Git Product home page Git Product logo

0xinfection / tidos-framework Goto Github PK

View Code? Open in Web Editor NEW
1.8K 124.0 390.0 23.29 MB

The Offensive Manual Web Application Penetration Testing Framework.

License: GNU General Public License v3.0

Python 99.58% HTML 0.02% Dockerfile 0.11% Roff 0.30% Hack 0.01%
web-penetration-testing reconnaissance vulnerability-analysis scanning-enumeration web-fuzzer osint vulnerability-detection footprinting intelligence-gathering exploitation

tidos-framework's Introduction


TIDoS


The Offensive Web Application Penetration Testing Framework.

IMPORTANT:

The new Qt5 interface is complete, but has additional dependencies. Take a look at the updated installation instructions.

Highlights :-

Here is some light on what the framework is all about:

  • A complete versatile framework to cover up everything from Reconnaissance to Vulnerability Analysis.
  • Has 5 main phases, subdivided into 14 sub-phases consisting a total of 108 modules.
  • Reconnaissance Phase has 50 modules of its own (including active and passive recon, information disclosure modules).
  • Scanning & Enumeration Phase has got 16 modules (including port scans, WAF analysis, etc)
  • Vulnerability Analysis Phase has 37 modules (including most common vulnerabilities in action).
  • Exploits Castle has only 1 exploit. (purely developmental)
  • And finally, Auxiliaries have got 4 modules. more under development
  • All four phases each have an Auto-Awesome module which automates every module for you.
  • huge performance boost through multiprocessing
  • Piping Attacks through Tor (not implemented everywhere yet)
  • You just need the domain, and leave everything is to this tool.
  • TIDoS has full verbose out support, so you'll know whats going on.
  • Attacking now even easier with a new GUI

Main new features

  • the programming language: TIDoS is fully ported to Python3
  • the interface: TIDoS presents a new, Metasploit-like console interface
  • Parallelisation: TIDoS uses multiprocessing to speed up attacks
  • An alternative CLI interface for faster interaction with one specific module
  • Anonymity: Attacking through Tor is possible (95% done)
  • Module Completion: Some modules have been feature-extended (e.g. more evasion, supporting more than 1 query parameter)
  • Some new modules: arpscan
  • A Graphical User Interface for easier interaction with the toolkit
  • Supports non-default http(s) ports

Upcoming

  • results of modules will be stored in a database
  • new modules: nikto&photon

Installation :-

Installation Script (Globally) :

To install the framework globally in /opt, run the provided core/install.py script as root. After this, you can launch TIDoS simply by typing tidos on the command line.

Manual Installation (Locally) :

  • Clone the repository locally and navigate there:
git clone https://github.com/0xinfection/tidos-framework.git
cd tidos-framework

TIDoS needs some libraries to run, which can be installed via aptitude or dnf Package Managers.

sudo apt-get install libncurses5 libxml2 nmap tcpdump libexiv2-dev build-essential python3-pip libmariadbclient18 libmysqlclient-dev tor konsole

Now after these dependencies are finished installing, we need to install the remaining Python Package dependencies, hence run:

pip3 install -r requirements.txt

TIDoS uses Vailyn to scan for path traversals in a new, improved path traversal module. If you want to use that module, head to https://github.com/VainlyStrain/Vailyn, and follow the installation instructions there.

Thats it. You now have TIDoS at your service. Fire it up using:

python3 tidv2               #Qt5 interface
sudo python3 tidconsole.py  #console interface

Docker image :

You can build it from Dockerfile :

git clone https://github.com/0xinfection/tidos-framework.git
cd tidos-framework/core/docker
docker build -t tidos .

To run TIDoS :

docker run --interactive --tty --rm tidos bash
tidos

Update: TIDoS is now available on Docker Hub. Install and run the container like this:

docker run -it vainlystrain/tidos-framework

Updating TIDoS :

To get the current version of TIDoS, move into the installation folder and perform (sudo) git pull #sudo if installed by install.py. Alternatively, you can run the fetch command in tidconsole.

Getting Started :-

To get started, you need to set your own API KEYS for various OSINT & Scanning and Enumeration purposes. To do so, open up API_KEYS.py under files/ directory and set your own keys and access tokens for SHODAN, CENSYS, FULL CONTACT, GOOGLE and WHATCMS.

GOOD NEWS:

The latest release of TIDoS includes all API KEYS and ACCESS TOKENS for SHODAN, CENSYS, FULL CONTACT, GOOGLE and WHATCMS by default. I found these tokens on various repositories on GitHub itself. You can now use all the modules which use the API KEYS. :)

Commands :-

__                                                    __                                                        
 !  attack    Attack specified target(s)              M
 :  clear     Clear terminal.                         :
 V  creds     Handle target credentials.              
 :  fetch     Check for and install updates.          :
 :  find      Search a module.                        :
    help      Show help message.                      :
    info      Show description of current module.     M
 :  intro     Display Intro.                          :
 :  leave     Leave module.                           M
    list      List all modules of a category.         :
 :  load      Load module.                            :
 :  netinfo   Show network information.               :
 :  opts      Show options of current module.         M
    phpsploit Load the phpsploit framework.           :
              (needs to be downloaded externally)
 :  processes Set number of processes in parallelis.  :
    q         Terminate TIDoS session.                :
 :  sessions  Interact with cached sessions.          :
 :  set       Set option value of module.             M
 :  tor       Pipe Attacks through the Tor Network.   :
    vicadd    Add Target to list.                     :
    vicdel    Delete Target from list.                :
    viclist   List all targets.                       :

  Avail. Cmds
    M needs loaded modvle
    V [! potentially] need loaded target(s)

Flawless Features :-

TIDoS presently supports the following: and more modules are under active development

  • Reconnaissance + OSINT

    • Passive Reconnaissance:

      • Nping Enumeration Via external APi
      • WhoIS Lookup Domain info gathering
      • GeoIP Lookup Pinpoint physical location
      • DNS Configuration Lookup DNSDump
      • Subdomains Lookup Indexed ones
      • Reverse DNS Lookup Host Instances
      • Reverse IP Lookup Hosts on same server
      • Subnets Enumeration Class Based
      • Domain IP History IP Instances
      • Web Links Gatherer Indexed ones
      • Google Search Manual search
      • Google Dorking (multiple modules) Automated
      • Email to Domain Resolver Email WhoIs
      • Wayback Machine Lookups Find Backups
      • Breached Email Check Pwned Email Accounts
      • Enumeration via Google Groups Emails Only
      • Check Alias Availability Social Networks
      • Find PasteBin Posts Domain Based
      • LinkedIn Gathering Employees & Company
      • Google Plus Gathering Domain Profiles
      • Public Contact Info Scraping FULL CONTACT
      • Censys Intel Gathering Domain Based
      • Threat Intelligence Gathering Bad IPs
    • Active Reconnaissance:

      • Ping Enumeration Advanced
      • CMS Detection (185+ CMSs supported) IMPROVED
      • Advanced Traceroute IMPROVED
      • robots.txt and sitemap.xml Checker
      • Grab HTTP Headers Live Capture
      • Find HTTP Methods Allowed via OPTIONS
      • Detect Server Type IMPROVED
      • Examine SSL Certificate Absolute
      • Apache Status Disclosure Checks File Based
      • WebDAV HTTP Enumeration PROFIND & SEARCH
      • PHPInfo File Enumeration via Bruteforce
      • Comments Scraper Regex Based
      • Find Shared DNS Hosts Name Server Based
      • Alternate Sites Discovery User-Agent Based
      • Discover Interesting Files via Bruteforce
        • Common Backdoor Locations shells, etc.
        • Common Backup Locations .bak, .db, etc.
        • Common Password Locations .pgp, .skr, etc.
        • Common Proxy Path Configs. .pac, etc.
        • Multiple Index Paths index, index1, etc.
        • Common Dot Files .htaccess, .apache, etc
        • Common Logfile Locations .log, .changelog, etc
    • Information Disclosure:

      • Credit Cards Disclosure If Plaintext
      • Email Harvester IMPROVED
      • Fatal Errors Enumeration Includes Full Path Disclosure
      • Internal IP Disclosure Signature Based
      • Phone Number Havester Signature Based
      • Social Security Number Harvester US Ones
  • Scanning & Enumeration

    • Remote Server WAF Enumeration Generic 54 WAFs
    • Port Scanning Ingenious Modules
      • Simple Port Scanner via Socket Connections
      • TCP SYN Scan Highly reliable
      • TCP Connect Scan Highly Reliable
      • XMAS Flag Scan Reliable Only in LANs
      • FIN Flag Scan Reliable Only in LANs
      • Port Service Detector
    • Web Technology Enumeration Absolute
    • Complete SSL Enumeration Absolute
    • Operating System Fingerprinting IMPROVED
    • Banner Grabbing of Services via Open Ports
    • Interactive Scanning with NMap 16 preloaded modules
    • Internet Wide Servers Scan Using CENSYS Database
    • Web and Links Crawlers
      • Depth 1 Indexed Uri Crawler
      • Depth 2 Single Page Crawler
      • Depth 3 Web Link Crawler
    • ARP Scanner NEW
  • Vulnerability Analysis

    Web-Bugs & Server Misconfigurations

    • Insecure CORS Absolute
    • Same-Site Scripting Sub-domain based
    • Zone Transfer DNS Server based
    • Clickjacking
      • Frame-Busting Checks
      • X-FRAME-OPTIONS Header Checks
    • Security on Cookies
      • HTTPOnly Flag
      • Secure Flag on Cookies
    • Cloudflare Misconfiguration Check
      • DNS Misconfiguration Checks
      • Online Database Lookup For Breaches
    • HTTP Strict Transport Security Usage
      • HTTPS Enabled but no HSTS
    • Domain Based Email Spoofing
      • Missing SPF Records
      • Missing DMARC Records
    • Host Header Injection
      • Port Based Web Socket Based
      • X-Forwarded-For Header Injection
    • Security Headers Analysis Live Capture
    • Cross-Site Tracing HTTP TRACE Method
    • Session Fixation via Cookie Injection
    • Network Security Misconfig.
      • Checks for TELNET Enabled via Port 23

    Serious Web Vulnerabilities

    • File Inclusions
      • Local File Inclusion (LFI) Param based
      • Remote File Inclusion (RFI) IMPROVED
        • Parameter Based
        • Pre-loaded Path Based
    • OS Command Injection Linux & Windows (RCE)
    • Path Traversal ENHANCED
    • Cross-Site Request Forgery Absolute
    • SQL Injection
      • Error Based Injection
        • Cookie Value Based
        • Referer Value Based
        • User-Agent Value Based
        • Auto-gathering IMPROVED
      • Blind Based Injection Crafted Payloads
        • Cookie Value Based
        • Referer Value Based
        • User-Agent Value Based
        • Auto-gathering IMPROVED
    • LDAP Injection Parameter Based
    • HTML Injection Parameter Based
    • Bash Command Injection ShellShock
    • Apache Struts Shock Apache RCE
    • XPATH Injection Parameter Based
    • Cross-Site Scripting IMPROVED
      • Cookie Value Based
      • Referer Value Based
      • User-Agent Value Based
      • Parameter Value Based Manual
    • Unvalidated URL Forwards Open Redirect
    • PHP Code Injection Windows + Linux RCE
    • CRLF Injection HTTP Response Splitting
      • User-Agent Value Based
      • Parameter value Based Manual
    • Sub-domain Takeover 50+ Services
      • Single Sub-domain Manual
      • All Subdomains Automated

    Other

    • PlainText Protocol Default Credential Bruteforce

      • FTP Protocol Bruteforce
      • SSH Protocol Bruteforce
      • POP 2/3 Protocol Bruteforce
      • SQL Protocol Bruteforce
      • (XMPP Protocol Bruteforce) BROKEN:DEP
      • SMTP Protocol Bruteforce
      • TELNET Protocol Bruteforce
  • Auxillary Modules

    • Hash Generator MD5, SHA1, SHA256, SHA512
    • String & Payload Encoder 7 Categories
    • Forensic Image Analysis Metadata Extraction
    • Web HoneyPot Probability ShodanLabs HoneyScore
  • Exploitation purely developmental

    • ShellShock

Other Tools:

  • net_info.py - Displays information about your network. Accessible from 'netinfo' command.

TIDoS In Action:

Lets see a demonstration of TIDoS in action:

asciicast

Version:

v2.0.1-5 [latest release] [#beta]

Disclaimer:

TIDoS is provided as an offensive web application audit framework. It has built-in modules which can reveal potential misconfigurations and vulnerabilties in web applications which could possibly be exploited maliciously.

THEREFORE, NEITHER THE AUTHOR NOR THE CONTRIBUTORS ARE RESPONSIBLE FOR ANY MISUSE OR DAMAGE DUE TO THIS TOOLKIT.

tidos-framework's People

Contributors

0xinfection avatar alexandernst avatar arkrwn avatar chillerdragon avatar elig0n avatar fire1ce avatar vainlystrain avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

tidos-framework's Issues

[Bug] => Some anomaly

First of all Hi and thanks for great work.
Second:
I saw when tidos have error handling a response reset and bring back to the menรน. Hard to analyze what the problem on the remote website. It happen to cookie automate xss test., but happened also in other modules and always when can't handle request.
Any hint?

[Invalid] => TIDoS on Win7 Python2

Hi mate,
thank you for your work!


[!] Gathering info...
[*] Checking your resources...
Traceback (most recent call last):
File "./install", line 19, in
install()
File "setup/install.py", line 28, in install
if os.geteuid() == 0:
AttributeError: 'module' object has no attribute 'geteuid'


Any help ? :)

[Possible Bug] => Site seems to be down

the first time using TIDoS it worked flawlessly and i had no issues whatsoever. then the second time i tried to use it, i put the web address in and it said that the "Site seems to be down". Again and again i tried to see if it would work but to no avail. i cant seem to figure this issue out.

[Bug] => ModuleNotFound libmariadbclient

following error while running tidos

root@kali:~/tidoS-framework# tidos
Traceback (most recent call last):
  File "/opt/tidos/tidos.py", line 14, in <module>
    from core.tidos_main import *
  File "/opt/tidos/core/tidos_main.py", line 37, in <module>
    from core.Vulnlysis.vuln import *
  File "/opt/tidos/core/Vulnlysis/vuln.py", line 17, in <module>
    from core.Vulnlysis.Oth_Bugs.othbugs import *
  File "/opt/tidos/core/Vulnlysis/Oth_Bugs/othbugs.py", line 22, in <module>
    from sqlbrute import *
  File "modules/0x03-Vulnerability+Analysis/0x03-OtherWebBugs/sqlbrute.py", line 12, in <module>
    import _mysql
  File "build/bdist.linux-x86_64/egg/_mysql.py", line 7, in <module>
  File "build/bdist.linux-x86_64/egg/_mysql.py", line 6, in __bootstrap__
ImportError: libmariadbclient.so.18: cannot open shared object file: No such file or directory

I have also tried with python3 tidos.py but following error received

Traceback (most recent call last):
  File "tidos.py", line 14, in <module>
    from core.tidos_main import *
  File "/root/tidoS-framework/core/tidos_main.py", line 35, in <module>
    from core.Footprinting.footprint import *
  File "/root/tidoS-framework/core/Footprinting/footprint.py", line 19, in <module>
    from core.Footprinting.Active_Recon.activeo import *
  File "/root/tidoS-framework/core/Footprinting/Active_Recon/activeo.py", line 21, in <module>
    from grabhead import *
  File "modules/0x01-OSINT+Footprinting/0x02-ActiveReconnaissance/grabhead.py", line 12, in <module>
    import urllib2
ModuleNotFoundError: No module named 'urllib2'

any suggestion please. I am using Kali 2019.1a

[Invalid] => pyexiv2 module not getting installing in redhat 7

[lalit@security TIDoS-Framework]$ sudo tidos
[sudo] password for lalit: 
Traceback (most recent call last):
  File "/opt/tidos/tidos.py", line 13, in <module>
    from core.tidos_main import *
  File "/opt/tidos/core/tidos_main.py", line 31, in <module>
    from core.Auxillaries.auxil import *
  File "/opt/tidos/core/Auxillaries/auxil.py", line 23, in <module>
    from imgext import *
  File "modules/0x05-Auxillaries+PF6/imgext.py", line 16, in <module>
    from pyexiv2 import ImageMetadata, ExifTag
ImportError: No module named pyexiv2

I have tried with yum install pyexiv2.x86-x64
& pip install pyexiv2 & py3exiv2.

I have python3.6, python3 & python2.7 installed.

[N/A] => Issue after Install

After Install and trying to start I get the following Error:

python2 tidos.py
Traceback (most recent call last):
  File "tidos.py", line 14, in <module>
    from core.tidos_main import *
  File "/home/gbo/TIDoS-Framework/core/tidos_main.py", line 37, in <module>
    from core.Vulnlysis.vuln import *
  File "/home/gbo/TIDoS-Framework/core/Vulnlysis/vuln.py", line 17, in <module>
    from core.Vulnlysis.Oth_Bugs.othbugs import *
  File "/home/gbo/TIDoS-Framework/core/Vulnlysis/Oth_Bugs/othbugs.py", line 22, in <module>
    from sqlbrute import *
  File "modules/0x03-Vulnerability+Analysis/0x03-OtherWebBugs/sqlbrute.py", line 12, in <module>
    import _mysql
  File "build/bdist.linux-x86_64/egg/_mysql.py", line 7, in <module>
  File "build/bdist.linux-x86_64/egg/_mysql.py", line 6, in __bootstrap__
ImportError: libmariadbclient.so.18: cannot open shared object file: No such file or directory

Anyone had the same issue?

OS Ubuntu 18.04 LTS

[Bug] => IndexError: List Index out of Range

Hi there,

I ran into an exception inspite of the global error handling feature. I was running the iphistory module under PassiveRecon. However the error came up like this:

Traceback (most recent call last):
File "/usr/lib/python2.7/threading.py", line 801, in __bootstrap_inner
File "/opt/TIDoS/modules/PassiveRecon/iphistory.py", line 62, in run
File "/usr/lib/python2.7/Queue.py", line 168, in get
File "/usr/lib/python2.7/threading.py", line 333, in wait
<type 'exceptions.TypeError'>: 'NoneType' object is not callable

Any idea on how this is happening and how it can be resolved?

Thanks,

[Invalid] => ImportError: No module named sslyze

Hi

I found TIDoS in Google and I wanted to test it, I installed with success.

But when I run it:

# tidos 
Traceback (most recent call last):
  File "/opt/tidos/tidos.py", line 13, in <module>
    from core.tidos_main import *
  File "/opt/tidos/core/tidos_main.py", line 35, in <module>
    from core.Enumeration.scanenum import *
  File "/opt/tidos/core/Enumeration/scanenum.py", line 25, in <module>
    from ssltlsscan import *
  File "modules/0x02-Scanning+Enumeration/ssltlsscan.py", line 14, in <module>
    import sslyze
ImportError: No module named sslyze

It is updated:

# python tidos_updater.py 

   ===============
    U P D A T E R
   ===============

 [*] Looking up for the latest version...
 [!] The version on GitHub is : v1.6.0
 [!] The version you have is : v1.6.0

 [!] You are using the latest version of this framework!

And my Kali too:

# grep VERSION /etc/os-release
VERSION="2018.3"
VERSION_ID="2018.3"

Info:

# pip install sslyze
Collecting sslyze
Requirement already satisfied: typing; python_version < "3.5" in /usr/lib/python2.7/dist-packages (from sslyze) (3.6.6)
Requirement already satisfied: cryptography==2.2.2 in /usr/local/lib/python2.7/dist-packages (from sslyze) (2.2.2)
Collecting nassl<1.2.0,>=1.1.0 (from sslyze)
  Using cached https://files.pythonhosted.org/packages/98/53/2c32ddd229eb80e542b24ac5ac8a8f3bb31532069ae2554ebff6368e83ee/nassl-1.1.3-cp27-cp27mu-manylinux1_x86_64.whl
Collecting tls-parser<1.3.0,>=1.2.0 (from sslyze)
Requirement already satisfied: enum34; python_version < "3.4" in /usr/lib/python2.7/dist-packages (from sslyze) (1.1.6)
Requirement already satisfied: asn1crypto>=0.21.0 in /usr/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (0.24.0)
Requirement already satisfied: six>=1.4.1 in /usr/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (1.11.0)
Requirement already satisfied: cffi>=1.7; platform_python_implementation != "PyPy" in /usr/local/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (1.11.5)
Requirement already satisfied: idna>=2.1 in /usr/local/lib/python2.7/dist-packages/idna-2.7-py2.7.egg (from cryptography==2.2.2->sslyze) (2.7)
Requirement already satisfied: ipaddress; python_version < "3" in /usr/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (1.0.17)
Requirement already satisfied: pycparser in /usr/local/lib/python2.7/dist-packages (from cffi>=1.7; platform_python_implementation != "PyPy"->cryptography==2.2.2->sslyze) (2.18)
Installing collected packages: nassl, tls-parser, sslyze
  Found existing installation: nassl 0.12
Cannot uninstall 'nassl'. It is a distutils installed project and thus we cannot accurately determine which files belong to it which would lead to only a partial uninstall.

