Penta : Open Source All-In-One CLI Tool To Automate Pentesting

Penta is is Pentest automation tool using Python3. It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers.

Installation

Install requirements

penta requires the following packages.

  • Python3.7
  • pipenv

Resolve python package dependency.

$ pipenv install

If you dislike pipenv…

$ pip install -r requirements.txt

Also Read – ThreadBoat : Program Uses Thread Execution Hijacking to Inject Native Shellcode into a Standard Win32 Application

Usage

$ pipenv run start

If you dislike pipenv…

$ python penta/penta.py

Usage: List options

$ pipenv run start -h
usage: penta.py [-h] [-target TARGET] [-ports PORTS] [-proxy PROXY]

Penta is Pentest automation tool

optional arguments:
-h, –help show this help message and exit
-target TARGET Specify target IP / domain
-ports PORTS Please, specify the target port(s) separated by comma.
Default: 21,22,25,80,110,443,8080
-proxy PROXY Proxy[IP:PORT]

Usage: Main Menu

=== MENU LIST ===========================================
0 – EXIT
1 – Port scanning Default: 21,22,25,80,110,443,8080
2 – Nmap & vuln scanning
3 – Check HTTP option methods
4 – Grab DNS server info
5 – Shodan host search
6 – FTP connect with anonymous
7 – SSH connect with Brute Force
99 – Change target host

  • Port scanning
    To check ports for a target. Log output supported.
  • Nmap
    To check ports by additional means using nmap
  • Check HTTP option methods
    To check the methods (e.g. GET,POST) for a target.
  • Grab DNS server info
    To show the info about DNS server.
  • Shodan host search To collect host service info from Shodan. Request Shodan API key to enable the feature.
  • FTP connect with anonymous To check if it has anonymous access activated in port 21. FTP users can authenticate themselves using the plain text sign-in protocol (Typically username and password format), but they can connect anonymously if the server is configured to allow it. Anyone can log in to the server if the administrator has allowed an FTP connection with an anonymous login.
  • SSH connect with Brute Force To check ssh connection to scan with Brute Force. Dictionary data is in data/dict.
R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago