Linux Metasploit Opensource Pentesting Tools Python Scanner

V3n0M-Scanner – Popular SQLi and Pentesting scanner in Python3

V3n0M runs on Python3 [Live Project – All features fully working again and in Python3
v3n0m is a free and open source scanner. Evolved from baltazar’s scanner, it has adapted several new features that improve fuctionality and usability. It is mostly experimental software.
This program is for finding and executing various vulnerabilities. It scavenges the web using dorks and organizes the URLs it finds.
You can now install the software via pip install V3n0m
Always verify the PGP signature of the package:

gpg: Signature made Fri 18 Jul 2014 02:59:48 AM UTC
gpg:                using RSA key 0x8F2B5CBD711F1326
gpg: Good signature from "Grand Architect <[email protected]>"

Use at your own risk.

Very useful for executing:
Metasploit Modules Scans
SQL Injection Vuln Scanner[SQLi]
Extremely Large D0rk Target Lists
FTP Crawler
DNS BruteForcer
What You Hold:
A modified smartd0rk3r
Brand new, just outta the box!
Largest and most powerful d0rker online, 18k+d0rks searched over ~ Engines at once.
Free and Open /src/
CrossPlatform Python based toolkit
Version 4.0.2c Released on 25th Jan 2016
Licensed under GPLv2
Tested on: Linux 4.3.1 Ubuntu/Debian, CentOS 6 (with some errors), Win7 (with some errors)

root@bt:~# python3
Now you may follow the simple prompts.
[0x100] Choose your target (domain) :
        Example : .com
        it is necessary to add you can also use a specific website (
[0x200] Choose the number of random dorks (0 for all.. may take awhile!) :
        Example : 0 = This will choose all of the XSS, File Inclusion, RCE and SQLi dorks
[0x300] Choose the number of threads :
        Example : 50
[0x400] Enter the number of pages to search through :
        Example : 50
    The program will print out your desired settings and start searching.
    It then creates files for the collected and valid URLs for later.
    It takes a while to scan because it utilizes either TOR, which you can specify
    if you wish to do so, or regular HTTP requests over a long period of time.
    After a while, it will feed you the percentage of the scan until completion.
    At this point, it will have saved the valid URLs in the files it created earlier.
    The program utilizes over 10k dorks now, be careful how you use them!
    Enjoy. :]
                                                            ~/ Dev Team

Contact Information:

[ NovaCygni ] - <[email protected]>
[ Architect ] - <[email protected]>

Original Header:

- This was written for educational purpose and pentest only. Use it at your own risk.
- Author will be not responsible for any damage!
- !!! Special greetz for my friend sinner_01 !!!
- Toolname        :
- Coder           : baltazar a.k.a b4ltazar <[email protected]>
- Version         : 1.0
- greetz for all members of ex,

New To This Addition:

---To be Done --Partially implemented -Done
- Upgrade to Python3 from Python2
--- Redo LFI/RFI attack method
--- Automate scanning sites with findable admin pages and add to seperate list
--- Redo Metasploit Scans
--- Add default attack option for DB types, automate injection and upload shell or enable RDP.
-- Perfect SQLi Vuln detection and add options for saving/searching specific DB types
-- Starting upgrade for Search engines
--- Implement SQLi D0rk Seed Generation option
--- Implement Metasploit Exploits scan / Nmap style option + Dork option

Download V3N0M-Scanner

Post Comment