Can you help me?

Regards

[Invalid] => ImportError: No module named sslyze

The install of tidos completes successfully but when i try to run the application i get the following error:

ImportError: No module named sslyze

i have confirmed sslyze is installed on my machine - sslyze is already the newest version (0.12-0kali1)

I am attempting to run the app on Parrot OS updated to the newest version

[Enhancement] => Improvements to Fuzzing Modules

Hi there,
This is really a great work. However there are really some good scopes for improvement of the fuzzing modules. For example, you can make the scripts to ask for the wordlist first before the fuzzing begins. Also, support for multiple parameters need to be added, since this version only takes in a single parameter.

And for the API_KEYS, you can just write up a Python file as API_KEYS.py and import the keys for the respective modules like SHODAN, CENSYS, FULL CONTACT and WHATCMS, instead of the config.json file.

Thanks,

[Multiple Suggestions]

Hi there,

First of all, this is awesome and thanks for keeping it open source โค๏ธ

  • Add compatability for Python 3.
  • Multi-threading implementation
  • Ability to run without installation
  • Cross platform compatibility
  • Remove included dependencies
  • Add comments
  • Use a separate module (file) for making requests to web pages
  • Work on logging of all info on screen
  • Add a suitable documentation of this project

Kudos ๐ŸŽ‰

[Invalid] => cant open this tools in mac OSX

Traceback (most recent call last):
File "tidos.py", line 13, in
from core.tidos_main import *
File "/Users/iSmartSa/tidos-framework/core/tidos_main.py", line 31, in
from core.Auxillaries.auxil import *
File "/Users/iSmartSa/tidos-framework/core/Auxillaries/auxil.py", line 23, in
from imgext import *
File "modules/0x05-Auxillaries+PF6/imgext.py", line 13, in
import PIL.ExifTags
ImportError: No module named PIL.ExifTags

[Question] => Result write out

where can i find the result write out? most of the result disappears in terminal.

i love your tool, great automation, save alot of time.

[Suggestion] => Suggestion for dependencies

Hey again.
When I look for the issues of your nice project, I see that there are lots of people have faced with the dependency problem.

As you mentioned earlier, it's not about the functionality of the TIDoS but it may help people to use and contribute to the project.

Maybe you can add a requirements.txt or improve the ./install script.
From now, I faced with almost 10 dependency issue.

I would like to help to you about it, no worries ;)
Thx
ugurcem

[Feature Request] Add a wordlist generator, IP and Email Generator

Hi there,

Thank you for this awesome work. This is highly appreciated. It would be great if you included a wordlist generator for generating lists based on our own requirements. Also an ip generator and email address generator would be awesome additions to the AuxilMods Phase.

Thank you,
Regards,

One of your biggest fans. ๐Ÿ˜‰

[Invalid] => ImportError: libmysqlclient.so.18:

Traceback (most recent call last):
  File "/opt/tidos/tidos.py", line 14, in <module>
    from core.tidos_main import *
  File "/opt/tidos/core/tidos_main.py", line 37, in <module>
    from core.Vulnlysis.vuln import *
  File "/opt/tidos/core/Vulnlysis/vuln.py", line 17, in <module>
    from core.Vulnlysis.Oth_Bugs.othbugs import *
  File "/opt/tidos/core/Vulnlysis/Oth_Bugs/othbugs.py", line 22, in <module>
    from sqlbrute import *
  File "modules/0x03-Vulnerability+Analysis/0x03-OtherWebBugs/sqlbrute.py", line 12, in <module>
    import _mysql
ImportError: libmysqlclient.so.18: cannot open shared object file: No such file or directory

[Feature Request] => IP Configuration at sshbrute.py

Hi there,

Thank you for this wonderful work. However, I ran into a big error while running thesshbrute module. The target gets locked automatically with the IP address of the host website. Can you please modify the code to ask for the IP address host first before the bruteforce starts.

Thank you.

[Bug] => Unhandled exception on some modules

Hi @0xInfection,

Thanks for the framework, I'm really enjoying working with it so far.

I'm new to Github and leaving issues so forgive me if I do anything wrong/miss anything off this report. I have seen on other issues you have requested debug info on the modules. I'm not entirely sure how to do this, however, I will give everything I can.

My system is Linux Mint and my Python version is Python 2.7.15rc1

The modules I am having an issue with are: (All of these come from using the Auto awesome feature)

   =====================================
    R E V E R S E   D N S   L O O K U P
   =====================================

 [!] Looking Up for Reverse DNS Info...
 [~] Result: 

 [-] Unhandled runtime exception while execution...
 [-] Exception Encountered: list index out of range
 [-] Returning back to main menu...
     ==================================
      G R A B   H T T P   H E A D E R S
     ===================================

 [!] Grabbing HTTP Headers...
 [-] Unhandled runtime exception while execution...
 [-] Exception Encountered: 'module' object has no attribute 'HTTPError'
 [-] Returning back to main menu...
    ================================
     HTTP STRICT TRANSPORT SECURITY
    ================================

 [*] Configuring headers...
 [*] Got any cookies? [just enter if none] :> 
 [*] Making the request...
 [-] Unhandled runtime exception while execution...
 [-] Exception Encountered: local variable 'flag' referenced before assignment
 [-] Returning back to main menu...

