Incursore
Incursore came from nmapAutomator to be your personal raider while you enumerate a target.
Install / Use
/learn @wirzka/IncursoreREADME
Incursore
____
/ _/___ _______ ________________ ________
/ // __ \/ ___/ / / / ___/ ___/ __ \/ ___/ _ \
_/ // / / / /__/ /_/ / / (__ ) /_/ / / / __/
/___/_/ /_/\___/\__,_/_/ /____/\____/_/ \___/
@wirzka
Incursore will raid the target for you.
It came out from nmapAutomator to be more suited for the OSCP environment.
TOC
- Lazy here
- Features and changes
- Requirements
- Installation
- Usage
- Future features
- Incursore in the wild
- Disclaimer
TL;DR
While incursore has born from nmapAutomator, it is not nmapAutomator. The script from @21y4d is great, but sometimes it's too slow (due to nikto). By removing it, the time needed to complete a scan has been drastically reduced. So, from just removing nikto I found myself tweaking it a lot, that's why I decided to rename it to incursore and to publish it under a new repo and name. Hope you'll find it useful.
Bear in mind that I'm still working on it.
Features and changes
Incursore has the following features and changes:
- It immmediately runs a full TCP port scans
- It asks to the user to run with sudo in order to run a SYN Scan instead of a Connect Scan
- It automatically tries to bruteforce FTP services
- It automatically takes screenshot of HTTP homepages using cutycapt
- It runs ffuf instead of gobuster
- It does not run nikto
- It has not the remote capabilities
Minor changes
- It highlights target IP
- It highlights target OS type
- It highlights nmap scan type
Requirements
Incursore's requirements are the following: | tool | scope | official link | |:--------------:|:---------------:|:-------------:| | nmap | recon/enum | https://nmap.org/ | | nmap vulners | recon | https://github.com/vulnersCom/nmap-vulners | | ffuf | web enum | https://github.com/ffuf/ffuf | | sslscan | web enum | https://github.com/rbsec/sslscan | | joomscan | web enum | https://github.com/OWASP/joomscan | | wpscan | web enum | https://github.com/wpscanteam/wpscan | | droopescan | web enum | https://github.com/droope/droopescan | | cutycapt | web enum |http://cutycapt.sourceforge.net/ | | smbmap | smb enum | https://github.com/ShawnDEvans/smbmap | | enum4linux | smb enum | https://github.com/CiscoCXSecurity/enum4linux | | snmp-check | snmp enum | https://www.nothink.org/codes/snmpcheck/index.php | | snmpwalk | snmp enum |https://linux.die.net/man/1/snmpwalk | | odat | oracle db recon | https://github.com/quentinhardy/odat | | ldapsearch | ldap enum | https://linux.die.net/man/1/ldapsearch | | dnsrecon | dns enum | https://github.com/darkoperator/dnsrecon | | smtp-user-enum | smtp enum | https://github.com/pentestmonkey/smtp-user-enum | | hydra | ftp bruteforce | https://github.com/vanhauser-thc/thc-hydra |
The majority of them is already present in pentesting distro like Parrot OS and Kali Linux. To find out how many of them are missing on your machine, just launch a which command like this:
$ which nmap ffuf sslscan joomscan wpscan droopescan cutycapt smbmap enum4linux snmp-check snmpwalk odat ldapsearch dnsrecon smtp-user-enum hydra
Installation
git clone https://github.com/wirzka/incursore.git
sudo ln -s $(pwd)/incursore/incursore.sh /usr/local/bin/
Usage
$ incursore.sh -h
____
/ _/___ _______ ________________ ________
/ // __ \/ ___/ / / / ___/ ___/ __ \/ ___/ _ \
_/ // / / / /__/ /_/ / / (__ ) /_/ / / / __/
/___/_/ /_/\___/\__,_/_/ /____/\____/_/ \___/
@wirzka
Usage: incursore.sh -H/--host <TARGET-IP> -t/--type <TYPE>
Optional: [-d/--dns <DNS SERVER>] [-o/--output <OUTPUT DIRECTORY>]
Scan Types:
Port : Shows all open ports
Script : Runs a script scan on found ports
UDP : Runs a UDP scan "requires sudo"
Vulns : Runs CVE scan and nmap Vulns scan on all found ports
Recon : Suggests recon commands, then prompts to automatically run them
All : Runs all the scans
inspired by @21y4d gently modified by @wirzka
Future Features
- Generally increasing auto reconnaissance based on discovered services.
Incursore in the wild
Thanks to everyone for spending some times trying, using, and enhancing Incursore <3:
Xerosec on his YouTube video
Disclaimer
I am not responsible for any damages (tangible or intangible) resulting from the use of incursore. You must have the permissions to use it.
Stay safe.
Related Skills
node-connect
352.5kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
111.3kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
352.5kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
352.5kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。

