Skip to content

DevFoxxx/OmniScan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OmniScan

           _         _
          /x\       /x\
         /v\x\     /v\/\
         \><\x\   /></x/
          \><\x\ /></x/
  __ __  __|><\x/></x/___
 /##_##\/       \</x/    \__________
|###|###|  \         \    __________\
 \##|##/ \__\____\____\__/          \\
   |_|   |  |  | |  | |              \|
   \*/   \  |  | |  | /              /
  ____  __  __ _   _ ___ ____   ____    _    _   _ 
 / __ \|  \/  | \ | |_ _/ ___| / ___|  / \  | \ | |
| |  | | |\/| |  \| || |\___ \| |     / _ \ |  \| |
| |__| | |  | | |\  || | ___) | |___ / ___ \| |\  |
 \____/|_|  |_|_| \_|___|____/ \____/_/   \_\_| \_|
       > The All-in-One Recon & Wordlist Suite <

The All-in-One Recon & Wordlist Suite — a terminal-based orchestrator for ethical hackers and security researchers.

Instead of manually chaining tool after tool, OmniScan provides a single, clean TUI that lets you launch coordinated reconnaissance operations and generate custom wordlists in seconds.

⚠️ For authorized testing and ethical research only.
Always obtain explicit permission before scanning any target you do not own.


Features

  • Unified TUI — navigate all modules from a single interactive menu (powered by questionary + rich)
  • Real-time output streaming — see tool output as it happens, line by line
  • Auto-logging — every scan result is saved to exports/ with a timestamp
  • Tool validator — checks at startup which tools are available and warns about missing ones
  • Modular architecture — add new tools by dropping a file in modules/

Integrated Modules

Category Tools Purpose
Wordlist Generation Custom Engine Keyword-based dictionaries with permutations and length ranges
Web & Fuzzing ffuf · gobuster · wpscan Directory brute-forcing, CMS vulnerability scanning, parameter fuzzing
Network & Enum nmap · netcat · enum4linux Port scanning, banner grabbing, SMB/Windows enumeration
OSINT & Recon amass · sherlock · theHarvester Subdomain enum, username hunting, email/DNS collection
Info Gathering whois · nslookup Domain records and IP infrastructure analysis

Project Structure

OmniScan/
├── main.py                 # TUI entrypoint
├── requirements.txt        # Python dependencies
├── .env.example            # API key template (WPScan, Amass)
├── LICENSE                 # GNU GPL v3.0
├── README.md
│
├── core/
│   ├── executor.py         # Subprocess runner with streaming output & logging
│   └── generator.py        # Custom wordlist generation algorithm
│
├── modules/
│   ├── web.py              # ffuf, gobuster, wpscan
│   ├── network.py          # nmap, netcat, enum4linux
│   ├── osint.py            # amass, sherlock, theHarvester
│   └── info.py             # whois, nslookup
│
├── utils/
│   └── validator.py        # Checks tool availability via PATH
│
└── exports/                # Scan logs and generated wordlists (auto-created)

Installation

Prerequisites

  • Python 3.10+
  • The external tools you want to use installed in your PATH (see Tool Setup)

Steps

git clone https://github.com/DevFoxxx/OmniScan.git
cd OmniScan
pip install -r requirements.txt
python main.py

On first launch, OmniScan checks which tools are available and warns you about any that are missing.


Tool Setup

OmniScan wraps existing system tools — you need to install them separately.

# Kali Linux / Debian-based (most tools are pre-installed on Kali)
sudo apt install nmap netcat-openbsd enum4linux whois dnsutils amass gobuster

# Arch Linux (using pacman & AUR helper like yay)
sudo pacman -S nmap openbsd-netcat whois bind-tools gobuster theharvester
yay -S enum4linux amass sherlock-project-git

# ffuf
go install github.com/ffuf/ffuf/v2@latest

# Sherlock
pip install sherlock-project

# theHarvester
pip install theHarvester

# WPScan (requires Ruby)
gem install wpscan

For tools that require API keys (WPScan, Amass), copy .env.example to .env and fill in your credentials:

cp .env.example .env

Usage

python main.py
╔══════════════════════════════════════════════╗
║       OmniScan — Recon & Wordlist Suite      ║
╚══════════════════════════════════════════════╝

? Select a scan category:
  ❯ 1. Wordlist Generator
    2. Web Analysis & Fuzzing  [ffuf, gobuster, wpscan]
    3. Network Scanning        [nmap, netcat, enum4linux]
    4. OSINT & Recon           [amass, sherlock, theHarvester]
    5. Info Gathering          [whois, nslookup]
    6. Exit

Scan logs are saved automatically to exports/<tool>_<timestamp>.log.


Contributing

Pull requests are welcome. For major changes, please open an issue first.

  1. Fork the repo
  2. Create a feature branch: git checkout -b feat/my-module
  3. Commit your changes: git commit -m 'feat: add my-module'
  4. Push and open a PR

Legal

This tool is intended for authorized security testing only.
The author is not responsible for any misuse or damage caused by this software.
By using OmniScan, you agree to use it only on systems you have explicit permission to test.


License

GNU GPL v3.0 — © 2026 DevFoxxx

About

OmniScan is a Python-based automated reconnaissance tool. It combines an intelligent wordlist generator with top-tier security tools like FFUF, Amass, WPScan, and Nmap into a single, sleek TUI. It streamlines the scanning workflow, centralizes logging, and optimizes OSINT and Web Fuzzing in just a few clicks.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages