Releases
v2.0
CRIMSON v2.0
From now on, Crimson acts as a docker container and the install.sh script is no longer supported
(Although, it should still works on Linux Mint)
Much of the code has been rewritten and improved.
Added project_valuation.sh, crimson_mass_nmap.py script to scripts directory
Added Ciphey tool
words directory has been improved
Added new options to all three modules to make them more "elastic".
Added rustscan in place of masscan
crimson_recon:
Added optional flags to this module, which are shown below:
-x # Domain bruteforcing (with words/dns wordlist)
-v # Virtual host discovering
-p # TCP ports scanning (1-65535)
-u # UDP ports scanning (nmap default ports)
-b # Third level subdomain bruteforcing
-y # Proxy urls.txt and live.txt to Burp (127.0.0.1:8080)
crimson_target
Added optional flags to this module, which are shown below:
-p # TCP (1-65535) / UDP (nmap default) ports scanning
-a # Automatic deletion of possible false-positive endpoints after brutefrocing with ffuf (this option needs more tests)
-y # Proxy urls.txt and ffuf.txt to Burp (127.0.0.1:8080)
A lot of modifications in the script
New workflow - check the documentation guidelines.
crimson_exploit
The script was rewritten
New tools being added, check scripts directory!
Faster CVE scanning
You can’t perform that action at this time.