TIDoS Framework is a comprehensive web-app audit framework. let's keep this simple
The main highlights of this framework is:
- A framework to cover up everything from Reconnaissance to Exploitation.
- Has 4 main phases, subdivided into 13 sub-phases consisting a total of 89 modules.
- Reconnaissance Phase has 41 modules of its own (including active and passive recon, information disclosure modules).
- Scanning & Enumeration Phase has got 13 modules (including port scans, WAF analysis, etc)
- Vulnerability Analysis Phase has 35 modules (including most common vulnerabilites in action).
- Exploits Castle has only 1 exploit.
(purely developemental)
- All four phases each have a
Auto-Awesome
module which automates every module for you. - You just need the domain, and leave everything is to this tool.
- TIDoS has full verbose out support, so you'll know whats going on.
- Fully user friendly interaction environment.
(no shits)
- Clone the repository locally and navigate there:
git clone https://github.com/theinfecteddrake/tidos-framework.git
cd tidos-framework
- Install the dependencies:
chmod +x install
./install
Thats it! Now you are good to go! Now lets run the tool:
tidos
TIDoS is made to be comprehensive. It is a highly flexible framework where you just have to select and use modules.
But before that, you need to set your own API KEYS
for various OSINT purposes. To do so, open up API_KEYS.py
under files/
directory and set your own keys and access tokens for SHODAN
, CENSYS
, FULL CONTACT
, GOOGLE
and WHATCMS
. Public API KEYS and tokens for SHODAN
and WHATCMS
have been provided with the TIDoS release itself. You can still add your own... no harm!
Finally, as the framework opens up, enter the website name eg. http://www.example.com
and let TIDoS lead you. Thats it! Its as easy as that.
Recommended:
Follow the order of the tool (Run in a schematic way).
Reconnaissance ➣ Scanning & Enumeration ➣ Vulnerability Analysis
To update this tool, use tidos_updater.py
module under tools/
folder.
TIDoS Framework presently supports the following:
-
Reconnaissance + OSINT
-
Passive Reconnaissance:
- Nping Enumeration
Via external APi
- WhoIS Lookup
Domain info gathering
- GeoIP Lookup
Pinpoint physical location
- DNS Configuration Lookup
DNSDump
- Subdomains Lookup
Indexed ones
- Reverse DNS Configuration Lookup
- Reverse IP Lookup
Hosts on same server
- Domain IP History
IP Instances
- Web Links Gatherer
Indexed ones
- Google Search
Manual search
- Google Dorking (multiple modules)
Automated
- Email to Domain Resolver
Email WhoIs
- Wayback Machine Lookups
Find Backups
- Breached Email Check
Pwned Email Accounts
- Enumeration via Google Groups
- Check Alias Availability
Social Networks
- Find PasteBin Posts
Domain Based
- LinkedIn Gathering
Employees & Company
- Threat Intelligence Gathering
Bad IPs
- Nping Enumeration
-
Active Reconnaissance
- Ping Enumeration
Advanced
- CMS Detection
(185+ CMSs supported)
IMPROVED
- Advanced Traceroute
IMPROVED
robots.txt
andsitemap.xml
Checker- Grab HTTP Headers
Live Capture
- Find HTTP Methods Allowed
via OPTIONS
- Detect Server behind
IMPROVED
- Examine SSL Certificate
Absolute
- Subnets Enumeration
Class Based
- Find Shared DNS Hosts
Name Server Based
- Operating System Fingerprinting
IMPROVED
- Discover Interesting Files
- Common Backdoor Locations
c99.php
- Common Backup Locations
.bak, .db
- Common Password Locations
.pgp, .skr
- Common Proxy Path Configs.
