You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 25, 2019. It is now read-only.
Utku Sen edited this page Apr 26, 2017
·
1 revision
Welcome to Leviathan's wiki. Following documentations will allow you to use the Leviathan with all features.
Getting Started
For installing Leviathan on a specific system, visit installation page.
You need to generate "Google Custom Search" "Shodan" and "Censys" API keys in order to use the program. For details, visit Obtaining The API Keys page.
After key generation is finished, you need to provide those keys to Leviathan. Visit "Configuration menu" for tutorial.
Leviathan is ready to use.
Usage
-For discovering devices and web sites, visit "Discovery Menu" page
-For running specific attacks to pre-discovered targets, visit "Attack Menu" page