and parses outputs for findings.
README
hacksaw v1.2
Kevin Gilstrap, bully
https://www.linkedin.com/in/kevingilstrap
November 5, 2015
Uses a variety of open-source tools to automate initial testing on Internal and External Penetration Tests:
1. Identifies open ports and services in a staged format for quicker results
2. Enumerates services and identifies known exploitable vulnerabilities
3. Identifies misconfigurations and known vulnerable components in web applications
4. Takes screen shots of all scanned websites
5. Conducts password auditing on common services for default, null, or easily guessable
passwords
6. Exports all nmap and metasploit outputs to an engagement directory in txt, xml, and html formats
7. Creates a metasploit workspace, imports results, and exports the workspace
and creds to the engagement directory.
8. All outputs are parsed and returned to a master text document and html file for easy viewing.
Installation directory:
------
$ sudo git clone https://github.com/KMGbully/hacksaw.git /opt/hacksaw/
Usage:
------
$ sudo ./hacksaw.sh
Dependencies:
-------------
firefox
nmap
metasploit
xsltproc
arp-scan
nbtscan
nikto (Must be globally declared. ex: sudo nikto -h)
yasuo (Must be located in /opt/yasuo directory)
rawr (Must be located in /opt/rawr/ directory)
responder (Must be located in /opt/responder directory)