By this DevSecOps Based' tool you can-> Recon, vuln discovery, brute force, attack surface mapping, reporting, exploit probing,Asset inventory, vuln management, credential hygiene, exposure monitoring, IR, compliance.
📫 How to reach me Website , https://tanjib-portfolio-website.vercel.app/, http://mrechofi.github.io/Tanjib_portfolio_website/, tanjibisham777@gmail.com & tanjibisham888@gmail.com
BannerGrapV2.1.mp4
BannerGrap V2 is a powerful, modular, and extensible Golang & DevSecOps based security scanner designed for advanced reconnaissance and vulnerability assessment across a wide range of network services. It combines classic banner grabbing with active vulnerability probing, CVE/exploit matching, brute force stubs, and reporting, making it a valuable tool for penetration testers, red teamers, and defenders.
//~// You can run this tool in three ways:
sudo apt install git
# Install golang
sudo apt install golang
# Clone My Repo
git clone https://github.com/MrEchoFi/BannerGrapV2.git
# Change Directory
cd BannerGrapV2
# run the tool and follow its 'bannerGrap_Guid or Usage.txt';
but specially read & follow this-> 'New_advanced_bashScripts.md' for full usage of guidelines.
By this guidline u can use this tool in aggressive mode, basic mode and intermediate mode.
go run bannerGrap.go
or, run this as-> go build bannerGrap.go
then run this, ./bannerGrap
//follow the guidline- 'New_advanced_bashScripts.md' for better bash scripting ..
git clone <github link>
cd BannerGrapV2
# run the tool and follow its 'bannerGrap_Guid or Usage.txt';
but specially read & follow this-> 'New_advanced_bashScripts.md' for full usage of guidelines.
By this guidline u can use this tool in aggressive mode, basic mode and intermediate mode.
# Build the Docker image
docker build -t bannerv2 .
then run:
docker run bannerv2
### Test Tool in Container with more clean (Optional):
docker run --rm bannerv2
NOTE: follow the guidline- 'New_advanced_bashScripts.md' for better bash scripting.
### Minikube Setup:
# This will spin up your local K8s cluster using your WSL2 Docker
minikube start --driver=docker
# Optional: enable the default storageclass and dashboard
minikube addons enable default-storageclass
minikube addons enable dashboard
chmod +x start_banner.sh
then run:
./start_banner.sh
# run the tool and follow its 'bannerGrap_Guid or Usage.txt';
but specially read & follow this-> 'New_advanced_bashScripts.md' for full usage of guidelines.
By this guidline u can use this tool in aggressive mode, basic mode and intermediate mode.
# Convert using 'chmod':
chmod +x run_bannerv2.sh
# THEN Run like this:
./run_bannerv2.sh <target ip> <port> --proto http https --threads 20 --timeout 8 --o scan.csv --v
//follow the guidline- 'New_advanced_bashScripts.md' for better bash scripting ..
