Categories: Kali Linux

PAKURI : Penetration Test Achieve Knowledge Unite Rapid Interface

Pakuri is a Penetration test Achieve Knowledge Unite Rapid Interface. Pentesters love to move their hands. However, I do not like troublesome work.

Simple work is performed semi-automatically with simple operations. It executes commands frequently used in penetration tests by simply operating the numeric keypad. You can test penetration as if you were playing a fighting game.

Abilities of “PAKURI”.

  • Intelligence gathering.
  • Vulnerability analysis.
  • Visualize.
  • Brute Force Attack.
  • Exploitation.

Your Benefits

By using our PAKURI, you will benefit from the following.

  • For redteam:
    • This saves you the trouble of entering frequently used commands.
    • Beginner pentester can learn the floe of attacks using PAKURI.
  • For blueteam:
    • Attack packets can be generated with a simple operation.

NOTE : If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.

Features

Also Read – Lazyrecon : Automate Your Reconnaissance Process In An Organized Fashion

Install

bash install.sh

Usage

root@kali:/usr/share/pakuri# ./pakuri.sh

Main

Scanning

Exploit

Config

Command

Operation Check Environment

  • OS: KAli Linux 2019.4
  • Memory: 8.0GB

This tool is not yet complete. It will be updated sequentially.

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

3 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

3 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

2 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

3 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago