Welcome to EnumeRannden, a comprehensive automation script for penetration testing and reconnaissance, created by Adrián Gisbert - Aka Rannden-SHA. This tool is designed to streamline and enhance your penetration testing workflow by integrating a variety of essential tools and functionalities into a single script.
- Automated Enumeration: Perform various NMAP scans, web service enumeration, OSINT gathering, and more.
- Payload Generation: Generate payloads using msfvenom for various platforms.
- Reverse Shell Generation: Generate reverse shell commands for multiple programming languages and tools.
- Hash Cracking: Detect and crack hashes using Hashcat.
- Cheatsheets: Access cheatsheets for common commands and techniques.
- Dependency Management: Check and install necessary dependencies automatically.
- Nuclei Compatibility: Integrated with Nuclei for advanced OSINT scanning.
- Improved UI: Enhanced graphical interface with system and IP information.
- Download Tools: New section for downloading tools like Socat, Chisel, Ligolo, WinPEAS, and LinPEAS in various versions.
- Added to the Path: The first time the script is executed, it will set up a symlink allowing future executions from anywhere by typing enumerannden.
- Generate a PDF Report: Now it generates a .txt report and a .pdf report (More aesthetic)
- Active Directory Tools: Enumerate Active Directory
- Post-Explotation:Manage a reverse shell and enter preset commands for different outputs
- Port Knocking: Method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports
- Brute Forece Attack: Hydra
- Subdomain Scanner: On Web Tools Submenu
- Create a custom password dictionary: through a previous questionnaire.
- Fixed some bugs
Download the script:
git clone https://github.com/Rannden-SHA/EnumeRannden.git
Give execution permissions:
chmod +x EnumeRannden/EnumeRannden.sh
To install the necessary dependencies, run:
EnumeRannden/EnumeRannden.sh
and select the option 17):
Run the script with the following command:
EnumeRannden/EnumeRannden.sh [options]
The first time the script is executed, it will set up a symlink allowing future executions from anywhere by typing enumerannden. For future executions just run:
enumerannden [options]
-c [file.conf] : Load a configuration file.
The configuration file allows you to save the current state of your session, including IP configuration, detected operating system, open ports, and directory paths. This is particularly useful for pausing and resuming work without losing progress.
After setting up your session (configuring IP, creating directories, performing scans), the script automatically saves the configuration to a file in the format session_name.conf within the main directory. You can also manually save the configuration at any point by choosing the "Save & Exit" option from the main menu.
To load a saved session, use the -c option followed by the configuration file name:
EnumeRannden/EnumeRannden.sh -c path_to_config_file.conf
This loads all previously saved settings and results, allowing you to seamlessly continue your work from where you left off.
Efficiency: Save time by avoiding reconfiguration each session.
Consistency: Maintain the same environment and settings across multiple sessions.
Convenience: Easily pause and resume work without losing any progress.
Set the target host IP and detect its operating system.
Create the main working directory and its subdirectories.
Perform different types of NMAP scans to enumerate open ports and services.
Use tools like WhatWeb, Nikto, and Gobuster for web service enumeration.
Brute forces a selected protocol.
Create a custom password dictionary through a previous questionnaire.
Method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports.
Use tools like theHarvester, Spiderfoot, and FinalRecon for open source intelligence gathering.
Generate payloads and search for exploits using Searchsploit.
Display various cheat sheets for Linux commands, Windows commands, pivoting, and file transfer techniques.
Detect hash types and crack hashes using Hashcat.
Enumerate Active Directory.
Generate reverse shell commands for various programming languages and tools.
Manage a reverse shell and enter preset commands for different outputs.
Section for downloading tools like Socat, Chisel, Ligolo, WinPEAS, and LinPEAS in various versions.
Save the results of the enumeration and scanning to a report file.
Test_Report: https://github.com/Rannden-SHA/EnumeRannden/blob/main/report_test.pdf
Check for and install necessary dependencies for the script.
Save the current configuration and exit the script.
This project is licensed under the MIT License. See the LICENSE file for details.
🌟 Thank you for using EnumeRannden! Contributions and feedback are welcome. Feel free to fork this repository and submit pull requests.