I'm also finding that when the error occurs none of the previous info is saved so the /opt/tidos/tmp/criteo.com-subdomains.lst is blank and there is nothing at all in /opt/tidos/tmp/logs/criteo.com-logs.

If I find any more I will add them, let me know if there is other info you need from me.

[Bug] => RFi Module does not work properly...

The RFi module under VulnLysis/SerioBugs doesn't seem to work properly. I have a website which is indeed vulnerable to RFi. But TIDoS wasn't able to detect it.


 Type Selected : RFI

   ===========================================
    R E M O T E   F I L E   I N C L U S I O N
   ===========================================

    Choose from the options:
    [1] Custom Targetting
    [2] Automated Scanning

 [#] Enter your choice :> 1
 [#] Enter the point scope parameter :> /file.php?url=
 [!] Your input has a "/" in the beginning,..
 [#] Do you mean root directory? (y/n) :> y
 [+] URL : http://site.com//file.php?url=
 [+] Url successfully parsed!
 [*] Trying basic fetch...
 [+] Payload : http://www.google.com
 [*] Fetching http://site.com//file.php?url=http://www.google.com
 [!] Heuristics reveal that the page may not be vulnerable to RFI!
 [*] Trying null byte character injection...
 [+] Payload : http://www.google.com%00
 [*] Fetching http://site.com//file.php?url=https://google.com%00
 [-] This RFI module could not find out any RFI.
 [-] This module is extreme basic (more improvements on the way).
 [+] Done!

I think this is due to the improper handling of the file parameter. Please fix this.

[Bug] => Bug at _ftpbrute

At the ftpbrute.py, there arises a exception regarding the base handling of the data type int to str. Need to fix that.

[Bug] => WARNING: Failed to execute tcpdump

I was running tidos on debian subsystem, and have this output :

WARNING: Failed to execute tcpdump. Check it is installed and in the PATH
Traceback (most recent call last):
File "/opt/tidos/tidos.py", line 13, in
from core.tidos_main import *
File "/opt/tidos/core/tidos_main.py", line 36, in
from core.Vulnlysis.vuln import *
File "/opt/tidos/core/Vulnlysis/vuln.py", line 16, in
from core.Vulnlysis.Oth_Bugs.othbugs import *
File "/opt/tidos/core/Vulnlysis/Oth_Bugs/othbugs.py", line 21, in
from sqlbrute import *
File "modules/0x03-Vulnerability+Analysis/0x03-OtherWebBugs/sqlbrute.py", line 11, in
import _mysql
File "build/bdist.linux-x86_64/egg/_mysql.py", line 7, in
File "build/bdist.linux-x86_64/egg/_mysql.py", line 6, in bootstrap
ImportError: /usr/lib/x86_64-linux-gnu/libmariadbclient.so.18: version `libmysqlclient_18' not found (required by /root/.cache/Python-Eggs/MySQL_python-1.2.5-py2.7-linux-x86_64.egg-tmp/_mysql.so)

How to solve this?

[ImportError] No module named _mysql

Hi there,

Thank you for putting all of them together. Unfortunately, I ran into a big bug here-

Traceback (most recent call last):
File "/opt/tidos-framework/tidos.py", line 14, in 
from tidos_main import *
File "core/tidos_main.py", line 20, in 
from impo import *
File "core/impo.py", line 16, in 
from passiveo import *
File "core/passiveo.py", line 31, in 
from footprint_dup import *
File "core/footprint_dup.py", line 14, in 
from activeo import *
File "core/activeo.py", line 31, in 
from sqlbrute import *
File "modules/AuxilMods/sqlbrute.py", line 12, in 
import _mysql
ImportError: No module named _mysql

Any way to resolve this?

[N/A] => No module named PIL.ExifTags

python2 tidos.py

Traceback (most recent call last):                                                                  File "tidos.py", line 14, in <module>
    from core.tidos_main import *
  File "/root/tidos-framework/core/tidos_main.py", line 32, in <module>
    from core.Auxillaries.auxil import *                                                            File "/root/tidos-framework/core/Auxillaries/auxil.py", line 23, in <module>                        from imgext import *
  File "modules/0x05-Auxillaries+PF6/imgext.py", line 14, in <module>                                 import PIL.ExifTags
ImportError: No module named PIL.ExifTags

[N/A] => tidos is not running

[root@localhost tidos-framework]# tidos
Traceback (most recent call last):
  File "/opt/tidos/tidos.py", line 14, in <module>
    from core.tidos_main import *
  File "/opt/tidos/core/tidos_main.py", line 32, in <module>
    from core.Auxillaries.auxil import *
  File "/opt/tidos/core/Auxillaries/auxil.py", line 23, in <module>
    from imgext import *
  File "modules/0x05-Auxillaries+PF6/imgext.py", line 17, in <module>
    from pyexiv2 import ImageMetadata, ExifTag # python2
  File "/usr/lib64/python2.7/site-packages/pyexiv2-0.3.2-py2.7-linux-x86_64.egg/pyexiv2/__init__.py", line 60, in <module>
    import libexiv2python
ImportError: libboost_python-py27.so.1.62.0: cannot open shared object file: No such file or directory

[Invalid] => does not work

Doesn't work. Actually the same problem as the previous user has. Previous version worked. Using ParrotOS.
P.S. Why python2.7? Shodan doesn't work correctly or smth like that?
Dude, you have a perfect project, may be subsitute for recon-ng. Debug your product. Thanks a lot, man.

