SkillAgentSearch skills...

Vaile

Metasploit-like pentest framework derived from TIDoS (https://github.com/0xInfection/TIDoS-Framework)

Install / Use

/learn @VainlyStrain/Vaile

README

IMPORTANT:

Vaile Framework has been merged into the original TIDoS Framework. You can find the latest progress here: https://github.com/0xInfection/TIDoS-Framework. This repository is discontinued.

<h1 align="center"> <img src='files/logo.png' height='500'></img><br> Vaile <br> </h1> <p align="center"> <a href="https://github.com/VainlyStrain/Vaile/blob/master/Vaile"> <img src="https://img.shields.io/static/v1.svg?label=Version&message=2.2&color=lightgrey&style=flat-square&logo=dev.to&logoColor=white"> </a> <a href="https://www.python.org/"> <img src="https://img.shields.io/static/v1.svg?label=Python&message=3.7&color=lightgrey&style=flat-square&logo=python&logoColor=white"> </a><br> Pentest framework based on TIDoS. </p>

IMPORTANT:

The new Qt5 interface is complete, but has additional dependencies. Take a look at the updated installation instructions.

Highlights :-

Here is some light on what the framework is all about:

  • [x] A complete versatile framework to cover up everything from Reconnaissance to Vulnerability Analysis.
  • [x] Has 5 main phases, subdivided into 14 sub-phases consisting a total of 108 modules.
  • [x] Reconnaissance Phase has 50 modules of its own (including active and passive recon, information disclosure modules).
  • [x] Scanning & Enumeration Phase has got 16 modules (including port scans, WAF analysis, etc)
  • [x] Vulnerability Analysis Phase has 37 modules (including most common vulnerabilities in action).
  • [x] Exploits Castle has only 1 exploit. (purely developmental)
  • [x] And finally, Auxiliaries have got 4 modules. more under development
  • [x] All four phases each have an Auto-Awesome module which automates every module for you.
  • [x] Since 2.1: huge performance boost through parallelisation in various modules
  • [x] Piping Attacks through Tor (not implemented everywhere yet)
  • [x] You just need the domain, and leave everything is to this tool.
  • [x] Vaile has full verbose out support, so you'll know whats going on.
  • [x] Since 2.2: Attacking now even easier with a new GUI

Main new features

The main differences between Vaile and TIDoS are:

  • [x] the programming language: Vaile is fully ported to Python3
  • [x] the interface: Vaile presents a new, Metasploit-like console interface
  • [x] Parallelisation: Vaile uses multiprocessing to speed up attacks
  • [x] An alternative CLI interface for faster interaction with one specific module
  • [x] Anonymity: Attacking through Tor is possible (95% done)
  • [x] Module Completion: Some modules have been feature-extended (e.g. more evasion, supporting more than 1 query parameter)
  • [x] Some new modules: arpscan
  • [x] A Graphical User Interface for easier interaction with the toolkit

Installation :-

Installation Script (Globally) :

To install the framework globally in /opt, run the provided core/install.py script as root. After this, you can launch Vaile simply by typing Vaile on the command line.

Manual Installation (Locally) :

  • Clone the repository locally and navigate there:
git clone https://github.com/vainlystrain/vaile.git
cd Vaile

Vaile needs some libraries to run, which can be installed via aptitude or dnf Package Managers.

sudo apt-get install libncurses5 libxml2 nmap tcpdump libexiv2-dev build-essential python3-pip libmariadbclient18 libmysqlclient-dev tor konsole

Now after these dependencies are finished installing, we need to install the remaining Python Package dependencies, hence run:

pip3 install -r requirements.txt

Thats it. You now have Vaile at your service. Fire it up using:

python3 Vaile              #Qt5 interface
sudo python3 vsconsole.py  #console interface

Updating Vaile :

To get the current version of Vaile, move into the installation folder and perform (sudo) git pull #sudo if installed by install.py. Alternatively, you can run the fetch command in vsconsole.

Getting Started :-

To get started, you need to set your own API KEYS for various OSINT & Scanning and Enumeration purposes. To do so, open up API_KEYS.py under files/ directory and set your own keys and access tokens for SHODAN, CENSYS, FULL CONTACT, GOOGLE and WHATCMS.

GOOD NEWS:

The latest release of Vaile includes all API KEYS and ACCESS TOKENS for SHODAN, CENSYS, FULL CONTACT, GOOGLE and WHATCMS by default. I found these tokens on various repositories on GitHub itself. You can now use all the modules which use the API KEYS. :)

Commands :-

__                                                    __                                                        
 !  attack    Attack specified target(s)              M
 :  clear     Clear terminal.                         :
 V  creds     Handle target credentials.              
 :  fetch     Check for and install updates.          :
 :  find      Search a module.                        :
    help      Show help message.                      :
    info      Show description of current module.     M
 :  intro     Display Intro.                          :
 :  leave     Leave module.                           M
    list      List all modules of a category.         :
 :  load      Load module.                            :
 :  netinfo   Show network information.               :
 :  opts      Show options of current module.         M
    phpsploit Load the phpsploit framework.           :
              (needs to be downloaded externally)
 :  processes Set number of processes in parallelis.  :
    q         Terminate Vaile session.                :
 :  sessions  Interact with cached sessions.          :
 :  set       Set option value of module.             M
 :  tor       Pipe Attacks through the Tor Network.   :
    vicadd    Add Target to list.                     :
    vicdel    Delete Target from list.                :
    viclist   List all targets.                       :

  Avail. Cmds
    M needs loaded modvle
    V [! potentially] need loaded target(s)

Flawless Features :-

Vaile Attack presently supports the following: and more modules are under active development

  • Reconnaissance + OSINT

    • Passive Reconnaissance:

      • Nping Enumeration Via external APi
      • WhoIS Lookup Domain info gathering
      • GeoIP Lookup Pinpoint physical location
      • DNS Configuration Lookup DNSDump
      • Subdomains Lookup Indexed ones
      • Reverse DNS Lookup Host Instances
      • Reverse IP Lookup Hosts on same server
      • Subnets Enumeration Class Based
      • Domain IP History IP Instances
      • Web Links Gatherer Indexed ones
      • Google Search Manual search
      • Google Dorking (multiple modules) Automated
      • Email to Domain Resolver Email WhoIs
      • Wayback Machine Lookups Find Backups
      • Breached Email Check Pwned Email Accounts
      • Enumeration via Google Groups Emails Only
      • Check Alias Availability Social Networks
      • Find PasteBin Posts Domain Based
      • LinkedIn Gathering Employees & Company
      • Google Plus Gathering Domain Profiles
      • Public Contact Info Scraping FULL CONTACT
      • Censys Intel Gathering Domain Based
      • Threat Intelligence Gathering Bad IPs
    • Active Reconnaissance:

      • Ping Enumeration Advanced
      • CMS Detection (185+ CMSs supported) IMPROVED
      • Advanced Traceroute IMPROVED
      • robots.txt and sitemap.xml Checker
      • Grab HTTP Headers Live Capture
      • Find HTTP Methods Allowed via OPTIONS
      • Detect Server Type IMPROVED
      • Examine SSL Certificate Absolute
      • Apache Status Disclosure Checks File Based
      • WebDAV HTTP Enumeration PROFIND & SEARCH
      • PHPInfo File Enumeration via Bruteforce
      • Comments Scraper Regex Based
      • Find Shared DNS Hosts Name Server Based
      • Alternate Sites Discovery User-Agent Based
      • Discover Interesting Files via Bruteforce
        • Common Backdoor Locations shells, etc.
        • Common Backup Locations .bak, .db, etc.
        • Common Password Locations .pgp, .skr, etc.
        • Common Proxy Path Configs. .pac, etc.
        • Multiple Index Paths index, index1, etc.
        • Common Dot Files .htaccess, .apache, etc
        • Common Logfile Locations .log, .changelog, etc
    • Information Disclosure:

      • Credit Cards Disclosure If Plaintext
      • Email Harvester IMPROVED
      • Fatal Errors Enumeration Includes Full Path Disclosure
      • Internal IP Disclosure Signature Based
      • Phone Number Havester Signature Based
      • Social Security Number Harvester US Ones
  • Scanning & Enumeration

    • Remote Server WAF Enumeration Generic 54 WAFs
    • Port Scanning Ingenious Modules
      • Simple Port Scanner via Socket Connections
      • TCP SYN Scan Highly reliable
      • TCP Connect Scan Highly Reliable
      • XMAS Flag Scan Reliable Only in LANs
      • FIN Flag Scan Reliable Only in LANs
      • Port Service Detector
    • Web Technology Enumeration Absolute
    • Complete SSL Enumeration Absolute
    • Operating System Fingerprinting IMPROVED
    • Banner Grabbing of Services via Open Ports
    • Interactive Scanning with NMap 16 preloaded modules
    • Internet Wide Servers Scan Using CENSYS Database
    • Web and Links Crawlers
      • Depth 1 Indexed Uri Crawler
      • Depth 2 Single Page Crawler
      • Depth 3 Web Link Crawler
    • ARP Scanner NEW
  • Vulnerability Analysis

    Web-Bugs & Server Misconfigurations

    • Insecure CORS Absolute
    • Same-Site Scripting Sub-domain based
    • Zone Transfer DNS Server based
    • Clickjacking
      • Frame-Busting Checks
      • X-FRAME-OPTIONS Header Checks
    • Security on Cookies
      • HTTPOnly Flag
      • Secure Flag on Cookies
    • Cloudflare Misconfiguration Check
      • DNS Misconfiguration Checks
      • Online Database Lookup For Breaches
    • HTTP Strict Transport Security Usage
      • HTTPS Enabled but no HSTS

Related Skills

View on GitHub
GitHub Stars65
CategoryDevelopment
Updated4mo ago
Forks16

Languages

Python

Security Score

97/100

Audited on Dec 9, 2025

No findings