Name | indraa JSON |
Version |
2.0
JSON |
| download |
home_page | https://github.com/R0X4R/indraa |
Summary | Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool. |
upload_time | 2024-12-09 11:06:36 |
maintainer | None |
docs_url | None |
author | Eshan Singh |
requires_python | >=3.6 |
license | MIT |
keywords |
|
VCS |
 |
bugtrack_url |
|
requirements |
No requirements were recorded.
|
Travis-CI |
No Travis.
|
coveralls test coverage |
No coveralls.
|
<p align="center"><img src="https://github.com/R0X4R/indraa/blob/main/public/logo.png?raw=true" width="60%" height="100%" alt="Logo"/></p>
---
<p align="center">
Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
</p>
## Features
- Rapid port scanning using multiple techniques
- Integration with Shodan's InternetDB for quick results
- Fallback to Python-based scanning when InternetDB data is unavailable
- Nmap verification for enhanced accuracy
- Multiple output formats: text, JSON, and port-only
- Technology detection using Wappalyzer
- Basic vulnerability information (when available from InternetDB)
## Installation
To install `Indraa`, follow these steps:
```bash
pip install indraa
```
```bash
pip install requests json socket Wappalyzer
```
### <br>indraa.py -h <br><br>
```css
python3 indraa.py -h
Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
USAGE:
indraa [flags]
POSITIONAL ARGUMENTS:
target The target domain, IP address, or CIDR range to scan
FLAGS:
-p, --ports string Ports to scan (e.g. 22,80,443 or 21-30)
-oX, --output-xml Output scan in XML format
-oJ, --output-json Output scan in JSON format
-oN, --output-normal Output scan in normal text format
-oP, --output-port-only Output only IP and port in format ip:port
-iL, --input-list string Input from list of hosts/networks
-h, --help Show this help message and exit
```
## Usage
To use `Indraa`, run the following command:
```python
python3 indraa.py 1.1.1.1
Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for 1.1.1.1
Host is up
Ports found: 53, 80, 443, 2082, 2083, 2086, 2087, 8443, 8880
PORT STATE SERVICE VERSION TECHNOLOGIES
53/tcp open domain unknown unknown
80/tcp open http unknown Cloudflare
443/tcp open https unknown Cloudflare
2082/tcp open infowave unknown Cloudflare
2083/tcp open http unknown Cloudflare
2086/tcp open gnunet unknown Cloudflare
2087/tcp open http unknown Cloudflare
8443/tcp open https-alt unknown Cloudflare
8880/tcp open cddbp-alt unknown Cloudflare
Scan completed in 63.36 seconds
```
### If your host has some vulnerability
```
python3 indraa.py hide.ip.add.res
Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up
Ports found: 80
PORT STATE SERVICE VERSION TECHNOLOGIES
80/tcp open http 1.19.0 unknown
Vulnerabilities:
- CVE-2021-23017
- CVE-2023-44487
- CVE-2021-3618
```
### To get output in json
```python
python3 indraa.py hide.ip.add.ress -oJ
Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up
{
"host": {
"status": "up",
"address": "hide.ip.add.ress"
},
"ports": [
{
"port": "80",
"state": "open",
"service": "http",
"version": "1.19.0",
"technologies": [
"unknown"
]
}
],
"start_time": "2024-00-00 00:00:00",
"target": "hide.ip.add.ress",
"host_status": "up",
"duration": "33.25",
"vulnerabilities": [
"CVE-2021-23017",
"CVE-2023-44487",
"CVE-2021-3618"
]
}
```
## Additional Usage Examples
### Scanning Multiple Targets
You can scan multiple targets by providing a list of hosts or networks:
```bash
python3 indraa.py -iL targets.txt
```
Where `targets.txt` contains a list of IP addresses or domain names.
### Scanning from Standard Input
You can also provide input directly from the command line:
```bash
echo hi.de.ip.ad | python3 indraa.py
```
### Specifying Ports to Scan
To scan specific ports, use the `-p` flag:
```bash
python3 indraa.py 1.1.1.1 -p 22,80,443
```
### Output Formats
indraa supports multiple output formats. Here are some examples:
- **XML Format**:
```bash
python3 indraa.py 1.1.1.1 -oX
```
- **JSON Format**:
```bash
python3 indraa.py 1.1.1.1 -oJ
```
- **Normal Text Format**:
```bash
python3 indraa.py 1.1.1.1 -oN
```
- **Port-Only Format**:
```bash
python3 indraa.py 1.1.1.1 -oP
```
<br>
## License
This project is licensed under the MIT License. To view a copy of this license, visit [https://opensource.org/licenses/MIT](https://opensource.org/licenses/MIT).
