Skip to content

infocyn/oxtrace

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

7 Commits
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

๐Ÿ”ฅ OxTrace v5.0

Python Security License Status

๐Ÿ›ก๏ธ Advanced Penetration Testing Framework & Vulnerability Scanner


โš ๏ธ CRITICAL LEGAL DISCLAIMER

๐Ÿšจ THIS TOOL IS FOR EDUCATIONAL AND AUTHORIZED TESTING PURPOSES ONLY ๐Ÿšจ

By using OxTrace, you agree that:

  • โœ… You have explicit written permission to test target systems
  • โœ… You will NOT use this tool for illegal activities
  • โœ… You understand unauthorized access is a criminal offense
  • โœ… You accept FULL RESPONSIBILITY for your actions
  • โŒ Unauthorized access is illegal and punishable by law

๐ŸŽฏ Overview

OxTrace is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines 6+ specialized security testing modules into a single, powerful tool with real-time monitoring and professional reporting.

โœจ Why OxTrace?

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”
โ”‚  ๐ŸŽฏ All-in-One       โ”‚  6+ specialized testing modules      โ”‚
โ”‚  ๐Ÿ“Š Real-Time        โ”‚  Live dashboard with progress        โ”‚
โ”‚  ๐Ÿ“„ Professional     โ”‚  HTML + JSON + Executive reports     โ”‚
โ”‚  โšก High Performance โ”‚  Parallel processing up to 100       โ”‚
โ”‚  ๐Ÿ”’ Stealth Mode     โ”‚  Proxy & TOR support                 โ”‚
โ”‚  ๐ŸŽจ Modern UI        โ”‚  Beautiful terminal interface        โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐Ÿ”ง Core Modules

๐Ÿ” Authentication Testing

โ”œโ”€ Default credentials testing
โ”œโ”€ SQL injection in login forms
โ”œโ”€ Brute force protection checks
โ”œโ”€ Account enumeration detection
โ””โ”€ HTTPS security verification

๐Ÿ”Œ API Security Scanner

โ”œโ”€ BOLA/IDOR testing
โ”œโ”€ Broken authentication checks
โ”œโ”€ Excessive data exposure
โ”œโ”€ Rate limiting validation
โ””โ”€ API documentation exposure

๐ŸŽซ JWT Token Analysis

โ”œโ”€ Algorithm confusion attacks
โ”œโ”€ Weak signing secrets
โ”œโ”€ Expiration validation
โ”œโ”€ Sensitive data exposure
โ””โ”€ Signature verification

๐Ÿ“ค File Upload Testing

โ”œโ”€ Dangerous file type uploads
โ”œโ”€ Filter bypass techniques
โ”œโ”€ Path traversal attacks
โ”œโ”€ MIME type validation
โ””โ”€ Content verification

๐Ÿ” Session Management

โ”œโ”€ Cookie security flags
โ”œโ”€ Session fixation tests
โ”œโ”€ Timeout validation
โ”œโ”€ Session ID entropy
โ””โ”€ Security attributes

๐Ÿ”’ Cryptography Testing

โ”œโ”€ SSL/TLS version checks
โ”œโ”€ Certificate validation
โ”œโ”€ Weak cipher detection
โ”œโ”€ Key size verification
โ””โ”€ HSTS headers

๐Ÿš€ Installation & Quick Start

๐Ÿ“ฆ Quick Installation

# 1๏ธโƒฃ Clone the repository
git clone https://github.com/infocyn/oxtrace.git
cd oxtrace

# 2๏ธโƒฃ Install dependencies
pip install -r requirements.txt

# 3๏ธโƒฃ Verify installation
python oxtrace.py --help

โšก Quick Usage

๐ŸŽฎ Interactive Mode (Beginners)

python oxtrace.py -i

Easy interactive menu:

  • โœ… Accept legal terms
  • ๐ŸŽฏ Enter target URL
  • ๐Ÿ“‹ Select modules
  • ๐Ÿ“Š Generate reports

โŒจ๏ธ Command Line (Advanced)

