Skip to content

0xgigabyte/Ananta

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ANANTA πŸš€

πŸ”₯ Overview

The ANANTA is a Python-based interactive framework designed for offensive cybersecurity operations. It integrates multiple tools across various attack phases, including reconnaissance, scanning, exploitation, brute-forcing, and red team automation. This toolkit simplifies the execution of complex security tasks by automating tool installation, parameter handling, and execution.

πŸ› οΈ Use Cases This toolkit is ideal for:

Reconnaissance & OSINT: Subdomain discovery, asset enumeration, and archived URL gathering.

Scanning: HTTP probing, DNS enumeration, and port scanning.

Exploitation & Privilege Escalation: XSS exploitation, CRLF injection detection, and directory brute-forcing.

Network & Wireless Hacking: Port scanning and DNS enumeration.

Payloads & Backdoors: Web crawling and fuzzing.

Brute-Force & Cracking: Subdomain brute-forcing and directory brute-forcing.

Red Team Automation: Notifications and asset tracking.

πŸ“‚ Tool Structure Here’s the ASCII mindmap of the toolkit’s structure: Ananta β”œβ”€β”€ [1] Reconnaissance & OSINT β”‚ β”œβ”€ subfinder (Subdomain Discovery) β”‚ β”œβ”€ sublist3r (Subdomain Enumeration) β”‚ β”œβ”€ assetfinder (Asset Discovery) β”‚ β”œβ”€ amass (In-depth Enumeration) β”‚ β”œβ”€ gau (URLs Gathering) β”‚ └─ waybackurls (Archived URLs)

β”œβ”€β”€ [2] Scanning β”‚ β”œβ”€ httpx (HTTP Probe) β”‚ β”œβ”€ nuclei (Vulnerability Scanner) β”‚ β”œβ”€ naabu (Port Scanner) β”‚ └─ dnsx (DNS Scanner)

β”œβ”€β”€ [3] Exploitation & Privilege Escalation β”‚ β”œβ”€ dalfox (XSS Exploitation) β”‚ β”œβ”€ crlfuzz (CRLF Injection Detection) β”‚ └─ gobuster (Directory Brute-force)

β”œβ”€β”€ [4] Network & Wireless Hacking β”‚ β”œβ”€ naabu (Port Scanning) β”‚ └─ dnsx (DNS Enumeration)

β”œβ”€β”€ [5] Payloads & Backdoors β”‚ β”œβ”€ gospider (Web Crawling) β”‚ └─ ffuf (Web Fuzzing)

β”œβ”€β”€ [6] Brute-Force & Cracking β”‚ β”œβ”€ gobuster (Directory Brute-force) β”‚ └─ crobat (Subdomain Brute-force)

└── [7] Red Team Automation β”œβ”€ notify (Notifications) └─ anew (New Asset Detection)

βš™οΈ Features

βœ… Fully functional execution of integrated tools βœ… Automated dependency management βœ… Interactive user guidance with clear prompts βœ… Menu-driven navigation for attack phases and tools βœ… ASCII art enhancements for better visualization βœ… Real-time status indication for installed tools βœ… Error handling for invalid inputs

πŸš€ Installation

Prerequisites: Ensure you have the following installed:

Golang
Git 

Install Golang: bash sudo apt update && sudo apt install golang-go -y Install Python3 and pip: bash sudo apt update && sudo apt install python3 python3-pip -y Install Git: bash sudo apt install git -y Clone the Repository: bash git clone https://github.com/0xgigabyte/Ananta.git cd cyber-offensive-toolkit Run the Script: Execute the script using Python:

bash python3 cyber_offensive_toolkit.py 🌟 How to Use Select Installation Mode: When prompted, choose whether to install all tools automatically (yes) or proceed directly (no).

View Attack Phases: Navigate through the ASCII mindmap displaying categorized tools.

Select Attack Phase: Choose from reconnaissance, scanning, exploitation, etc.

Choose Tool: Pick a specific tool within the selected category. Installed tools are marked green; missing ones are marked red.

Enter Parameters: Provide required inputs such as domain names, URLs, file paths, etc., guided by clear examples.

Execute Tool: The toolkit runs the selected tool with your parameters and displays real-time output.

πŸ“¦ Tools Included Reconnaissance & OSINT:

sublist3r: Subdomain enumeration
assetfinder: Asset discovery
amass: In-depth enumeration
gau: Gather URLs
waybackurls: Archived URLs

Scanning:

nuclei: Vulnerability scanning
naabu: Port scanning
dnsx: DNS enumeration

Exploitation & Privilege Escalation:

crlfuzz: CRLF injection detection
gobuster: Directory brute-forcing

Network & Wireless Hacking:

naabu: Port scanning
dnsx: DNS enumeration
Payloads & Backdoors:
gospider: Web crawling
ffuf: Web fuzzing
Brute-force & Cracking:
gobuster: Directory brute-forcing
crobat: Subdomain brute-forcing
Red Team Automation:
notify: Notifications
anew: Asset tracking

πŸ›‘οΈ Disclaimer This tool is intended for ethical hacking and cybersecurity research purposes only. Unauthorized use of this toolkit against systems without explicit permission is illegal and unethical.

✨ Contributing Feel free to fork this repository and submit pull requests for improvements or additional features! Contributions are always welcome.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages