-
Notifications
You must be signed in to change notification settings - Fork 13
/
scan
executable file
·54 lines (47 loc) · 1.4 KB
/
scan
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
#!/bin/bash -e
CYAN="\e[36m"
GREEN="\e[32m"
ENDCOLOR="\e[0m"
echo -e "${GREEN}"
pyfiglet d9scan
printf "${CYAN} d9scan from shell :) \n\n"
printf "Enter target's domain or IP : "
read IP
function options(){
echo -e "${ENDCOLOR}----------------- Choose One option -----------------------${GREEN} "
echo -e " 1 for http-malware-host scan"
echo -e " 2 for http-dlink-backdoor scan"
echo -e " 3 for ftp-proftpd-backdoor scan"
echo -e " 4 for all "
echo -e " 5 Exit "
read OPTION
if [[ $OPTION == '1' ]] ;
then
echo -e "${GREEN} nmap -sv --script=http-malware-host ${IP} \n"
nmap -sV --script=http-malware-host $IP
elif [[ $OPTION == '2' ]] ;
then
echo -e "${GREEN} nmap -sV --script http-dlink-backdoor ${IP}\n "
nmap -sV --script http-dlink-backdoor $IP
elif [[ $OPTION == '3' ]];
then
echo -e "${GREEN} nmap --script ftp-proftpd-backdoor -p 21 ${IP}\n "
nmap --script ftp-proftpd-backdoor -p 21 $IP
elif [[ $OPTION == '4' ]] ;
then
echo -e "${CYAN} Running all Scripts\n "
nmap -sV --script=http-malware-host $IP
nmap -sV --script http-dlink-backdoor $IP
nmap --script ftp-proftpd-backdoor -p 21 $IP
elif [[ $OPTION == '5' ]];
then
exit 0
else
printf "Invalid Option, Exiting..... \n"
exit 0
fi
}
echo -e "${GREEN} nmap -v -A ${IP}"
nmap -v -A $IP
options
exit