[Missing Dependency] => Mechanize import error

Traceback (most recent call last):
File "/opt/tidos-framework/tidos.py", line 14, in
from tidos_main import *
File "core/tidos_main.py", line 20, in
from impo import *
File "core/impo.py", line 16, in
from passiveo import *
File "core/passiveo.py", line 31, in
from footprint_dup import *
File "core/footprint_dup.py", line 14, in
from activeo import *
File "core/activeo.py", line 31, in
from cms import *
File "modules/ActiveRecon/cms.py", line 12, in
import mechanize
ImportError: No module named mechanize

[Dependency Error] => Missing module dependency

WARNING: No route found for IPv6 destination :: (no default route?)
Traceback (most recent call last):
File "/opt/tidos-framework/tidos.py", line 14, in
from tidos_main import *
File "core/tidos_main.py", line 20, in
from impo import *
File "core/impo.py", line 28, in
from webbugs import *
File "core/webbugs.py", line 28, in
from mailspoof import *
File "modules/VulnLysis/MiscBugs/mailspoof.py", line 14, in
import emailprotectionslib.dmarc as dmarclib
File "/usr/local/lib/python2.7/dist-packages/emailprotectionslib/dmarc.py", line 4, in
import tldextract
ImportError: No module named tldextract

what should i do ?

thanks

[Invalid] => Can't fire up on Ubuntu Container

Hey,
firstly thanks for open sourcing this awesome repo.

  • I'm working with an IOS one. To run your tool flawless, I've just created an Ubuntu image on Docker.
    After successful installation, when I try to run tidos, it gives me the following;

File "/opt/tidos/tidos.py", line 13, in from core.tidos_main import *
File "/opt/tidos/core/tidos_main.py", line 31, in from core.Auxillaries.auxil import *
File "/opt/tidos/core/Auxillaries/auxil.py", line 21, in from honeypot import *
File "modules/0x05-Auxillaries+PF6/honeypot.py", line 12, in import requests
ImportError: No module named requests

  • python is version 2.7.

What could be the reason of this?
Thx.
ugurcem

image

[Feature Request] Docker Container

Is there a docker container made , i haven't a os with ubunut or debian, and there are some many errors with installing this programe with centos7.

could some one share a docker container please?

[Invalid] => Installation script is broken

Installation:

git clone https://github.com/theinfecteddrake/tidos-framework.git
cd tidos-framework
chmod +x install
./install

Logs:

Checking for pre-installations...
Removing any trace of pre-installations...
removed '/opt/tidos-framework/README.md'
removed '/opt/tidos-framework/files/brute-db/smtp/smtp_defuser.lst'
removed '/opt/tidos-framework/files/brute-db/smtp/smtp_defpass.lst'
[...]
removed '/opt/tidos-framework/setup/__init__.py'
removed directory '/opt/tidos-framework/setup'
removed directory '/opt/tidos-framework'
Setting necessary permissions...
sh: 0: getcwd() failed: No such file or directory
chmod: cannot access 'dependencies': No such file or directory
failed to change mode of 'dependencies' from 0000 (---------) to 0000 (---------)
Processing dependencies...
sh: 0: getcwd() failed: No such file or directory
shell-init: error retrieving current directory: getcwd: cannot access parent directories: No such file or directory
bash: dependencies: No such file or directory
Creating directories...
sh: 0: getcwd() failed: No such file or directory
mkdir: created directory '/opt/tidos/'
Copying new files...
sh: 0: getcwd() failed: No such file or directory
cp: cannot stat '*': No such file or directory
Creating shortcuts...
sh: 0: getcwd() failed: No such file or directory
cp: cannot stat 'runon.sh': No such file or directory
Giving priviledges...
sh: 0: getcwd() failed: No such file or directory
chmod: cannot access '/opt/tidos/*': No such file or directory
sh: 0: getcwd() failed: No such file or directory
chmod: cannot access '/usr/bin/tidos': No such file or directory
failed to change mode of '/usr/bin/tidos' from 0000 (---------) to 0000 (---------)

After run install then directory tidos-framework is removed and directory tidos is empty.

[Bug] => Error at setup.py

While running setup.py to install TIDoS, I encountered the following error:

Traceback on <module> line 37
pip.main(['install','requests','scapy','urllib2'])
AttributeError: pip has no attribute main

Any idea why this is happening?

P.S. - I don't know what happened to the earlier version of TIDoS-Framework on your previous account the-Infected-Drake. But yeah I have found you and will continue to emulate you. Big fan here!

