• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Crimson v2.0 - automates some of the Pentester or Bug Bounty Hunter tasks

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,604
Solutions
2
Reputation
32
Reaction score
100,446
Points
2,313
Credits
32,560
‎6 Years of Service‎
 
76%
crimson_logo.png


Crimson

    Crimson is a tool that automates some of the Pentester or Bug Bounty Hunter tasks.
    It uses many open source tools, most of them are available for download from github.

It consists of three partially interdependent modules:

    crimson_recon – automates the process of domain reconnaissance.
    crimson_target – automates the process of urls reconnaissance.
    crimson_exploit – automates the process of bug founding.

🔻crimson_recon

    This module can help you if you have to test big infrastructure or you are trying to earn some bounties in *.scope.com domain. It includes many web scraping and bruteforcing tools.

🔻crimson_target

    This module covers one particular domain chosen by you for testing.
    It uses a lot of vulnerability scanners, web scrapers and bruteforcing tools.

🔻crimson_exploit

    This module uses a number of tools to automate the search for certain bugs in a list of urls.

Changelog v2.0

    From now on, Crimson acts as a docker container and the install.sh script is no longer supported
    (Although, it should still works on Linux Mint)
    Much of the code has been rewritten and improved.
    Added project_valuation.sh, crimson_mass_nmap.py script to scripts directory
    Added Ciphey tool
    words directory has been improved
    Added new options to all three modules to make them more “elastic”.
    Added rustscan in place of masscan

crimson_recon:

    Added optional flags to this module, which are shown below:
    -x # Domain bruteforcing (with words/dns wordlist)
    -v # Virtual host discovering
    -p # TCP ports scanning (1-65535)
    -u # UDP ports scanning (nmap default ports)
    -b # Third level subdomain bruteforcing
    -y # Proxy urls.txt and live.txt to Burp (127.0.0.1:8080)

crimson_target

    Added optional flags to this module, which are shown below:
    -p # TCP (1-65535) / UDP (nmap default) ports scanning
    -a # Automatic deletion of possible false-positive endpoints after brute forcing with ffuf (this option needs more tests)
    -y # Proxy urls.txt and ffuf.txt to Burp (127.0.0.1:8080)
    A lot of modifications in the script
    New workflow – check the documentation guidelines.

crimson_exploit

    The script was rewritten
    New tools being added, check scripts directory!
    Faster CVE scanning

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top