# Full scan
python oxtrace.py -t https://example.com -m full -r html

# Specific modules
python oxtrace.py -t https://example.com -m auth,api,jwt

# JSON report
python oxtrace.py -t https://example.com -m full -r json

๐Ÿ“– Detailed Usage

Command Syntax

python oxtrace.py [OPTIONS]

Available Options

Option Long Form Description Example
-t --target Target URL/domain/IP (required) -t https://example.com
-m --modules Comma-separated modules -m auth,api,jwt
-r --report Report format (html/json/executive) -r html
-o --output Output directory -o ./reports
-i --interactive Interactive menu mode -i
-v --verbose Verbose debug output -v
--skip-legal Skip legal disclaimer --skip-legal
-h --help Show help message -h

Available Modules

Code Module Description
auth Authentication Login mechanisms and auth security
api API Security REST/GraphQL API vulnerabilities
jwt JWT Analysis JWT token security flaws
upload File Upload File upload vulnerabilities
session Session Management Session handling and cookies
crypto Cryptography SSL/TLS and crypto configs
full Full Scan Run ALL modules (recommended)

๐Ÿ’ก Usage Examples

๐ŸŽฏ Example 1: Complete Security Audit

python oxtrace.py \
  -t https://target.com \
  -m full \
  -r html \
  -v

๐Ÿ”Œ Example 2: API Testing Only

python oxtrace.py \
  -t https://api.target.com \
  -m api,jwt \
  -r json

๐Ÿ” Example 3: Authentication Scan

python oxtrace.py \
  -t https://login.target.com \
  -m auth \
  -r executive

๐Ÿ•ต๏ธ Example 4: Stealth Mode

export OXTRACE_USE_TOR="true"
python oxtrace.py \
  -t https://target.com \
  -m full

๐Ÿ“ค Example 5: Upload Testing

python oxtrace.py \
  -t https://upload.target.com \
  -m upload \
  -v

๐Ÿ”’ Example 6: Crypto Testing

python oxtrace.py \
  -t https://secure.target.com \
  -m crypto,session \
  -r html

๐Ÿ“Š Report Types

1๏ธโƒฃ Interactive HTML Report

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ  ๐Ÿ“Š Interactive Dashboard                   โ”ƒ
โ”ƒ  โ”œโ”€ ๐ŸŽจ Modern dark theme design             โ”ƒ
โ”ƒ  โ”œโ”€ ๐Ÿ“ˆ Interactive charts (Chart.js)        โ”ƒ
โ”ƒ  โ”œโ”€ ๐Ÿ” Quick search functionality           โ”ƒ
โ”ƒ  โ”œโ”€ ๐Ÿ“ฑ Responsive for all devices           โ”ƒ
โ”ƒ  โ”œโ”€ ๐Ÿ–จ๏ธ Print-ready PDF export              โ”ƒ
โ”ƒ  โ””โ”€ ๐Ÿ”— Direct CVSS & CWE links              โ”ƒ
โ”—โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”›

Generate:

python oxtrace.py -t https://example.com -m full -r html

Features:

  • ๐ŸŽจ Professional cybersecurity aesthetic
  • ๐Ÿ“Š Severity distribution pie chart
  • ๐Ÿ“ˆ Vulnerabilities by module bar chart
  • ๐Ÿ” Searchable findings table
  • ๐Ÿ“ฑ Mobile-friendly responsive design
  • ๐Ÿ–จ๏ธ Optimized for PDF printing
  • ๐Ÿ”— Links to vulnerability databases

2๏ธโƒฃ JSON Report (Machine-Readable)

Generate:

python oxtrace.py -t https://example.com -m full -r json

Use Cases:

  • โœ… CI/CD pipeline integration
  • โœ… Custom report generation
  • โœ… Data analysis and metrics
  • โœ… SIEM system integration
  • โœ… Automated vulnerability tracking

Sample Structure:

{
  "meta": {
    "tool": "OxTrace",
    "version": "5.0.0",
    "target": "https://example.com",
    "timestamp": "2024-01-15_14-30-00",
    "scan_duration": 245.67
  },
  "summary": {
    "total_vulnerabilities": 12,
    "risk_score": 78,
    "by_severity": {
      "critical": 3,
      "high": 5,
      "medium": 2,
      "low": 2
    }
  },
  "scans": [
    {
      "target": "https://example.com",
      "scan_type": "authentication_security",
      "vulnerabilities": [
        {
          "name": "Default Credentials",
          "severity": "critical",
          "cvss": 9.8,
          "cwe": "CWE-798",
          "evidence": "Login successful with admin:admin"
        }
      ]
    }
  ]
}

3๏ธโƒฃ Executive Summary (Management Report)

Generate:

python oxtrace.py -t https://example.com -m full -r executive

Ideal For:

  • ๐Ÿ‘” C-level executives
  • ๐Ÿ“Š Board presentations
  • ๐Ÿ“‹ Compliance reports
  • ๐Ÿ“ˆ Risk assessments

Sample Output:

โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•
                    EXECUTIVE SECURITY SUMMARY
โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

TARGET: https://example.com
DATE: 2024-01-15 14:30:00
SCAN DURATION: 4 minutes 5 seconds

โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€
                         RISK OVERVIEW
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

Overall Risk Rating: CRITICAL

Total Vulnerabilities: 12
โ”œโ”€ Critical: 3
โ”œโ”€ High: 5
โ”œโ”€ Medium: 2
โ””โ”€ Low: 2

Risk Score: 78/100 (HIGH RISK)

IMMEDIATE ACTION REQUIRED: 3 critical vulnerabilities

โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€
                      TOP 5 CRITICAL FINDINGS
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

1. DEFAULT CREDENTIALS ACCEPTED
   Severity: CRITICAL | CVSS: 9.8
   Location: https://example.com/login
   Impact: Unauthorized administrative access
   Recommendation: Change default credentials immediately

2. SQL INJECTION VULNERABILITY
   Severity: CRITICAL | CVSS: 9.8
   Location: https://example.com/login
   Impact: Database compromise possible
   Recommendation: Use parameterized queries

3. WEAK JWT SECRET KEY
   Severity: CRITICAL | CVSS: 9.8
   Location: Authentication tokens
   Impact: Token forgery possible
   Recommendation: Use strong secret (min 256 bits)

โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€
                   BUSINESS IMPACT ASSESSMENT
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

Data Breach Risk: HIGH
  โ””โ”€ SQL injection could expose customer data

Compliance Risk: HIGH
  โ””โ”€ May violate GDPR, PCI-DSS requirements

Reputational Risk: HIGH
  โ””โ”€ Security breach could damage brand trust

Financial Risk: HIGH
  โ””โ”€ Potential fines and remediation costs

โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€
                   PRIORITY RECOMMENDATIONS
โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€

IMMEDIATE (Within 24 hours):
  1. Change all default credentials
  2. Disable vulnerable endpoints
  3. Rotate JWT secret keys
  4. Enable WAF protection

SHORT-TERM (Within 1 week):
  1. Fix SQL injection vulnerabilities
  2. Implement proper API authorization
  3. Add security headers
  4. Enable rate limiting

LONG-TERM (Within 1 month):
  1. Comprehensive code review
  2. Security testing in CI/CD
  3. Team security training
  4. Vulnerability management program

โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•โ•

๐Ÿ” Module Deep Dive

1. Authentication Security Testing ๐Ÿ”

What It Tests:

  • โœ… Default credentials (admin:admin, root:root, etc.)
  • โœ… SQL injection in login forms
  • โœ… Brute force protection mechanisms
  • โœ… Account enumeration vulnerabilities
  • โœ… HTTPS enforcement on credentials
  • โœ… Session management after authentication

Sample Vulnerabilities:

[CRITICAL] Default Credentials
URL: https://example.com/login
Evidence: Login successful with admin:admin
CVSS: 9.8 | CWE-798
Fix: Change default credentials, enforce strong passwords

[CRITICAL] SQL Injection in Login
URL: https://example.com/login
Payload: ' OR '1'='1
Evidence: SQL error in response
CVSS: 9.8 | CWE-89
Fix: Use parameterized queries

