Skip to content

mezgani/gomoz

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

__software__= "gomoz"
__author__ = "MEZGANI Ali handrix [@] gmail [.] com"
__version__ = "1.0.1"
__cvsversion__ = "Revision: 1.0"
__date__ = "Date: 2006"
__copyright__ = "Copyright (c) native labs"
__license__="GPL"
__credits__ = "Thanks  mam for support"
__url__="http://groups.google.com/gomoz"



Gomoz is an open source Web Application Security Scanner developed by 
Native LABS.
it has more than 5,000 Web include's Attack Signature database.
Gomoz will test a web server in the shortest timespan possible, 
and produce deeply a pentest web intrusion.
It's based on backdooring technics (c99, r57, others) to inject 
its own exec file via POST, also spawn a shell.
Gomoz is developed with python.

Gomoz contains:
- port scanner : which checks a machine for open ports.
- http info    : checks a web server for running application version.
- result saver : All result are saved under the most famous format (xml or sqlite)
- 4 scanning modes : Gomoz performs a multi-thread scan 

    1- input scan   :
       scan one url  + one exploit		
    2- single scan  :
       scan one url  + all exploits	
    3- global scan  :
       scan all url  + one exploits
    4- massive scan : 
       scan all urls + all exploits	




name    : is the name of a scan instance.
Keyword : is a constant string in the included page, its important to determine 
if the web server are vulnerable.
If the vulnerable server does not support GET methods so, backdooring servers 
is indispensible for running a console.


Releases

No releases published

Packages

No packages published