.pac
- Common Dot Files
.htaccess, .phpinfo
- Common Backdoor Locations
- Ping Enumeration
-
Information Disclosure
- Credit Cards Disclosure
If Plaintext
- Email Harvester
IMPROVED
- Fatal Errors Enumeration
Includes Full Path Disclosure
- Internal IP Disclosure
Signature Based
- Phone Number Havester
Signature Based
- Social Security Number Harvester
US Ones
- Credit Cards Disclosure
-
-
Scanning & Enumeration
- Remote Server WAF Enumeration
- Port Scanning
Ingenious Modules
- Simple Port Scanner
via Socket Connections
- TCP SYN Scan
Highly reliable
- TCP Connect Scan
Highly Reliable
- XMAS Flag Scan
Reliable Only in LANs
- Fin Flag Scan
Reliable Only in LANs
- Port Service Detector
- Simple Port Scanner
- Web Technology Enumeration
Absolute
- Banner Grabbing of Services
via Open Ports
- Interactive Scanning with NMap
16 preloaded modules
- Crawlers
- Depth 1
- Depth 2
Page Crawler
- Depth 3
Link Crawler
-
Vulnerability Analysis
Web-Bugs & Server Misconfigurations
- Insecure CORS
Absolute
- Same-Site Scripting
Sub-domain based
- Zone Transfer
DNS Server based
- Clickjacking
Framable response based
- Security on Cookies
HTTPOnly/Secure Flags
- Cloudflare Misconfiguration Check
+ Getting Real IP
- HTTP High Transport Security Usage
- Spoofable Email
Missing SPF and DMARC Records
- Host Header Injection
Port Based
- Security Headers Analysis
Live Capture
- Cross-Site Tracing
Port Based
- Network Security Misconfig.
Telnet Enabled
Serious Web Vulnerabilities
- File Inclusions
- Local File Inclusion (LFI)
Param based
- Remote File Inclusion (RFI)
- Parameter Based
- Pre-loaded Path Based
- Local File Inclusion (LFI)
- OS Command Injection
Linux & Windows (RCE)
- Path Traversal
(Sensitive Paths)
- Cross-Site Request Forgery
Absolute
- SQL Injection
- Error Based Injection
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- Auto-gathering
IMPROVED
- Blind Based Injection
Crafted Payloads
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- Auto-gathering
IMPROVED
- Error Based Injection
- LDAP Injection
Parameter Based
- HTML Injection
Parameter Based
- Bash Command Injection
ShellShock
- Cross-Site Scripting
IMPROVED
- Cookie Value Based
- Referer Value Based
- User-Agent Value Based
- Parameter Value Based
Manual
- Unvalidated URL Forwards
Open Redirect
- PHP Code Injection
Windows + Linux
- HTTP Response Splitting
CRLF Injection
- User-Agent Value Based
- Parameter value Based
Manual
- Sub-domain Takeover
50+ Services
- Single Sub-domain
Manual
- All Subdomains
Automated
- Single Sub-domain
Auxillaries
-
Protocol Default Credential Bruteforce
- FTP Protocol Bruteforce
- SSH Protocol Bruteforce
- POP 2/3 Protocol Bruteforce
- SQL Protocol Bruteforce
- XMPP Protocol Bruteforce
- SMTP Protocol Bruteforce
- TELNET Protocol Bruteforce
-
String & Payload Encoder
6 Types
- Insecure CORS
-
Exploitation
purely developmental
- ShellShock
v1.5
There are some bruteforce modules to be added:
- Some more of Enumeraton Techniques
- Lots more of OSINT & Stuff
This version of TIDoS is purely developmental and is presently stable
. There are bugs in resolving the [99] Back
at various end-points which results in blind fall-backs. Though I have added global exception handling, still, there maybe bugs out there. Also TIDoS needs to develop more on logging all info displayed on the screen (help needed)
.
This tool is provided a toolkit for full-fledged web-app pentesting and related vulnerability analysis. This framework is built for hunting bugs and has already found many. THEREFORE, I AM NOT RESPONSIBLE FOR THE SHIT YOU DO WITH THIS TOOL.
Put this project on a watch, since it is updated frequently (you can take a look at past commits history)
. This project is one of the best frameworks I have ever built and I would really like your constructive criticism, suggestions and help in converting this project into the best web penetration testing framework ever built and trust me, it will be ;)
.
Thank you,
@_tID | CodeSploit