[MEDIUM] No Brute Force Protection
URL: https://example.com/login
Evidence: 10 failed attempts without blocking
CVSS: 5.3 | CWE-307
Fix: Implement rate limiting and account lockout

2. API Security Scanner ๐Ÿ”Œ

What It Tests:

  • โœ… BOLA/IDOR (Broken Object Level Authorization)
  • โœ… Broken authentication mechanisms
  • โœ… Excessive data exposure in responses
  • โœ… Missing rate limiting
  • โœ… Exposed API documentation
  • โœ… Mass assignment vulnerabilities

Sample Vulnerabilities:

[HIGH] Potential BOLA/IDOR
URL: https://api.example.com/users/123
Evidence: Accessed resource with ID 456 unauthorized
CVSS: 7.5 | CWE-639
Fix: Implement proper authorization checks

[MEDIUM] Excessive Data Exposure
URL: https://api.example.com/users
Evidence: API returns password hashes
CVSS: 5.3 | CWE-200
Fix: Filter sensitive data from responses

[LOW] Exposed API Documentation
URL: https://api.example.com/swagger
Evidence: Swagger UI publicly accessible
CVSS: 3.7 | CWE-200
Fix: Restrict documentation in production

3. JWT Token Analysis ๐ŸŽซ

What It Tests:

  • โœ… Algorithm confusion ('none' algorithm attacks)
  • โœ… Weak signing secrets (brute force)
  • โœ… Token expiration validation
  • โœ… Sensitive data in payload
  • โœ… Signature verification bypass
  • โœ… Missing security claims

Sample Vulnerabilities:

[CRITICAL] Weak JWT Secret
Evidence: Token signed with "password123"
Algorithm: HS256
CVSS: 9.8 | CWE-798
Fix: Use cryptographically strong secret (256+ bits)

[CRITICAL] Algorithm Confusion
Evidence: Server accepts "none" algorithm
CVSS: 9.8 | CWE-327
Fix: Whitelist algorithms, never accept "none"

[HIGH] Sensitive Data in JWT
Evidence: Token contains user password
CVSS: 7.5 | CWE-200
Fix: Never store sensitive data in JWT payloads

4. File Upload Testing ๐Ÿ“ค

What It Tests:

  • โœ… Dangerous file types (PHP, JSP, ASPX)
  • โœ… Double extension bypass (file.php.jpg)
  • โœ… Null byte injection (file.php%00.jpg)
  • โœ… MIME type validation bypass
  • โœ… Path traversal in filenames
  • โœ… File content validation

Sample Vulnerabilities:

[CRITICAL] Dangerous File Upload
URL: https://example.com/upload
Evidence: Successfully uploaded test.php
CVSS: 9.8 | CWE-434
Fix: Whitelist file types, validate content

[HIGH] Filter Bypass
URL: https://example.com/upload
Payload: test.php.jpg (double extension)
Evidence: PHP file executed
CVSS: 8.6 | CWE-434
Fix: Validate extensions properly, check magic bytes

[MEDIUM] No MIME Validation
URL: https://example.com/upload
Evidence: Uploaded executable with image MIME
CVSS: 6.5 | CWE-434
Fix: Validate both extension and MIME type

5. Session Management Testing ๐Ÿ”

What It Tests:

  • โœ… Secure flag on cookies
  • โœ… HttpOnly flag validation
  • โœ… SameSite attribute
  • โœ… Session fixation vulnerabilities
  • โœ… Session timeout enforcement
  • โœ… Session ID randomness

Sample Vulnerabilities:

[HIGH] Session Fixation
URL: https://example.com
Evidence: Session ID not regenerated after login
CVSS: 7.5 | CWE-384
Fix: Regenerate session ID after authentication

[MEDIUM] Missing HttpOnly Flag
Cookie: PHPSESSID
Evidence: Cookie accessible via JavaScript
CVSS: 5.3 | CWE-1004
Fix: Set HttpOnly flag to prevent XSS theft

[MEDIUM] Missing Secure Flag
Cookie: session_token
Evidence: Cookie can be sent over HTTP
CVSS: 5.3 | CWE-614
Fix: Always set Secure flag for HTTPS cookies

