Skip to content
This repository has been archived by the owner on Jan 25, 2019. It is now read-only.
Utku Sen edited this page Apr 26, 2017 · 1 revision

Welcome to Leviathan's wiki. Following documentations will allow you to use the Leviathan with all features.

Getting Started

  1. For installing Leviathan on a specific system, visit installation page.
  2. You need to generate "Google Custom Search" "Shodan" and "Censys" API keys in order to use the program. For details, visit Obtaining The API Keys page.
  3. After key generation is finished, you need to provide those keys to Leviathan. Visit "Configuration menu" for tutorial.
  4. Leviathan is ready to use.

Usage

-For discovering devices and web sites, visit "Discovery Menu" page

-For running specific attacks to pre-discovered targets, visit "Attack Menu" page

-For checking discovered&compromised devices, visit "Assets Menu" page

-For more details about writing your own custom exploit, visit "Custom Exploits" page