Skip to content

j0rago/TIDoS-Framework

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Python TIDoS Supported OS License Build Modules Status Stage

TIDoS Framework

TIDoS Framework is a comprehensive web application audit framework. let's keep this simple

Highlights :-

The main highlights of this framework is:

  • Basic first release (but huge).
  • Has 4 main phases, subdivided into 13 sub-phases containing total of 95 modules.
  • Reconnaissance Phase has 36 modules of its own (including active and passive recon, information disclosure modules).
  • Scanning & Enumeration Phase has got 26 modules (including port scans, WAF analysis, etc)
  • Vulnerability Analysis Phase has 32 modules (including most common vulnerabilites in action.
  • Exploits Castle has only 1 exploit. (purely developemental)
  • All four phases each have a Auto-Awesome module which automates every module for you.
  • You just need the domain, and leave everything is to this tool.
  • TIDoS has full verbose out support, so you'll know whats going on.
  • Fully user friendly interaction environment. (no shits)

Installing TIDoS :-

  • Clone the repository locally and navigate there:
git clone https://github.com/theinfecteddrake/tidos-framework.git
cd tidos-framework
  • Install the dependencies:
chmod +x install
./install

Thats it! Now you are good to go! Now lets run the tool:

tidos

Usage :-

TIDoS is made to be comprehensive. It is a highly flexible framework where you just have to select and use modules.

As the framework opens up, enter the website name eg. http://www.example.com and let TIDoS lead you. Thats it! Its as easy as that.

Recommended:

  • Follow the order of the tool (Run in a schematic way).

    Reconnaissance ➣ Scanning & Enumeration ➣ Vulnerability Analysis

To update this tool, use tidos_updater.py module under tools/ folder.

Flawless Features :-

TIDoS Framework presently supports the following:

  • Reconnaissance + OSINT

    • Passive Reconnaissance:

      • Nping Enumeration Via external APi
      • WhoIS Lookup Domain info gathering
      • GeoIP Lookup Pinpoint physical location
      • DNS Configuration Lookup DNSDump
      • Subdomains Lookup Indexed ones
      • Reverse DNS Configuration Lookup
      • Reverse IP Lookup Hosts on same server
      • Domain IP History IP Instances
      • Web Links Gatherer Indexed ones
      • Google Search Manual search
      • Google Dorking (multiple modules) Automated
      • Email to Domain Resolver Email WhoIs
      • Wayback Machine Lookups Find Backups
      • Breached Email Check Pwned Email Accounts
      • Enumeration via Google Groups
      • Check Alias Availability Social Networks
      • Find PasteBin Posts Domain Based
      • LinkedIn Gathering Employees & Company
      • Threat Intelligence Gathering Bad IPs
    • Active Reconnaissance

      • Ping enumeration Advanced
      • CMS Detection (185+ CMSs supported) IMPROVED
      • Advanced Traceroute IMPROVED
      • Grab HTTP Headers Live Capture
      • Find HTTP Methods Allowed NEW
      • Detect Server IMPROVED
      • Examine SSL Certificate Absolute
      • robots.txt and sitemap.xml Checker
      • Subnets Enumeration Class Based
      • Find Shared DNS Hosts Name Server Based
      • Operating System Fingerprinting IMPROVED
    • Information Disclosure

      • Credit Cards Disclosure If Plaintext
      • Email Harvester IMPROVED
      • Fatal Errors Enumeration Includes Full Path Disclosure
      • Internal IP Disclosure Signature Based
      • Phone Number Havester Signature Based
      • Social Security Number Harvester US Ones
  • Scanning & Enumeration

    • Remote Server WAF Analysis
    • Port Scanning Ingenious Modules
      • Simple Port Scanner via Socket Connections
      • TCP SYN Scan Highly reliable
      • TCP Connect Scan Highly Reliable
      • XMAS Flag Scan Reliable Only in LANs
      • Fin Flag Scan Reliable Only in LANs
      • Port Service Detector
    • Web Technology Enumeration Absolute
    • Interactive Scanning with NMap 16 preloaded modules
    • Crawlers
      • Depth 1
      • Depth 2 IMPROVED
  • Vulnerability Analysis

    Web-Bugs & Server Misconfigurations

    • Insecure CORS Absolute
    • Same-Site Scripting Sub-domain based
    • Zone Transfer DNS Server based
    • Clickjacking Framable response based
    • Security on Cookies HTTPOnly/Secure Flags
    • Cloudflare Misconfiguration Check + Getting Real IP
    • HTTP High Transport Security Usage
    • Spoofable Email Missing SPF and DMARC Records
    • Security Headers Analysis Live Capture
    • Cross-Site Tracing Port Based
    • Network Security Misconfig. Telnet Enabled

    Serious Web Vulnerabilities

    • File Intrusions
      • Local File Intrusion (LFI) Param based
      • Remote File Inclusion (RFI)
        • Parameter Based
      • Pre-loaded Path Based
    • OS Command Injection Linux & Windows (RCE)
    • Path Traversal (Sensitive Paths)
    • Cross-Site Request Forgery Absolute
    • SQL Injection
      • Cookie Value Based
      • Referer Value Based
      • User-Agent Value Based
      • Auto-gathering IMPROVED
      • Parameter Based Manual
    • LDAP Injection Parameter Based
    • Host Header Injection port based
    • Bash Command Injection Shellshock
    • Cross-Site Scripting beta
      • Cookie Value Based
      • Referer Value Based
      • User-Agent Value Based
      • Parameter Value Based Manual
    • Unvalidated URL Forwards Open Redirect
    • CRLF Injection and HTTP Response Splitting
      • User-Agent Value Based
      • Parameter value Based Manual

    Auxillaries

    • Protocol Credential Bruteforce

      • FTP Protocol Bruteforce
      • SSH Protocol Bruteforce
      • POP 2/3 Protocol Bruteforce
      • SQL Protocol Bruteforce
      • XMPP Protocol Bruteforce
      • SMTP Protocol Bruteforce
      • TELNET Protocol Bruteforce
    • String & Payload Encoder

      • URL Character Encoding
      • Base64 Character Encoding
      • HTML Character Encoding
      • Plain ASCII Character Encoding
      • Hex Character Encoding
      • Octal Character Encoding
      • Binary Character Encoding
      • GZip Character Encoding
  • Exploitation purely developmental

    • ShellShock

TIDoS In Action:

Upcoming:

There are some bruteforce modules to be added:

  • Common Backups Locations
  • Common Password Locations
  • Common Dot files (eg. .htaccess)
  • Interesting Directories
  • Interesting Filepaths
  • Lots more of OSINT

Known Bugs:

This version of TIDoS is purely developmental and is presently stable. There are bugs in resolving the [99] Back at various end-points which results in blind fall-backs. Though I have added global exception handling, still, there maybe bugs out there. Also TIDoS needs to develop more on logging all info displayed on the screen (help needed).

Final Words:

Put this project on a watch, since it is updated frequently (you can take a look at past commits history). This project is one of the best frameworks I have ever built and I would really like your constructive criticism, suggestions and help in converting this project into the best web penetration testing framework ever built and trust me, it will be ;).

Thank you,

@_tID | CodeSploit

About

A comprehensive web-app audit framework.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 93.2%
  • XSLT 2.3%
  • HTML 1.5%
  • C 1.0%
  • C++ 0.5%
  • TeX 0.5%
  • Other 1.0%