Leviathan Framework

LSE toolsLSE toolsLeviathan Framework (425)Leviathan Framework (425)

Tool and Usage

Project details
LicenseGPLv3
Programming languagePython
AuthorÖzge Barbaros, Utku Sen
Latest release0.1.2 []

Project health

60
This score is calculated by different factors, like project age, last release date, etc.

Why this tool?

Leviathan is a security tool to provide a wide range of services including service discovery, brute force, SQL injection detection, and exploit capabilities. The primary reason to use this tool is to do massive scans on many systems at once. For example to include a huge network range, country-wide scan, or even full internet scan.

How it works

Leviathan uses a combination of tasks and attacks, like discovery, brute forcing, remote execution, and SQL injection. It leverages services like Shodan and Censys to find targets. It can detect the most common services and then perform the related attacks.

Background information

The framework consists of open source tools like masscan, ncrack, and DSSS.

Usage and audience

Leviathan Framework is commonly used for penetration testing, security assessment, or service exploitation. Target users for this tool are pentesters and security professionals.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:

Strengths

  • + More than 500 contributors
  • + The source code of this software is available

History and highlights

  • Demo at Black Hat USA 2017 Arsenal
  • Demo at DEF CON 25 Demo Labs

Author and Maintainers

Leviathan Framework is under development by Özge Barbaros, Utku Sen.

Installation

Supported operating systems

Leviathan Framework is known to work on Linux.

Dependencies

Several dependencies are required to use Leviathan Framework.

  • bs4
  • google-api-python-client
  • lxml
  • paramiko
  • requests
  • shodan

Leviathan Framework alternatives

Similar tools to Leviathan Framework:

64

arpag

Arpag is a security tool to perform automatic exploiting of targets. It can be instructed to scan a set of ports and based on the outcome, it will search and active a related exploit.

88

AutoSploit

AutoSploit is short for automatic exploitation. The open source tool helps pentesters and ethical hackers. Read this review on see how it works.

100

Infection Monkey

The Infection Monkey is a security tool to test the resiliency of a data center or network. It tries to breach the perimeter and infect any internal server. Upon success, it reports the status to the centralized Monkey Island server. This tool can help with automating security assessments or perform a self-assessment.

All Leviathan Framework alternatives

This tool page was updated at . Found an improvement? Help the community by submitting an update.

Related tool information

Categories

This tool is categorized as a automatic exploitation tool and mass audit tool.