A really simple HTTP(S) screenshoter using Selenium and Chrome Driver.
I enjoyed a lot webscreenshot but was bored
of empty screenshots produced when screenshoting HTTPS websites with a self-signed certificate.
As maaaaz explained, the reason is that the --ignore-certificate-errors
option doesn't work and will never work anymore: the solution is to use a proper webdriver.
It supports proxy - http or socks (e.g. -p socks5://127.0.0.1:5000
). It is multi-threaded and double-check if the service is down or the communication is filtered and doesn't take screenshots of empty pages or pages with useless text content.
A host to screenshot list - protocol://ip_or_hostname:port - or an XML nmap output has to be given as input to Paparazzi.
The results can be reviewed thanks to a simple bootstrap gallery, ordered by HTML titles - so likely interface types...
Finally, a JSON structure mapping hosts with interface types will also be part of the output. It is based on keywords matching and has to be completed - work-in-progress... This structure will be used as input for a future default password bruteforce script.
This repository contains the great ERNW's nmap-parse-output as submodule.
- Python 3
- xsltproc
- Selenium:
pip install -U selenium
- colorama:
pip install -U colorama
- Chrome Driver which has to be in PATH...
$ git clone https://github.com/bik3te/Paparazzi --recurse-submodules