Repository: windro-exe/redfox Files analyzed: 8 Estimated tokens: 696 Directory structure: └── windro-exe-redfox/ ├── README.md ├── main.py ├── core/ │ ├── exploit.py │ ├── recon.py │ ├── report.py │ └── scanner.py ├── data/ │ └── payloads.json └── utils/ └── helpers.py ================================================ FILE: README.md ================================================ # RedFox - Offensive Security Toolkit RedFox is a modular Python tool for automating recon, scanning, and basic exploitation tasks during offensive security engagements. ## Features - Subdomain and DNS recon - Nmap port scanning - Basic XSS testing - Report generation ## Usage ```bash python main.py ``` Ensure `nmap` is installed on your system. ================================================ FILE: main.py ================================================ from core import recon, scanner, exploit, report def main(): print("Welcome to RedFox - Offensive Security Toolkit") target = input("Enter target URL or IP: ") recon.run_recon(target) scanner.run_scan(target) exploit.run_exploit(target) report.generate_report(target) if __name__ == "__main__": main() ================================================ FILE: core/exploit.py ================================================ import requests def run_exploit(target): print(f"[+] Testing for basic XSS on {target}") try: xss_test = "" response = requests.get(target, params={"q": xss_test}) if xss_test in response.text: print("[!] XSS vulnerability detected!") else: print("[-] No basic XSS detected.") except Exception as e: print(f"[-] Exploit test failed: {e}") ================================================ FILE: core/recon.py ================================================ import socket import requests def run_recon(target): print(f"[+] Running recon on {target}") try: ip = socket.gethostbyname(target) print(f"[+] Resolved IP: {ip}") except Exception as e: print(f"[-] Failed to resolve IP: {e}") ================================================ FILE: core/report.py ================================================ def generate_report(target): print(f"[+] Generating report for {target}") with open(f"{target.replace('.', '_')}_report.txt", "w") as f: f.write("RedFox Security Report\n") f.write(f"Target: {target}\n") f.write("Scan completed. See terminal output for details.\n") ================================================ FILE: core/scanner.py ================================================ import subprocess def run_scan(target): print(f"[+] Scanning target: {target}") try: subprocess.run(["nmap", "-T4", "-F", target]) except Exception as e: print(f"[-] Scan failed: {e}") ================================================ FILE: data/payloads.json ================================================ { "xss": ["", ""], "sqli": ["' OR '1'='1", "'; DROP TABLE users; --"] } ================================================ FILE: utils/helpers.py ================================================ def print_banner(): print(""" ============================== RedFox Offensive Toolkit ============================== """)