Categories: Kali Linux

PAKURI : Penetration Test Achieve Knowledge Unite Rapid Interface

Pakuri is a Penetration test Achieve Knowledge Unite Rapid Interface. Pentesters love to move their hands. However, I do not like troublesome work.

Simple work is performed semi-automatically with simple operations. It executes commands frequently used in penetration tests by simply operating the numeric keypad. You can test penetration as if you were playing a fighting game.

Abilities of “PAKURI”.

  • Intelligence gathering.
  • Vulnerability analysis.
  • Visualize.
  • Brute Force Attack.
  • Exploitation.

Your Benefits

By using our PAKURI, you will benefit from the following.

  • For redteam:
    • This saves you the trouble of entering frequently used commands.
    • Beginner pentester can learn the floe of attacks using PAKURI.
  • For blueteam:
    • Attack packets can be generated with a simple operation.

NOTE : If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.

Features

Also Read – Lazyrecon : Automate Your Reconnaissance Process In An Organized Fashion

Install

bash install.sh

Usage

root@kali:/usr/share/pakuri# ./pakuri.sh

Main

Scanning

Exploit

Config

Command

Operation Check Environment

  • OS: KAli Linux 2019.4
  • Memory: 8.0GB

This tool is not yet complete. It will be updated sequentially.

R K

Recent Posts

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…

23 hours ago

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools…

23 hours ago

Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions

"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…

23 hours ago

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

2 days ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

2 days ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

2 days ago