Tool and Usage
- Programming language
- Utku Sen
- Özge Barbaros
- Latest release
- Latest release date
Why this tool?
Leviathan is a security tool to provide a wide range of services including service discovery, brute force, SQL injection detection, and exploit capabilities. The primary reason to use this tool is to do massive scans on many systems at once. For example to include a huge network range, country-wide scan, or even full internet scan.
How it works
Leviathan uses a combination of tasks and attacks, like discovery, brute forcing, remote execution, and SQL injection. It leverages services like Shodan and Censys to find targets. It can detect the most common services and then perform the related attacks.
The framework consists of open source tools like masscan, ncrack, and DSSS.
Usage and audience
Leviathan Framework is commonly used for penetration testing, security assessment, or service exploitation. Target users for this tool are pentesters and security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 500 contributors
- + The source code of this software is available
History and highlights
- Demo at Black Hat USA 2017 Arsenal
- Demo at DEF CON 25 Demo Labs
Supported operating systems
Leviathan Framework is known to work on Linux.
Several dependencies are required to use Leviathan Framework.
Leviathan Framework alternatives
Similar tools to Leviathan Framework:
AutoSploit is short for automatic exploitation. The open source tool helps pentesters and ethical hackers. Read this review on see how it works.
The Infection Monkey is a security tool to test the resiliency of a data center or network. It tries to breach the perimeter and infect any internal server. Upon success, it reports the status to the centralized Monkey Island server. This tool can help with automating security assessments or perform a self-assessment.
Arpag is a security tool to perform automatic exploiting of targets. It can be instructed to scan a set of ports and based on the outcome, it will search and active a related exploit.
This tool page was updated at . Found an improvement? Help the community by submitting an update.