Skip to content

By this tool Blue or Red team can do-> Recon, vuln discovery, brute force, attack surface mapping, reporting, exploit probing,Asset inventory, vuln management, credential hygiene, exposure monitoring, IR, compliance.

Notifications You must be signed in to change notification settings

MrEchoFi/BannerGrapV2

Repository files navigation

gif
logo

BannerGrapV2

By this DevSecOps Based' tool you can-> Recon, vuln discovery, brute force, attack surface mapping, reporting, exploit probing,Asset inventory, vuln management, credential hygiene, exposure monitoring, IR, compliance.

📫 How to reach me Website , https://tanjib-portfolio-website.vercel.app/, http://mrechofi.github.io/Tanjib_portfolio_website/, tanjibisham777@gmail.com & tanjibisham888@gmail.com

Video For Better Understanding:

BannerGrapV2.1.mp4

Deacription:

BannerGrap V2 is a powerful, modular, and extensible Golang & DevSecOps based security scanner designed for advanced reconnaissance and vulnerability assessment across a wide range of network services. It combines classic banner grabbing with active vulnerability probing, CVE/exploit matching, brute force stubs, and reporting, making it a valuable tool for penetration testers, red teamers, and defenders.

### Key Features:

Red Team (Offensive Security) Uses:

  • Reconnaissance & Enumeration: Quickly map out all live hosts, open ports, and running services across a target network.
  • Vulnerability Discovery: Automatically detect outdated, misconfigured, or vulnerable software (Ex:, Apache, Nginx, SSH, FTP, etc.) using banner analysis and CVE matching.
  • Active Exploitation Probing: Use built-in probes (Heartbleed, Shellshock, Log4Shell) to safely check for critical vulnerabilities.
  • Brute Force Attacks: Attempt SSH brute force with custom or well-known username/password lists to identify weak credentials and gain initial access.
  • Attack Surface Mapping: Identify hidden admin panels, anonymous FTP, and other risky exposures for further exploitation.
  • Automated Reporting: Generate structured reports (JSON, CSV, HTML) for documentation, pivoting, or sharing with the team.
  • Blue Team (Defensive Security) Uses:

  • Asset Inventory: Continuously scan internal and external networks to maintain an up-to-date inventory of all exposed services and their versions.
  • Vulnerability Management: Detect and prioritize patching of vulnerable software before attackers can exploit them.
  • Credential Hygiene: Test for weak or default SSH credentials across the environment to enforce strong authentication policies.
  • Exposure Monitoring: Identify accidental exposures (Ex: open admin panels, anonymous FTP, legacy protocols) and reduce the attack surface.
  • Incident Response: Use the tool during or after a breach to quickly assess what services and vulnerabilities were exposed.
  • Compliance & Audit: Provide evidence of regular scanning and vulnerability management for compliance frameworks (PCI, HIPAA, etc.).
  • Support:

  • Multi-Protocol Support: Scan HTTP, HTTPS, HTTP/2, WebSocket, FTP, SMTP, SSH, Telnet, and more.
  • Banner Grabbing: Collects service banners and fingerprints for rapid identification.
  • Signature-Based Vulnerability Detection: Detects 50+ popular server products and flags known vulnerable versions.
  • Active Probes: Includes safe, practical stubs for Heartbleed, Shellshock, and Log4Shell detection.
  • CVE/Exploit DB Integration: Matches banners to known CVEs using regex and can be extended for real DB integration.
  • Brute Force & Enumeration Stubs: Framework for credential brute forcing and service enumeration.
  • Reporting: Outputs results in JSON, CSV, and HTML formats for easy integration and sharing.
  • Concurrency: Fast, multi-threaded scanning for large-scale assessments.
  • Extensible: Plugin system and modular codebase for easy feature expansion.
  • ## Installation Process:

         //~// You can run this tool in three ways:
    

    @~1st way:

           sudo apt install git
    
         # Install golang
           sudo apt install golang
    
         # Clone My Repo
         git clone https://github.com/MrEchoFi/BannerGrapV2.git
    
         # Change Directory
            cd BannerGrapV2
    
         # run the tool and follow its 'bannerGrap_Guid or Usage.txt'; 
         but specially read & follow this-> 'New_advanced_bashScripts.md' for full usage of guidelines.
         By this guidline u can use this tool in aggressive mode, basic mode and intermediate mode.
           
           go run bannerGrap.go
    
           or, run this as-> go build bannerGrap.go
           then run this,    ./bannerGrap
    
           //follow the guidline- 'New_advanced_bashScripts.md' for better bash scripting .. 
    

    @~2nd way using "Docker" for Containerized performence with safety/lab:

           git clone <github link>
           cd BannerGrapV2
    
           # run the tool and follow its 'bannerGrap_Guid or Usage.txt'; 
           but specially read & follow this-> 'New_advanced_bashScripts.md' for full usage of guidelines. 
           By this guidline u can use this tool in aggressive mode, basic mode and intermediate mode.
    
           # Build the Docker image
           docker build -t bannerv2 .
    
           then run:
           docker run bannerv2
    
           ### Test Tool in Container with more clean (Optional):
           docker run --rm bannerv2 
    

    NOTE: follow the guidline- 'New_advanced_bashScripts.md' for better bash scripting.

    @~ Using Kubernetes + Docker:

        ### Minikube Setup:
         # This will spin up your local K8s cluster using your WSL2 Docker
         
            minikube start --driver=docker
    
         # Optional: enable the default storageclass and dashboard
         
            minikube addons enable default-storageclass
            minikube addons enable dashboard
    

    OR You can directly run this :

             chmod +x start_banner.sh
        then run: 
             ./start_banner.sh
    
             # run the tool and follow its 'bannerGrap_Guid or Usage.txt'; 
             but specially read & follow this-> 'New_advanced_bashScripts.md' for full usage of guidelines.  
             By this guidline u can use this tool in aggressive mode, basic mode and intermediate mode.
    
           # Convert using 'chmod':
              chmod +x run_bannerv2.sh
    
         # THEN Run like this:
              ./run_bannerv2.sh <target ip> <port> --proto http https --threads 20 --timeout 8 --o scan.csv --v
    
         //follow the guidline- 'New_advanced_bashScripts.md' for better bash scripting .. 
    

    How It Helps in the Cyber World:

  • Penetration Testing: Quickly identifies exposed and vulnerable services across networks.
  • Red Team Operations: Automates reconnaissance and initial access vector discovery.
  • Blue Team/Defensive Security: Assists in asset inventory, vulnerability management, and attack surface reduction.
  • DevSecOps Operation: Identify vulnerabilities and can do exploits, reconnaissance, find hidden banner & dir etc.
  • Education & Research: Teaches protocol analysis, vulnerability detection, and Go security programming.
  • About

    By this tool Blue or Red team can do-> Recon, vuln discovery, brute force, attack surface mapping, reporting, exploit probing,Asset inventory, vuln management, credential hygiene, exposure monitoring, IR, compliance.

    Resources

    Stars

    Watchers

    Forks

    Releases

    No releases published

    Packages

     
     
     

    Contributors

    Languages