The MIT License is a permissive free software license that allows users to do almost anything they want with the project, such as making and distributing closed-source versions. It also provides an express grant of patent rights from contributors to users. However, it also comes with a limitation of liability and warranty disclaimer, meaning the software is provided "as is" without any guarantees.
Raw data
{
"_id": null,
"home_page": "https://github.com/R0X4R/indraa",
"name": "indraa",
"maintainer": null,
"docs_url": null,
"requires_python": ">=3.6",
"maintainer_email": null,
"keywords": null,
"author": "Eshan Singh",
"author_email": "r0x4r@yahoo.com",
"download_url": "https://files.pythonhosted.org/packages/d5/dc/48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40/indraa-2.0.tar.gz",
"platform": null,
"description": "<p align=\"center\"><img src=\"https://github.com/R0X4R/indraa/blob/main/public/logo.png?raw=true\" width=\"60%\" height=\"100%\" alt=\"Logo\"/></p>\n\n---\n\n<p align=\"center\">\nIndraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.\n</p>\n\n## Features\n\n- Rapid port scanning using multiple techniques\n- Integration with Shodan's InternetDB for quick results\n- Fallback to Python-based scanning when InternetDB data is unavailable\n- Nmap verification for enhanced accuracy\n- Multiple output formats: text, JSON, and port-only\n- Technology detection using Wappalyzer\n- Basic vulnerability information (when available from InternetDB)\n\n## Installation\n\nTo install `Indraa`, follow these steps:\n\n```bash\npip install indraa\n```\n\n```bash\npip install requests json socket Wappalyzer\n```\n\n### <br>indraa.py -h <br><br>\n\n```css\npython3 indraa.py -h\n\nIndraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.\n\nUSAGE:\n\n indraa [flags]\n\nPOSITIONAL ARGUMENTS:\n\n target The target domain, IP address, or CIDR range to scan\n\nFLAGS:\n -p, --ports string Ports to scan (e.g. 22,80,443 or 21-30)\n -oX, --output-xml Output scan in XML format\n -oJ, --output-json Output scan in JSON format\n -oN, --output-normal Output scan in normal text format\n -oP, --output-port-only Output only IP and port in format ip:port\n -iL, --input-list string Input from list of hosts/networks\n -h, --help Show this help message and exit\n\n```\n\n## Usage\n\nTo use `Indraa`, run the following command:\n\n```python\npython3 indraa.py 1.1.1.1\n\nStarting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00\nindraa scan report for 1.1.1.1\nHost is up\n\nPorts found: 53, 80, 443, 2082, 2083, 2086, 2087, 8443, 8880\n\nPORT STATE SERVICE VERSION TECHNOLOGIES\n\n53/tcp open domain unknown unknown\n80/tcp open http unknown Cloudflare\n443/tcp open https unknown Cloudflare\n2082/tcp open infowave unknown Cloudflare\n2083/tcp open http unknown Cloudflare\n2086/tcp open gnunet unknown Cloudflare\n2087/tcp open http unknown Cloudflare\n8443/tcp open https-alt unknown Cloudflare\n8880/tcp open cddbp-alt unknown Cloudflare\n\nScan completed in 63.36 seconds\n```\n\n### If your host has some vulnerability\n\n```\npython3 indraa.py hide.ip.add.res\n\nStarting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00\nindraa scan report for hide.ip.add.ress\nHost is up\n\nPorts found: 80\n\nPORT STATE SERVICE VERSION TECHNOLOGIES\n80/tcp open http 1.19.0 unknown\n\n\nVulnerabilities:\n- CVE-2021-23017\n- CVE-2023-44487\n- CVE-2021-3618\n```\n\n### To get output in json\n\n```python\npython3 indraa.py hide.ip.add.ress -oJ\n\nStarting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00\nindraa scan report for hide.ip.add.ress\nHost is up\n\n{\n \"host\": {\n \"status\": \"up\",\n \"address\": \"hide.ip.add.ress\"\n },\n \"ports\": [\n {\n \"port\": \"80\",\n \"state\": \"open\",\n \"service\": \"http\",\n \"version\": \"1.19.0\",\n \"technologies\": [\n \"unknown\"\n ]\n }\n ],\n \"start_time\": \"2024-00-00 00:00:00\",\n \"target\": \"hide.ip.add.ress\",\n \"host_status\": \"up\",\n \"duration\": \"33.25\",\n \"vulnerabilities\": [\n \"CVE-2021-23017\",\n \"CVE-2023-44487\",\n \"CVE-2021-3618\"\n ]\n}\n```\n\n## Additional Usage Examples\n\n### Scanning Multiple Targets\n\nYou can scan multiple targets by providing a list of hosts or networks:\n\n```bash\npython3 indraa.py -iL targets.txt\n```\n\nWhere `targets.txt` contains a list of IP addresses or domain names.\n\n### Scanning from Standard Input\n\nYou can also provide input directly from the command line:\n\n```bash\necho hi.de.ip.ad | python3 indraa.py\n```\n\n### Specifying Ports to Scan\n\nTo scan specific ports, use the `-p` flag:\n\n```bash\npython3 indraa.py 1.1.1.1 -p 22,80,443\n```\n\n### Output Formats\n\nindraa supports multiple output formats. Here are some examples:\n\n- **XML Format**:\n ```bash\n python3 indraa.py 1.1.1.1 -oX\n ```\n\n- **JSON Format**:\n ```bash\n python3 indraa.py 1.1.1.1 -oJ\n ```\n\n- **Normal Text Format**:\n ```bash\n python3 indraa.py 1.1.1.1 -oN\n ```\n\n- **Port-Only Format**:\n ```bash\n python3 indraa.py 1.1.1.1 -oP\n ```\n\n<br>\n\n## License\n\nThis project is licensed under the MIT License. To view a copy of this license, visit [https://opensource.org/licenses/MIT](https://opensource.org/licenses/MIT).\n\nThe MIT License is a permissive free software license that allows users to do almost anything they want with the project, such as making and distributing closed-source versions. It also provides an express grant of patent rights from contributors to users. However, it also comes with a limitation of liability and warranty disclaimer, meaning the software is provided \"as is\" without any guarantees.\n\n\n",
"bugtrack_url": null,
"license": "MIT",
"summary": "Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.",
"version": "2.0",
"project_urls": {
"Homepage": "https://github.com/R0X4R/indraa"
},
"split_keywords": [],
"urls": [
{
"comment_text": "",
"digests": {
"blake2b_256": "bb21ec355300b49a92eab79df9cf30f8f3a34458fb6d4bb0b5290dd9e6fa96c6",
"md5": "40ac71c52c088c31b9e9a293fc6b02a3",
"sha256": "71e5c11483a1101ed3470759de6127f0b9011e12067490734ccd348867c61053"
},
"downloads": -1,
"filename": "indraa-2.0-py3-none-any.whl",
"has_sig": false,
"md5_digest": "40ac71c52c088c31b9e9a293fc6b02a3",
"packagetype": "bdist_wheel",
"python_version": "py3",
"requires_python": ">=3.6",
"size": 8553,
"upload_time": "2024-12-09T11:06:35",
"upload_time_iso_8601": "2024-12-09T11:06:35.027757Z",
"url": "https://files.pythonhosted.org/packages/bb/21/ec355300b49a92eab79df9cf30f8f3a34458fb6d4bb0b5290dd9e6fa96c6/indraa-2.0-py3-none-any.whl",
"yanked": false,
"yanked_reason": null
},
{
"comment_text": "",
"digests": {
"blake2b_256": "d5dc48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40",
"md5": "1b6bb6080b51111472c91a495e667fc3",
"sha256": "911ec5699651dcd862561034b6c39bbd39c19d4e6933b7a05c95e4382b7ef037"
},
"downloads": -1,
"filename": "indraa-2.0.tar.gz",
"has_sig": false,
"md5_digest": "1b6bb6080b51111472c91a495e667fc3",
"packagetype": "sdist",
"python_version": "source",
"requires_python": ">=3.6",
"size": 9017,
"upload_time": "2024-12-09T11:06:36",
"upload_time_iso_8601": "2024-12-09T11:06:36.514825Z",
"url": "https://files.pythonhosted.org/packages/d5/dc/48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40/indraa-2.0.tar.gz",
"yanked": false,
"yanked_reason": null
}
],
"upload_time": "2024-12-09 11:06:36",
"github": true,
"gitlab": false,
"bitbucket": false,
"codeberg": false,
"github_user": "R0X4R",
"github_project": "indraa",
"travis_ci": false,
"coveralls": false,
"github_actions": false,
"lcname": "indraa"
}