6. Cryptography Testing ๐Ÿ”’

What It Tests:

  • โœ… SSL/TLS versions (SSLv2, SSLv3, TLS 1.0/1.1)
  • โœ… Certificate validity and expiration
  • โœ… Weak cipher suites
  • โœ… RSA/ECC key sizes
  • โœ… HSTS headers
  • โœ… Certificate transparency

Sample Vulnerabilities:

[HIGH] Outdated TLS Version
URL: https://example.com
Protocol: TLSv1.0 (deprecated)
CVSS: 7.5 | CWE-326
Fix: Disable TLS 1.0/1.1, use TLS 1.2+ only

[MEDIUM] Weak Cipher Suite
URL: https://example.com
Cipher: DES-CBC3-SHA
CVSS: 5.9 | CWE-327
Fix: Disable weak ciphers, use AES-GCM

[LOW] Certificate Expiring Soon
URL: https://example.com
Evidence: Certificate expires in 15 days
CVSS: 3.7 | CWE-295
Fix: Renew certificate before expiration

โš™๏ธ Advanced Configuration

๐Ÿ”ง Environment Variables

# Proxy Configuration
export OXTRACE_PROXY="http://proxy.example.com:8080"
export OXTRACE_PROXY_USER="username"
export OXTRACE_PROXY_PASS="password"

# TOR Support
export OXTRACE_USE_TOR="true"
export OXTRACE_TOR_PROXY="socks5://127.0.0.1:9050"

# Custom User Agent
export OXTRACE_USER_AGENT="Mozilla/5.0 Custom Scanner"

# Threading
export OXTRACE_MAX_THREADS="50"

# Timeouts
export OXTRACE_TIMEOUT="30"

# Rate Limiting
export OXTRACE_RATE_LIMIT="0.1"

# Output Directory
export OXTRACE_OUTPUT_DIR="/path/to/reports"

๐Ÿ“ Configuration File (config.yaml)

# OxTrace Configuration File

# Global Settings
version: "5.0.0"
verbose: false

# Scanning Settings
scanning:
  max_threads: 100
  max_async_tasks: 200
  timeout: 30
  max_retries: 3
  rate_limit_delay: 0.05

# Proxy Settings
proxy:
  enabled: false
  proxy_list:
    - "http://proxy1.example.com:8080"
    - "http://proxy2.example.com:8080"
  rotation: true

# TOR Settings
tor:
  enabled: false
  proxy: "socks5://127.0.0.1:9050"

# Stealth Mode
stealth:
  rotate_user_agent: true
  random_delay: true
  delay_min: 0.1
  delay_max: 0.5
  evasion_mode: true

# Module Configuration
modules:
  auth:
    enabled: true
    test_default_creds: true
    test_sql_injection: true
    test_brute_force: true
  
  api:
    enabled: true
    test_bola: true
    test_rate_limiting: true
  
  jwt:
    enabled: true
    test_weak_secrets: true
    test_algorithm_confusion: true
  
  upload:
    enabled: true
    test_dangerous_types: true
    test_bypasses: true
  
  session:
    enabled: true
    test_cookie_security: true
    test_fixation: true
  
  crypto:
    enabled: true
    test_ssl_tls: true
    test_certificates: true

# Reporting
reporting:
  default_format: "html"
  output_directory: "./reports"
  include_screenshots: false
  include_request_response: true

# Logging
logging:
  level: "INFO"
  file: "oxtrace.log"
  max_size_mb: 100
  backup_count: 5

# Custom Payloads
custom_payloads:
  sql_injection:
    - "' OR '1'='1"
    - "admin'--"
    - "1' UNION SELECT NULL--"
  
  xss:
    - "<script>alert('XSS')</script>"
    - "<img src=x onerror=alert(1)>"

# Wordlists
wordlists:
  usernames: "wordlists/usernames.txt"
  passwords: "wordlists/passwords.txt"
  directories: "wordlists/directories.txt"

