indraa


Nameindraa JSON
Version 2.0 PyPI version JSON
download
home_pagehttps://github.com/R0X4R/indraa
SummaryIndraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
upload_time2024-12-09 11:06:36
maintainerNone
docs_urlNone
authorEshan Singh
requires_python>=3.6
licenseMIT
keywords
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            <p align="center"><img src="https://github.com/R0X4R/indraa/blob/main/public/logo.png?raw=true" width="60%" height="100%" alt="Logo"/></p>

---

<p align="center">
Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
</p>

## Features

- Rapid port scanning using multiple techniques
- Integration with Shodan's InternetDB for quick results
- Fallback to Python-based scanning when InternetDB data is unavailable
- Nmap verification for enhanced accuracy
- Multiple output formats: text, JSON, and port-only
- Technology detection using Wappalyzer
- Basic vulnerability information (when available from InternetDB)

## Installation

To install `Indraa`, follow these steps:

```bash
pip install indraa
```

```bash
pip install requests json socket Wappalyzer
```

### <br>indraa.py -h <br><br>

```css
python3 indraa.py -h

Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.

USAGE:

    indraa [flags]

POSITIONAL ARGUMENTS:

    target                The target domain, IP address, or CIDR range to scan

FLAGS:
    -p, --ports             string    Ports to scan (e.g. 22,80,443 or 21-30)
    -oX, --output-xml                 Output scan in XML format
    -oJ, --output-json                Output scan in JSON format
    -oN, --output-normal              Output scan in normal text format
    -oP, --output-port-only           Output only IP and port in format ip:port
    -iL, --input-list       string    Input from list of hosts/networks
    -h, --help                        Show this help message and exit

```

## Usage

To use `Indraa`, run the following command:

```python
python3 indraa.py 1.1.1.1

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa  scan report for 1.1.1.1
Host is up

Ports found: 53, 80, 443, 2082, 2083, 2086, 2087, 8443, 8880

PORT      STATE  SERVICE      VERSION      TECHNOLOGIES

53/tcp    open   domain       unknown      unknown
80/tcp    open   http         unknown      Cloudflare
443/tcp   open   https        unknown      Cloudflare
2082/tcp  open   infowave     unknown      Cloudflare
2083/tcp  open   http         unknown      Cloudflare
2086/tcp  open   gnunet       unknown      Cloudflare
2087/tcp  open   http         unknown      Cloudflare
8443/tcp  open   https-alt    unknown      Cloudflare
8880/tcp  open   cddbp-alt    unknown      Cloudflare

Scan completed in 63.36 seconds
```

### If your host has some vulnerability

```
python3 indraa.py hide.ip.add.res

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up

Ports found: 80

PORT      STATE  SERVICE      VERSION      TECHNOLOGIES
80/tcp    open   http         1.19.0       unknown


Vulnerabilities:
- CVE-2021-23017
- CVE-2023-44487
- CVE-2021-3618
```

### To get output in json

```python
python3 indraa.py hide.ip.add.ress -oJ

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up

{
    "host": {
        "status": "up",
        "address": "hide.ip.add.ress"
    },
    "ports": [
        {
            "port": "80",
            "state": "open",
            "service": "http",
            "version": "1.19.0",
            "technologies": [
                "unknown"
            ]
        }
    ],
    "start_time": "2024-00-00 00:00:00",
    "target": "hide.ip.add.ress",
    "host_status": "up",
    "duration": "33.25",
    "vulnerabilities": [
        "CVE-2021-23017",
        "CVE-2023-44487",
        "CVE-2021-3618"
    ]
}
```

## Additional Usage Examples

### Scanning Multiple Targets

You can scan multiple targets by providing a list of hosts or networks:

```bash
python3 indraa.py -iL targets.txt
```

Where `targets.txt` contains a list of IP addresses or domain names.

### Scanning from Standard Input

You can also provide input directly from the command line:

```bash
echo hi.de.ip.ad | python3 indraa.py
```

### Specifying Ports to Scan

To scan specific ports, use the `-p` flag:

```bash
python3 indraa.py 1.1.1.1 -p 22,80,443
```

### Output Formats

indraa supports multiple output formats. Here are some examples:

- **XML Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oX
    ```

- **JSON Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oJ
    ```

- **Normal Text Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oN
    ```

- **Port-Only Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oP
    ```

<br>

## License

This project is licensed under the MIT License. To view a copy of this license, visit [https://opensource.org/licenses/MIT](https://opensource.org/licenses/MIT).

