Rebel-Framework - Advanced And Easy To Use Penetration Testing Framework


Automate the automation

START
git clone https://github.com/rebellionil/rebel-framework.git
cd rebel-framework
bash setup.sh
bash rebel.sh

MODULES



SCREENSHOTS



DEMOS




SUPPORTED DISTRIBUTIONS
Distribution Version Check supported dependencies already installed status
Kali Linux 4.4.0 yes yes working
Parrot OS 4.14.0 yes yes working

PORT YOUR OWN TOOLS TO REBEL !
  • scan.py
┌─[[email protected]]─[~]
└──╼ #python scan.py -h


-h --help print usage
usage ./scan.py <target>
  • controller.sh sample
#!/bin/bash

normal='\e[0m'
arr[0]='\e[1;94m' ; blue=${arr[0]}
arr[1]='\e[1;31m' ; red=${arr[1]}
arr[2]='\e[1;33m' ; yellow=${arr[2]}
arr[3]='\e[1;35m' ; purp=${arr[3]}
arr[4]='\e[1;32m' ; green=${arr[4]}
arr[5]='\e[97m' ; white=${arr[5]}
grayterm='\e[1;40m'

module=$(echo $1 | cut -d '/' -f 2 )

if [[ $module != "scan" ]] ; then
echo -e "${red}[x] Wrong module name"
exit
fi

misc(){
if [[ $1 == "back" ]] || [[ $1 == "exit" ]] || [[ $1 == "quit" ]] ; then
exit
elif [[ $1 == '!' ]] ; then
$2
elif [[ $1 == "clear" ]] || [[ $1 == "reset" ]] ; then
clear
elif [[ $1 == "help" ]] || [[ $1 == "?" ]] ; then
bash print_help_modules.sh help
elif [[ $1 == "banner" ]] ; then
rand="$[ $RANDOM % 6 ]"
color="${arr[$rand]}" # select random color
echo -e $color
pyth on print_banner.py
elif [[ $1 == "" ]] ; then
:
else
echo -e "${purp}[-] Invalid parameter use show 'help' for more information"
fi
}

target="site.com"

while IFS= read -e -p "$( echo -e $white ; echo -e ${grayterm}{REBEL}➤[${white}$1]~#${normal} ) " cmd1 ; do
history -s "$cmd1"
if [[ ${1} =~ 're/' ]] ; then
if [[ $( echo $cmd1 | cut -d " " -f 1 ) == "show" ]] ; then
if [[ $( echo $cmd1 | cut -d " " -f 2 ) == "options" ]] ; then
{
echo -e " Option\t\t\t\t|Value"
echo -e " ======\t\t\t\t|====="
echo -e " target\t\t\t\t|$target"
} | column -t -s "|"
elif [[ $( echo $cmd1 | cut -d " " -f 2 ) == "modules" ]] ; then
bash print_help_modules.sh modules
elif [[ $( echo $cmd1 | cut -d " " -f 2 ) == "help" ]] ; then
bash pr int_help_modules.sh help
fi
elif [[ $( echo $cmd1 | cut -d " " -f 1 ) == 'set' ]] ; then
if [[ $( echo $cmd1 | cut -d " " -f 2 ) == 'target' ]] ; then
target=$( echo $cmd1 | cut -d " " -f 3- | sed "s/'//g")
fi
elif [[ $( echo $cmd1 | cut -d " " -f 1 ) == 'run' ]] ; then
python scan.py $target
else
misc $cmd1
fi
fi
done

BUG ?

OPEN NEW ISSUE
https://github.com/rebellionil/rebel-framework/issues

TODO

EXTERNAL PROJECTS USED INSIDE THE FRAMEWORK
https://github.com/rebe11ion/tornado
https://github.com/rebe11ion/CryptNote
https://github.com/1N3/BlackWidow
https://github.com/Dionach/CMSmap
https://github.com/vincepare/DirScan
https://github.com/s0md3v/Decodify
https://github.com/UndeadSec/SocialFish
https://github.com/evait-security/weeman
https://github.com/m4ll0k/Infoga
https://github.com/Moham3dRiahi/Th3inspector
https://github.com/sdushantha/qr-filetransfer
  • special thanks for Mahmoud Mohamed for helping improve the project quality by testing it in several environments.



Source: feedproxy.google.com
Rebel-Framework - Advanced And Easy To Use Penetration Testing Framework Rebel-Framework - Advanced And Easy To Use Penetration Testing Framework Reviewed by Anonymous on 5:09 AM Rating: 5