Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Web Security
  3. TIDoS-Framework

TIDoS-Framework

GPL-3.0Pythonv2.0-beta2

A comprehensive offensive web application penetration testing framework with 108 modules covering reconnaissance to vulnerability analysis.

GitHubGitHub
1.9k stars395 forks0 contributors

What is TIDoS-Framework?

TIDoS-Framework is an offensive web application penetration testing framework designed to automate and streamline security assessments. It provides a complete toolkit for ethical hackers and security professionals to identify vulnerabilities and misconfigurations in web applications through a multi-phase approach covering reconnaissance, scanning, vulnerability analysis, exploitation, and auxiliary tasks.

Target Audience

Ethical hackers, security professionals, and penetration testers who need a comprehensive, automated toolkit for web application security assessments. It is specifically designed for those conducting authorized security audits and vulnerability assessments.

Value Proposition

Developers choose TIDoS for its all-in-one, modular design with 108 total modules covering the entire penetration testing workflow, its performance boost through multiprocessing, and flexible interfaces including a Metasploit-like console, Qt5 GUI, and CLI. Its integration with APIs like Shodan and Censys, along with Tor support for anonymity, provides a versatile and extensible framework.

Overview

The Offensive Manual Web Application Penetration Testing Framework.

Use Cases

Best For

  • Conducting comprehensive reconnaissance and OSINT gathering on web applications using 50 dedicated modules.
  • Automating vulnerability detection for common web vulnerabilities like SQL injection, XSS, file inclusion, and command injection.
  • Performing scanning and enumeration tasks including WAF detection, port scanning, SSL analysis, and subdomain takeover checks.
  • Streamlining multi-phase penetration testing workflows with automated 'Auto-Awesome' modules for each phase.
  • Conducting security assessments with enhanced privacy through Tor network support for piping attacks.
  • Leveraging API integrations (Shodan, Censys, Google) for enhanced reconnaissance and threat intelligence gathering.

Not Ideal For

  • Penetration testers needing immediate, production-ready exploitation tools due to only one developmental exploit module
  • Teams in locked-down environments where installing numerous system dependencies (tor, konsole, etc.) is restricted
  • Security professionals seeking a lightweight, single-purpose scanner for quick assessments without framework overhead
  • Beginners without prior experience in command-line security tools due to the Metasploit-like interface complexity

Pros & Cons

Pros

Comprehensive Module Coverage

With 108 total modules spanning reconnaissance to exploitation, including 50 reconnaissance modules, it offers extensive testing capabilities for full-spectrum assessments, as detailed in the features list.

Performance via Multiprocessing

Uses multiprocessing to speed up scans, providing a significant performance boost for parallelized attacks, as highlighted in the main new features section.

Flexible Interface Options

Offers Metasploit-like console, Qt5 GUI, and alternative CLI, allowing users to choose based on workflow; the README specifies launch commands like `python3 tidv2` for GUI.

Integrated API Keys

Includes pre-set API keys for Shodan, Censys, and others by default, enabling advanced reconnaissance without manual setup, as noted in the 'Getting Started' section.

Cons

Limited Exploitation Suite

The exploits castle has only one exploit labeled 'purely developmental,' severely restricting its use for active exploitation phases compared to tools like Metasploit.

Complex Installation Process

Requires installing multiple system dependencies (e.g., tor, konsole via apt-get) and Python packages, which can be error-prone and time-consuming, as outlined in the manual installation steps.

Incomplete Anonymity Features

Tor support is noted as 95% done and not implemented everywhere in the README, reducing reliability for users requiring consistent privacy across all modules.

Frequently Asked Questions

Quick Stats

Stars1,853
Forks395
Contributors0
Open Issues14
Last commit3 years ago
CreatedSince 2018

Tags

#web-security#vulnerability-analysis#osint#tor-integration#vulnerability-detection#penetration-testing#reconnaissance#vulnerability-scanner#python3#automated-testing#security-audit#footprinting#exploitation#ethical-hacking

Built With

T
Tor
Q
Qt5
N
Nmap
M
MariaDB
P
Python
D
Docker

Included in

Web Security13.2k
Auto-fetched 1 day ago

Related Projects

AstraAstra

Automated Security Testing For REST API's

Stars2,644
Forks412
Last commit1 year ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub