Home

Awesome

<h1 align="center"> <br> <img src="https://images-wixmp-ed30a86b8c4ca887773594c2.wixmp.com/f/d06120c6-10fa-49a6-8e5a-6de6024c71b5/ddaf69q-cbe86b59-8049-40b6-96ca-bb1929a0b073.gif?token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJzdWIiOiJ1cm46YXBwOjdlMGQxODg5ODIyNjQzNzNhNWYwZDQxNWVhMGQyNmUwIiwiaXNzIjoidXJuOmFwcDo3ZTBkMTg4OTgyMjY0MzczYTVmMGQ0MTVlYTBkMjZlMCIsIm9iaiI6W1t7InBhdGgiOiJcL2ZcL2QwNjEyMGM2LTEwZmEtNDlhNi04ZTVhLTZkZTYwMjRjNzFiNVwvZGRhZjY5cS1jYmU4NmI1OS04MDQ5LTQwYjYtOTZjYS1iYjE5MjlhMGIwNzMuZ2lmIn1dXSwiYXVkIjpbInVybjpzZXJ2aWNlOmZpbGUuZG93bmxvYWQiXX0.n65EW1oBAX5Uc1gs3SvkpXvS-3Tc1uaP7BRVhSj04DE" width="200px" alt="Erebus"> </h1> <h4 align="center">Fast and customisable parameter based vulnerability scanner based on simple YAML Rules</h4> <p align="center"> <a href="https://goreportcard.com/report/github.com/ethicalhackingplayground/erebus"><img src="https://goreportcard.com/badge/github.com/ethicalhackingplayground/erebus"></a> <a href="https://github.com/ethicalhackingplayground/erebus/issues"><img src="https://img.shields.io/badge/contributions-welcome-brightgreen.svg?style=flat"></a> <a href="https://github.com/ethicalhackingplayground/erebus/releases"><img src="https://img.shields.io/github/release/ethicalhackingplayground/erebus"></a> <a href="https://twitter.com/z0idsec"><img src="https://img.shields.io/twitter/follow/z0idsec.svg?logo=twitter"></a> <a href="https://discord.gg/MQWCem5b"><img src="https://img.shields.io/discord/862900124740616192.svg?logo=discord"></a> </p> <p align="center"> <a href="#how-templates-work">How</a> • <a href="#install-erebus">Install</a> • <a href="#erebus-templates">Templates</a> • <a href="#setup-erebus-interceptor">Interceptor</a> • <a href="#usage">Usage</a> • <a href="https://discord.gg/MQWCem5b">Join Discord</a> </p>

Erebus is used to test every parameter across targets based on Yaml templates leading to zero false positives and providing fast scanning on large number of hosts. Erebus offers many useful features including an intercepting proxy which allows researchers to browse the web, click on links and erebus will test every parameter that passes through the proxy.

We have a dedicated repository that houses various types of vulnerability templates.

How templates work

<h3 align="center"> <img src="static/yaml.png" alt="yaml-templates-flow" width="700px"></a> </h3>

Install Erebus

▶  GO111MODULE=off go get -u -v github.com/ethicalhackingplayground/erebus/erebus

Install Templates

▶  erebus -ut
<table> <tr> <td>

Erebus Templates

Erebus has had built-in support for automatic update/download templates (https://github.com/ethicalhackingplayground/erebus/releases/latest). Erebus-Templates project provides a community-contributed list of ready-to-use templates that can be used with part of your testing.

You may use the -ut flag to update the nuclei templates at any time.

</td> </tr> </table> <table> <tr> <td>

Setup Erebus Interceptor

Make sure to setup a proxy in your browser before you use the erebus interceptor for firefox go to

▶ Settings ▶ General ▶ Network Settings ▶ Manual proxy configuration

type in 127.0.0.1 in HTTP Proxy then for the port type in 8080 make sure to enable Also use this proxy for FTP and HTTPS

</td> </tr> </table> <table> <tr> <td>

Install the SSL Certificates to use HTTPS

I have provided the certificates for you to use for HTTPS testing, all you need to do is install these by:

▶ Settings ▶ Privacy & Security ▶ Certificates ▶ View Certificates ▶ Import ▶

Select the .crt file in the erebus directory and proceed by trusting and installing.

</td> </tr> </table>

Usage

erebus -h

This will display help for the tool. Here are all the switches it supports.

<details> <summary> 👉 erebus help menu 👈</summary>
Usage of erebus:
  -burp-sitemap string
        scan burp xml sitemap (without base64 decoded)
  -c int
        the number of concurrent requsts (default 100)
  -crawl
        crawl through each intercepted request
  -depth int
        the crawl depth (default 5)
  -interceptor
        intercept the requests through the proxy and test each parameter
  -o string
        output results to a file
  -p string
        the port on which the interception proxy will listen on (default "8080")
  -scope string
        the scope for the proxy intercetor
  -secure
        determaines if the connection is secure or not
  -silent
        silent (only show vulnerable urls)
  -t string
        use the templates with all our yaml rules instead
  -tc string
        Use other tools by executing an os command (default "qsreplace")
  -ut
        Install or update the erebus-templates
</details>

Usage

Here are a few examples on how to use the erebus scanner for part of your testing.

Intercept and Crawl on HTTP

Scanning for XSS vulnerabilities using the intercepting proxy with all of paypal inscope while crawling on HTTP domains.

▶ erebus -t erebus-templates/xss-reflected.yaml -interceptor -crawl -scope ".*.\.paypal.com"

Intercept and Crawl on HTTPS

Scanning for XSS vulnerabilities using the intercepting proxy with all of paypal inscope while crawling on HTTPS domains.

▶ erebus -t erebus-templates/xss-reflected.yaml -interceptor -crawl -secure -scope ".*.\.paypal.com"

Tool Chaining Usage

Scanning for XSS vulnerabilities across range of subdomains using subfinder and Gau

▶ echo "paypal.com" | gau | erebus -t erebus-templates/xss-reflected.yaml

Scan subdomains from a file in the format https:// or http://

▶ cat alive | gau | erebus -t erebus-templates/xss-reflected.yaml

asciicast

License

Erebus is distributed under GPL-3.0 License

<h1 align="left"> <a href="https://discord.gg/MQWCem5b"><img src="static/Join-Discord.png" width="380" alt="Join Discord"></a> </h1>