๐Ÿ›ก๏ธ Security Best Practices

Before Starting Assessment

1. Legal Authorization โš–๏ธ

CRITICAL: Always obtain written permission

Required Documentation:
โœ… Signed penetration testing agreement
โœ… Scope of work document
โœ… Rules of engagement
โœ… Emergency contact information
โœ… Data handling procedures

2. Define Scope ๐ŸŽฏ

Clearly Define:
โœ… Target systems and IP ranges
โœ… Allowed testing methods
โœ… Off-limits systems
โœ… Testing time windows
โœ… Data sensitivity levels

3. Prepare Environment ๐Ÿ”ง

Pre-Testing Checklist:
โœ… Verify target backups exist
โœ… Set up monitoring and logging
โœ… Establish communication channels
โœ… Prepare incident response plan
โœ… Document baseline system state

During Assessment

1. Monitor Impact ๐Ÿ“Š

# Monitor system performance
# Stop if issues detected
# Document all activities
# Maintain stakeholder communication

2. Rate Limiting โฑ๏ธ

# Use appropriate delays
python oxtrace.py -t https://example.com -m full --delay 0.5

# For production systems
export OXTRACE_RATE_LIMIT="1.0"

3. Document Everything ๐Ÿ“

Keep Detailed Records:
โœ… All commands executed
โœ… Vulnerabilities discovered
โœ… Activity timestamps
โœ… System anomalies
โœ… Evidence and screenshots

After Assessment

1. Secure Reports ๐Ÿ”’

# Encrypt sensitive reports
gpg --encrypt --recipient security@example.com report.html

# Set appropriate permissions
chmod 600 report.html

2. Responsible Disclosure ๐Ÿ“ข

Follow These Steps:
1. Report to authorized contacts immediately
2. Provide detailed remediation guidance
3. Allow time for fixes (30-90 days)
4. Follow up on progress
5. Document disclosure process

3. Clean Up ๐Ÿงน

Post-Assessment Actions:
โœ… Remove test accounts created
โœ… Delete uploaded test files
โœ… Clear temporary data
โœ… Verify no persistent access
โœ… Document cleanup activities

๐Ÿ› Troubleshooting

Common Issues

โŒ ModuleNotFoundError

# Solution
pip install -r requirements.txt

โŒ SSL Certificate Error

# Solution 1
pip install --upgrade certifi

# Solution 2 (testing only)
export PYTHONHTTPSVERIFY=0

โŒ Connection Timeout

# Solution
python oxtrace.py -t target --timeout 60

โŒ Too Many Requests (429)

# Solution
export OXTRACE_RATE_LIMIT="1.0"

โŒ Permission Denied

# Solution
mkdir -p reports
chmod 755 reports

โŒ Memory Issues

# Solution
export OXTRACE_MAX_THREADS="20"

๐Ÿค Contributing

We welcome contributions from the security community!

How to Contribute

# 1. Fork the repository
git clone https://github.com/infocyn/oxtrace.git

# 2. Create feature branch
git checkout -b feature/amazing-scanner

# 3. Make changes and test

# 4. Push changes
git push origin feature/amazing-scanner

# 5. Create Pull Request

What We're Looking For

โ”œโ”€ ๐Ÿ”ง New scanner modules (CORS, XXE, SSRF)
โ”œโ”€ ๐Ÿ› Bug fixes and improvements
โ”œโ”€ ๐Ÿ“š Documentation enhancements
โ”œโ”€ ๐ŸŽจ UI/UX improvements
โ””โ”€ โšก Performance optimizations

๐Ÿ“š Learning Resources

๐ŸŽ“ Training Resources

OWASP Resources:

  • OWASP Top 10
  • OWASP Testing Guide
  • OWASP API Security Top 10

Vulnerability Databases:

  • CVE Details
  • NVD - National Vulnerability Database
  • Exploit-DB

๐Ÿ“– Recommended Books

  • "The Web Application Hacker's Handbook" by Dafydd Stuttard
  • "Real-World Bug Hunting" by Peter Yaworski
  • "Black Hat Python" by Justin Seitz
  • "OWASP Testing Guide v4"