[Invalid] => ImportError: No module named server_connectivity_tester

Traceback (most recent call last):
File "/opt/tidos/tidos.py", line 13, in
from core.tidos_main import *
File "/opt/tidos/core/tidos_main.py", line 35, in
from core.Enumeration.scanenum import *
File "/opt/tidos/core/Enumeration/scanenum.py", line 25, in
from ssltlsscan import *
File "modules/0x02-Scanning+Enumeration/ssltlsscan.py", line 21, in
from sslyze.server_connectivity_tester import ServerConnectivityTester
ImportError: No module named server_connectivity_tester

[Invalid] => Sslyze ImportError

Installed, then when I ran tidos

`# apt-get install sslyze
Reading package lists... Done
Building dependency tree
Reading state information... Done
sslyze is already the newest version (0.12-0kali1).
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded.

tidos

Traceback (most recent call last):
File "/opt/tidos/tidos.py", line 13, in
from core.tidos_main import *
File "/opt/tidos/core/tidos_main.py", line 35, in
from core.Enumeration.scanenum import *
File "/opt/tidos/core/Enumeration/scanenum.py", line 25, in
from ssltlsscan import *
File "modules/0x02-Scanning+Enumeration/ssltlsscan.py", line 14, in
import sslyze
ImportError: No module named sslyze
`

[N/A] => tidos is not running

Hello @0xInfection ,

I performed a clean install of TIDoS and now I am having issues running the tidos script. Below is the output of my first run

Traceback (most recent call last):
  File "/opt/tidos/tidos.py", line 14, in <module>
    from core.tidos_main import *
  File "/opt/tidos/core/tidos_main.py", line 36, in <module>
    from core.Enumeration.scanenum import *
  File "/opt/tidos/core/Enumeration/scanenum.py", line 24, in <module>
    from ssltlsscan import *
  File "modules/0x02-Scanning+Enumeration/ssltlsscan.py", line 15, in <module>
    import sslyze
ImportError: No module named sslyze

[Bug] => Exception after shutdown

the framework was running at the time I put on sleep the vm and restarted afterwards , i installed tidos on a kalivm after that i have subsequent unhandled runtime exception.

   =====================
    D N S   L 0 0 K U P
   =====================

There was an error getting results

 [+] DNS Records
 [-] Unhandled runtime exception while execution...
 [-] Returning back to main menu...

[Invalid] => No module named sslyze

#pip install sslyze
Collecting sslyze
Requirement already satisfied: typing; python_version < "3.5" in /usr/lib/python2.7/dist-packages (from sslyze) (3.6.4)
Requirement already satisfied: cryptography==2.2.2 in /usr/local/lib/python2.7/dist-packages (from sslyze) (2.2.2)
Collecting nassl<1.2.0,>=1.1.0 (from sslyze)
Using cached https://files.pythonhosted.org/packages/98/53/2c32ddd229eb80e542b24ac5ac8a8f3bb31532069ae2554ebff6368e83ee/nassl-1.1.3-cp27-cp27mu-manylinux1_x86_64.whl
Collecting tls-parser<1.3.0,>=1.2.0 (from sslyze)
Requirement already satisfied: enum34; python_version < "3.4" in /usr/lib/python2.7/dist-packages (from sslyze) (1.1.6)
Requirement already satisfied: asn1crypto>=0.21.0 in /usr/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (0.24.0)
Requirement already satisfied: six>=1.4.1 in /usr/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (1.11.0)
Requirement already satisfied: cffi>=1.7; platform_python_implementation != "PyPy" in /usr/local/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (1.11.5)
Requirement already satisfied: idna>=2.1 in /usr/local/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (2.7)
Requirement already satisfied: ipaddress; python_version < "3" in /usr/local/lib/python2.7/dist-packages (from cryptography==2.2.2->sslyze) (1.0.22)
Requirement already satisfied: pycparser in /usr/local/lib/python2.7/dist-packages (from cffi>=1.7; platform_python_implementation != "PyPy"->cryptography==2.2.2->sslyze) (2.18)
Installing collected packages: nassl, tls-parser, sslyze
Found existing installation: nassl 0.12
Cannot uninstall 'nassl'. It is a distutils installed project and thus we cannot accurately determine which files belong to it which would lead to only a partial uninstall.

tidos

Traceback (most recent call last):
File "/opt/tidos/tidos.py", line 13, in
from core.tidos_main import *
File "/opt/tidos/core/tidos_main.py", line 35, in
from core.Enumeration.scanenum import *
File "/opt/tidos/core/Enumeration/scanenum.py", line 25, in
from ssltlsscan import *
File "modules/0x02-Scanning+Enumeration/ssltlsscan.py", line 14, in
import sslyze
ImportError: No module named sslyze

[ImportError] Error at TIDoS Installation

Hi there,

I recently found your repo and decided to test it out. But unfortunately, I faced with some exceptions while running the install file. I did a ./install but the result is:

Traceback (most recent call last):
    File "modules/PassiveRecon/googledorker.py", line 26, in <module>
        import google
ImportError: No module named google

Any idea how to fix this?

[Invalid] => Running TIDoS on Python 3.x

Hi, I just installed TIDoS using sudo. It's seems to be installed fine, but when I try to run it, I got this error:

 File "/opt/tidos-framework/tidos.py", line 18
    print R+' [-] User Interruption Detected!'
          ^
SyntaxError: Missing parentheses in call to 'print'. Did you mean print(R+' [-] User Interruption Detected!')?

My default python version is 3.6.6.
How can I solve this problem?

[Bug] => Install broken

Ive cloned the git to /opt directory, did the chmod as advised on the kitploit article and then run the ./install

Thing is, this then removes all the files from the directory and then the install bombs out leaving me an empty folder?

Running this on Kali Linux, ive attached the script output.

Not sure if anybody else is having this problem?

tidos output.txt

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.