The MIT License is a permissive free software license that allows users to do almost anything they want with the project, such as making and distributing closed-source versions. It also provides an express grant of patent rights from contributors to users. However, it also comes with a limitation of liability and warranty disclaimer, meaning the software is provided "as is" without any guarantees.



            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/R0X4R/indraa",
    "name": "indraa",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.6",
    "maintainer_email": null,
    "keywords": null,
    "author": "Eshan Singh",
    "author_email": "r0x4r@yahoo.com",
    "download_url": "https://files.pythonhosted.org/packages/d5/dc/48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40/indraa-2.0.tar.gz",
    "platform": null,
    "description": "<p align=\"center\"><img src=\"https://github.com/R0X4R/indraa/blob/main/public/logo.png?raw=true\" width=\"60%\" height=\"100%\" alt=\"Logo\"/></p>\n\n---\n\n<p align=\"center\">\nIndraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.\n</p>\n\n## Features\n\n- Rapid port scanning using multiple techniques\n- Integration with Shodan's InternetDB for quick results\n- Fallback to Python-based scanning when InternetDB data is unavailable\n- Nmap verification for enhanced accuracy\n- Multiple output formats: text, JSON, and port-only\n- Technology detection using Wappalyzer\n- Basic vulnerability information (when available from InternetDB)\n\n## Installation\n\nTo install `Indraa`, follow these steps:\n\n```bash\npip install indraa\n```\n\n```bash\npip install requests json socket Wappalyzer\n```\n\n### <br>indraa.py -h <br><br>\n\n```css\npython3 indraa.py -h\n\nIndraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.\n\nUSAGE:\n\n    indraa [flags]\n\nPOSITIONAL ARGUMENTS:\n\n    target                The target domain, IP address, or CIDR range to scan\n\nFLAGS:\n    -p, --ports             string    Ports to scan (e.g. 22,80,443 or 21-30)\n    -oX, --output-xml                 Output scan in XML format\n    -oJ, --output-json                Output scan in JSON format\n    -oN, --output-normal              Output scan in normal text format\n    -oP, --output-port-only           Output only IP and port in format ip:port\n    -iL, --input-list       string    Input from list of hosts/networks\n    -h, --help                        Show this help message and exit\n\n```\n\n## Usage\n\nTo use `Indraa`, run the following command:\n\n```python\npython3 indraa.py 1.1.1.1\n\nStarting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00\nindraa  scan report for 1.1.1.1\nHost is up\n\nPorts found: 53, 80, 443, 2082, 2083, 2086, 2087, 8443, 8880\n\nPORT      STATE  SERVICE      VERSION      TECHNOLOGIES\n\n53/tcp    open   domain       unknown      unknown\n80/tcp    open   http         unknown      Cloudflare\n443/tcp   open   https        unknown      Cloudflare\n2082/tcp  open   infowave     unknown      Cloudflare\n2083/tcp  open   http         unknown      Cloudflare\n2086/tcp  open   gnunet       unknown      Cloudflare\n2087/tcp  open   http         unknown      Cloudflare\n8443/tcp  open   https-alt    unknown      Cloudflare\n8880/tcp  open   cddbp-alt    unknown      Cloudflare\n\nScan completed in 63.36 seconds\n```\n\n### If your host has some vulnerability\n\n```\npython3 indraa.py hide.ip.add.res\n\nStarting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00\nindraa scan report for hide.ip.add.ress\nHost is up\n\nPorts found: 80\n\nPORT      STATE  SERVICE      VERSION      TECHNOLOGIES\n80/tcp    open   http         1.19.0       unknown\n\n\nVulnerabilities:\n- CVE-2021-23017\n- CVE-2023-44487\n- CVE-2021-3618\n```\n\n### To get output in json\n\n```python\npython3 indraa.py hide.ip.add.ress -oJ\n\nStarting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00\nindraa scan report for hide.ip.add.ress\nHost is up\n\n{\n    \"host\": {\n        \"status\": \"up\",\n        \"address\": \"hide.ip.add.ress\"\n    },\n    \"ports\": [\n        {\n            \"port\": \"80\",\n            \"state\": \"open\",\n            \"service\": \"http\",\n            \"version\": \"1.19.0\",\n            \"technologies\": [\n                \"unknown\"\n            ]\n        }\n    ],\n    \"start_time\": \"2024-00-00 00:00:00\",\n    \"target\": \"hide.ip.add.ress\",\n    \"host_status\": \"up\",\n    \"duration\": \"33.25\",\n    \"vulnerabilities\": [\n        \"CVE-2021-23017\",\n        \"CVE-2023-44487\",\n        \"CVE-2021-3618\"\n    ]\n}\n```\n\n## Additional Usage Examples\n\n### Scanning Multiple Targets\n\nYou can scan multiple targets by providing a list of hosts or networks:\n\n```bash\npython3 indraa.py -iL targets.txt\n```\n\nWhere `targets.txt` contains a list of IP addresses or domain names.\n\n### Scanning from Standard Input\n\nYou can also provide input directly from the command line:\n\n```bash\necho hi.de.ip.ad | python3 indraa.py\n```\n\n### Specifying Ports to Scan\n\nTo scan specific ports, use the `-p` flag:\n\n```bash\npython3 indraa.py 1.1.1.1 -p 22,80,443\n```\n\n### Output Formats\n\nindraa supports multiple output formats. Here are some examples:\n\n- **XML Format**:\n    ```bash\n    python3 indraa.py 1.1.1.1 -oX\n    ```\n\n- **JSON Format**:\n    ```bash\n    python3 indraa.py 1.1.1.1 -oJ\n    ```\n\n- **Normal Text Format**:\n    ```bash\n    python3 indraa.py 1.1.1.1 -oN\n    ```\n\n- **Port-Only Format**:\n    ```bash\n    python3 indraa.py 1.1.1.1 -oP\n    ```\n\n<br>\n\n## License\n\nThis project is licensed under the MIT License. To view a copy of this license, visit [https://opensource.org/licenses/MIT](https://opensource.org/licenses/MIT).\n\nThe MIT License is a permissive free software license that allows users to do almost anything they want with the project, such as making and distributing closed-source versions. It also provides an express grant of patent rights from contributors to users. However, it also comes with a limitation of liability and warranty disclaimer, meaning the software is provided \"as is\" without any guarantees.\n\n\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.",
    "version": "2.0",
    "project_urls": {
        "Homepage": "https://github.com/R0X4R/indraa"
    },
    "split_keywords": [],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "bb21ec355300b49a92eab79df9cf30f8f3a34458fb6d4bb0b5290dd9e6fa96c6",
                "md5": "40ac71c52c088c31b9e9a293fc6b02a3",
                "sha256": "71e5c11483a1101ed3470759de6127f0b9011e12067490734ccd348867c61053"
            },
            "downloads": -1,
            "filename": "indraa-2.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "40ac71c52c088c31b9e9a293fc6b02a3",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.6",
            "size": 8553,
            "upload_time": "2024-12-09T11:06:35",
            "upload_time_iso_8601": "2024-12-09T11:06:35.027757Z",
            "url": "https://files.pythonhosted.org/packages/bb/21/ec355300b49a92eab79df9cf30f8f3a34458fb6d4bb0b5290dd9e6fa96c6/indraa-2.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "d5dc48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40",
                "md5": "1b6bb6080b51111472c91a495e667fc3",
                "sha256": "911ec5699651dcd862561034b6c39bbd39c19d4e6933b7a05c95e4382b7ef037"
            },
            "downloads": -1,
            "filename": "indraa-2.0.tar.gz",
            "has_sig": false,
            "md5_digest": "1b6bb6080b51111472c91a495e667fc3",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.6",
            "size": 9017,
            "upload_time": "2024-12-09T11:06:36",
            "upload_time_iso_8601": "2024-12-09T11:06:36.514825Z",
            "url": "https://files.pythonhosted.org/packages/d5/dc/48f9d64481729d1b695e3fe162d17de578319f70cd6539e8fe20c48b3c40/indraa-2.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-12-09 11:06:36",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "R0X4R",
    "github_project": "indraa",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "indraa"
}
        
Elapsed time: 0.31296s