๐Ÿ”ง Complementary Tools

โ”œโ”€ Burp Suite      โ†’ Professional web testing
โ”œโ”€ OWASP ZAP       โ†’ Free alternative to Burp
โ”œโ”€ Nmap            โ†’ Network discovery
โ”œโ”€ Metasploit      โ†’ Exploitation framework
โ””โ”€ SQLMap          โ†’ SQL injection tool

๐Ÿ“ Changelog

Version 5.0.0 (2025-12-5) - Current

โœจ New Features

  • ๐ŸŽจ Real-time display with live dashboard
  • ๐Ÿ”„ Advanced multi-threading (up to 100 workers)
  • โš–๏ธ Interactive legal framework
  • ๐Ÿ“Š HTML reports with Chart.js visualizations
  • ๐ŸŽซ JWT token analysis module
  • ๐Ÿ“ค File upload vulnerability scanner
  • ๐Ÿ” Session management testing
  • ๐Ÿ”’ Cryptography and SSL/TLS testing
  • ๐Ÿ•ต๏ธ Stealth mode with proxy/TOR support
  • ๐Ÿ’พ Intelligent caching system

๐Ÿ› Bug Fixes

  • Fixed race conditions in multi-threading
  • Resolved SQL injection false positives
  • Corrected charset encoding issues
  • Fixed memory leaks in long scans

โšก Performance

  • 300% faster with parallel execution
  • 40% reduced memory footprint
  • Optimized regex patterns
  • Improved request caching

๐Ÿ“„ License

MIT License

Copyright (c) 2024 OxTrace Security Team

Permission is hereby granted, free of charge, to any person obtaining
a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including
without limitation the rights to use, copy, modify, merge, publish,
distribute, sublicense, and/or sell copies of the Software.

๐ŸŒ Connect With Us

๐Ÿ“ฑ Follow Us on Facebook

Facebook


๐Ÿ“ง Support & Contact

Need help? Have questions?

๐Ÿ“ฎ Contact us via Facebook page


โš ๏ธ FINAL WARNING

๐Ÿšจ READ THIS CAREFULLY ๐Ÿšจ

โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ                                                    โ”ƒ
โ”ƒ  โŒ DO NOT use on systems you don't own           โ”ƒ
โ”ƒ  โŒ DO NOT use for malicious purposes             โ”ƒ
โ”ƒ  โŒ DO NOT ignore legal warnings                  โ”ƒ
โ”ƒ                                                    โ”ƒ
โ”ƒ  โœ… ALWAYS get written authorization              โ”ƒ
โ”ƒ  โœ… FOLLOW responsible disclosure                 โ”ƒ
โ”ƒ  โœ… USE ethically and legally                     โ”ƒ
โ”ƒ                                                    โ”ƒ
โ”ƒ  YOU ARE SOLELY RESPONSIBLE FOR YOUR ACTIONS      โ”ƒ
โ”ƒ  UNAUTHORIZED ACCESS IS ILLEGAL AND PUNISHABLE    โ”ƒ
โ”ƒ                                                    โ”ƒ
โ”—โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”›

Legal Consequences: ๐Ÿš” Criminal Prosecution | ๐Ÿ’ฐ Heavy Fines | โ›“๏ธ Imprisonment | ๐Ÿ“‰ Career Destruction


Use Responsibly. Stay Legal. Be Ethical.


๐Ÿ™ Acknowledgments

Special thanks to:

  • OWASP Project for security resources
  • Python Community for excellent libraries
  • Security Researchers for vulnerability research
  • Contributors who improve OxTrace
  • You for using OxTrace responsibly

Made with โค๏ธ by the Security Community

โญ Star on GitHub | ๐Ÿ› Report Issues | ๐Ÿค Contribute

Facebook


OxTrace v5.0 - Ultimate Penetration Testing Framework

Scan Smart. Test Safe. Stay Ethical.

Security Legal Open Source

About

Advanced Penetration Testing Framework Professional security scanner with 6 modules: Authentication, API Security, JWT Analysis, File Upload, Session Management & Cryptography Testing. Features real-time monitoring, parallel scanning, professional reports (HTML/JSON), and stealth mode. For authorized testing only. Stay ethical, stay legal.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages