Skip to content

ch0nchu/TIDoS-Framework

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Python TIDoS Supported OS License Build Modules Status Stage

TIDoS Framework

TIDoS Framework is a comprehensive web application audit framework. let's keep this simple

Highlights :-

The main highlights of this framework is:

  • An all-in-one framework to cover up everything from Reconnaissance to Exploitation.
  • Has 4 main phases, subdivided into 13 sub-phases containing total of 96 modules.
  • Reconnaissance Phase has 36 modules of its own (including active and passive recon, information disclosure modules).
  • Scanning & Enumeration Phase has got 27 modules (including port scans, WAF analysis, etc)
  • Vulnerability Analysis Phase has 33 modules (including most common vulnerabilites in action).
  • Exploits Castle has only 1 exploit. (purely developemental)
  • All four phases each have a Auto-Awesome module which automates every module for you.
  • You just need the domain, and leave everything is to this tool.
  • TIDoS has full verbose out support, so you'll know whats going on.
  • Fully user friendly interaction environment. (no shits)

Installation :-

  • Clone the repository locally and navigate there:
git clone https://github.com/theinfecteddrake/tidos-framework.git
cd tidos-framework
  • Install the dependencies:
chmod +x install
./install

Thats it! Now you are good to go! Now lets run the tool:

tidos

Getting Started :-

TIDoS is made to be comprehensive. It is a highly flexible framework where you just have to select and use modules.

But before that, you need to set your own API KEYS for various OSINT purposes. To do so, open up API_KEYS.py under files/ directory and set your own keys and access tokens for SHODAN, CENSYS, FULL CONTACT, GOOGLE and WHATCMS. Public API KEYS for SHODAN and WHATCMS have been provided with the TIDoS release itself. You can still add your own... no harm!

Finally, as the framework opens up, enter the website name eg. http://www.example.com and let TIDoS lead you. Thats it! Its as easy as that.

Recommended:

  • Follow the order of the tool (Run in a schematic way).

    Reconnaissance ➣ Scanning & Enumeration ➣ Vulnerability Analysis

To update this tool, use tidos_updater.py module under tools/ folder.

Flawless Features :-

TIDoS Framework presently supports the following:

  • Reconnaissance + OSINT

    • Passive Reconnaissance:

      • Nping Enumeration Via external APi
      • WhoIS Lookup Domain info gathering
      • GeoIP Lookup Pinpoint physical location
      • DNS Configuration Lookup DNSDump
      • Subdomains Lookup Indexed ones
      • Reverse DNS Configuration Lookup
      • Reverse IP Lookup Hosts on same server
      • Domain IP History IP Instances
      • Web Links Gatherer Indexed ones
      • Google Search Manual search
      • Google Dorking (multiple modules) Automated
      • Email to Domain Resolver Email WhoIs
      • Wayback Machine Lookups Find Backups
      • Breached Email Check Pwned Email Accounts
      • Enumeration via Google Groups
      • Check Alias Availability Social Networks
      • Find PasteBin Posts Domain Based
      • LinkedIn Gathering Employees & Company
      • Threat Intelligence Gathering Bad IPs
    • Active Reconnaissance

      • Ping enumeration Advanced
      • CMS Detection (185+ CMSs supported) IMPROVED
      • Advanced Traceroute IMPROVED
      • Grab HTTP Headers Live Capture
      • Find HTTP Methods Allowed NEW
      • Detect Server IMPROVED
      • Examine SSL Certificate Absolute
      • robots.txt and sitemap.xml Checker
      • Subnets Enumeration Class Based
      • Find Shared DNS Hosts Name Server Based
      • Operating System Fingerprinting IMPROVED
    • Information Disclosure

      • Credit Cards Disclosure If Plaintext
      • Email Harvester IMPROVED
      • Fatal Errors Enumeration Includes Full Path Disclosure
      • Internal IP Disclosure Signature Based
      • Phone Number Havester Signature Based
      • Social Security Number Harvester US Ones
  • Scanning & Enumeration

    • Remote Server WAF Analysis
    • Port Scanning Ingenious Modules
      • Simple Port Scanner via Socket Connections
      • TCP SYN Scan Highly reliable
      • TCP Connect Scan Highly Reliable
      • XMAS Flag Scan Reliable Only in LANs
      • Fin Flag Scan Reliable Only in LANs
      • Port Service Detector
    • Web Technology Enumeration Absolute
    • Banner Grabbing of Services via Open Ports
    • Interactive Scanning with NMap 16 preloaded modules
    • Crawlers
      • Depth 1
      • Depth 2 IMPROVED
  • Vulnerability Analysis

    Web-Bugs & Server Misconfigurations

    • Insecure CORS Absolute
    • Same-Site Scripting Sub-domain based
    • Zone Transfer DNS Server based
    • Clickjacking Framable response based
    • Security on Cookies HTTPOnly/Secure Flags
    • Cloudflare Misconfiguration Check + Getting Real IP
    • HTTP High Transport Security Usage
    • Spoofable Email Missing SPF and DMARC Records
    • Security Headers Analysis Live Capture
    • Cross-Site Tracing Port Based
    • Network Security Misconfig. Telnet Enabled

    Serious Web Vulnerabilities

    • File Inclusions
      • Local File Inclusion (LFI) Param based
      • Remote File Inclusion (RFI)
        • Parameter Based
      • Pre-loaded Path Based
    • OS Command Injection Linux & Windows (RCE)
    • Path Traversal (Sensitive Paths)
    • Cross-Site Request Forgery Absolute
    • SQL Injection
      • Cookie Value Based
      • Referer Value Based
      • User-Agent Value Based
      • Auto-gathering IMPROVED
      • Parameter Based Manual
    • LDAP Injection Parameter Based
    • HTML Injection Parameter Based
    • Host Header Injection Port Based
    • Bash Command Injection ShellShock
    • Cross-Site Scripting beta
      • Cookie Value Based
      • Referer Value Based
      • User-Agent Value Based
      • Parameter Value Based Manual
    • Unvalidated URL Forwards Open Redirect
    • CRLF Injection and HTTP Response Splitting
      • User-Agent Value Based
      • Parameter value Based Manual

    Auxillaries

    • Protocol Credential Bruteforce

      • FTP Protocol Bruteforce
      • SSH Protocol Bruteforce
      • POP 2/3 Protocol Bruteforce
      • SQL Protocol Bruteforce
      • XMPP Protocol Bruteforce
      • SMTP Protocol Bruteforce
      • TELNET Protocol Bruteforce
    • String & Payload Encoder

      • URL Character Encoding
      • Base64 Character Encoding
      • HTML Character Encoding
      • Plain ASCII Character Encoding
      • Hex Character Encoding
      • Octal Character Encoding
      • Binary Character Encoding
      • GZip Character Encoding
  • Exploitation purely developmental

    • ShellShock

TIDoS In Action:

Upcoming:

There are some bruteforce modules to be added:

  • Common Backups Locations
  • Common Password Locations
  • Common Dot files (eg. .htaccess)
  • Interesting Directories
  • Interesting Filepaths
  • Lots more of OSINT

Known Bugs:

This version of TIDoS is purely developmental and is presently stable. There are bugs in resolving the [99] Back at various end-points which results in blind fall-backs. Though I have added global exception handling, still, there maybe bugs out there. Also TIDoS needs to develop more on logging all info displayed on the screen (help needed).

Final Words:

Put this project on a watch, since it is updated frequently (you can take a look at past commits history). This project is one of the best frameworks I have ever built and I would really like your constructive criticism, suggestions and help in converting this project into the best web penetration testing framework ever built and trust me, it will be ;).

Thank you,

@_tID | CodeSploit

About

A comprehensive web-app audit framework.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 93.4%
  • XSLT 2.4%
  • HTML 1.5%
  • C 0.6%
  • C++ 0.6%
  • TeX 0.5%
  • Other 1.0%