Metadata-Version: 2.1
Name: indraa
Version: 2.0
Summary: Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
Home-page: https://github.com/R0X4R/indraa
Author: Eshan Singh
Author-email: r0x4r@yahoo.com
License: MIT
Platform: UNKNOWN
Classifier: Programming Language :: Python :: 3
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: Information Technology
Classifier: Topic :: Security
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Requires-Python: >=3.6
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: Wappalyzer
Requires-Dist: argparse
Requires-Dist: requests

<p align="center"><img src="https://github.com/R0X4R/indraa/blob/main/public/logo.png?raw=true" width="60%" height="100%" alt="Logo"/></p>

---

<p align="center">
Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.
</p>

## Features

- Rapid port scanning using multiple techniques
- Integration with Shodan's InternetDB for quick results
- Fallback to Python-based scanning when InternetDB data is unavailable
- Nmap verification for enhanced accuracy
- Multiple output formats: text, JSON, and port-only
- Technology detection using Wappalyzer
- Basic vulnerability information (when available from InternetDB)

## Installation

To install `Indraa`, follow these steps:

```bash
pip install indraa
```

```bash
pip install requests json socket Wappalyzer
```

### <br>indraa.py -h <br><br>

```css
python3 indraa.py -h

Indraa is a powerful, versatile, and user-friendly Python-based network scanning and vulnerability assessment tool.

USAGE:

    indraa [flags]

POSITIONAL ARGUMENTS:

    target                The target domain, IP address, or CIDR range to scan

FLAGS:
    -p, --ports             string    Ports to scan (e.g. 22,80,443 or 21-30)
    -oX, --output-xml                 Output scan in XML format
    -oJ, --output-json                Output scan in JSON format
    -oN, --output-normal              Output scan in normal text format
    -oP, --output-port-only           Output only IP and port in format ip:port
    -iL, --input-list       string    Input from list of hosts/networks
    -h, --help                        Show this help message and exit

```

## Usage

To use `Indraa`, run the following command:

```python
python3 indraa.py 1.1.1.1

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa  scan report for 1.1.1.1
Host is up

Ports found: 53, 80, 443, 2082, 2083, 2086, 2087, 8443, 8880

PORT      STATE  SERVICE      VERSION      TECHNOLOGIES

53/tcp    open   domain       unknown      unknown
80/tcp    open   http         unknown      Cloudflare
443/tcp   open   https        unknown      Cloudflare
2082/tcp  open   infowave     unknown      Cloudflare
2083/tcp  open   http         unknown      Cloudflare
2086/tcp  open   gnunet       unknown      Cloudflare
2087/tcp  open   http         unknown      Cloudflare
8443/tcp  open   https-alt    unknown      Cloudflare
8880/tcp  open   cddbp-alt    unknown      Cloudflare

Scan completed in 63.36 seconds
```

### If your host has some vulnerability

```
python3 indraa.py hide.ip.add.res

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up

Ports found: 80

PORT      STATE  SERVICE      VERSION      TECHNOLOGIES
80/tcp    open   http         1.19.0       unknown


Vulnerabilities:
- CVE-2021-23017
- CVE-2023-44487
- CVE-2021-3618
```

### To get output in json

```python
python3 indraa.py hide.ip.add.ress -oJ

Starting indraa 1.0 ( https://github.com/R0X4R/indraa ) at 2024-00-00 00:00:00
indraa scan report for hide.ip.add.ress
Host is up

{
    "host": {
        "status": "up",
        "address": "hide.ip.add.ress"
    },
    "ports": [
        {
            "port": "80",
            "state": "open",
            "service": "http",
            "version": "1.19.0",
            "technologies": [
                "unknown"
            ]
        }
    ],
    "start_time": "2024-00-00 00:00:00",
    "target": "hide.ip.add.ress",
    "host_status": "up",
    "duration": "33.25",
    "vulnerabilities": [
        "CVE-2021-23017",
        "CVE-2023-44487",
        "CVE-2021-3618"
    ]
}
```

## Additional Usage Examples

### Scanning Multiple Targets

You can scan multiple targets by providing a list of hosts or networks:

```bash
python3 indraa.py -iL targets.txt
```

Where `targets.txt` contains a list of IP addresses or domain names.

### Scanning from Standard Input

You can also provide input directly from the command line:

```bash
echo hi.de.ip.ad | python3 indraa.py
```

### Specifying Ports to Scan

To scan specific ports, use the `-p` flag:

```bash
python3 indraa.py 1.1.1.1 -p 22,80,443
```

### Output Formats

indraa supports multiple output formats. Here are some examples:

- **XML Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oX
    ```

- **JSON Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oJ
    ```

- **Normal Text Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oN
    ```

- **Port-Only Format**:
    ```bash
    python3 indraa.py 1.1.1.1 -oP
    ```

<br>

## License

This project is licensed under the MIT License. To view a copy of this license, visit [https://opensource.org/licenses/MIT](https://opensource.org/licenses/MIT).

The MIT License is a permissive free software license that allows users to do almost anything they want with the project, such as making and distributing closed-source versions. It also provides an express grant of patent rights from contributors to users. However, it also comes with a limitation of liability and warranty disclaimer, meaning the software is provided "as is" without any guarantees.


