Useful tools for Penetration Testing.
- Tested on Debian 8.x & Kali Linux
- Python 2.x
- termcolor
- requests
- Burp Pro
- Nessus
- Nmap
- Nikto
- sslscan
- dirb
- netdiscover
- curl
- netcat (nc)
- arp-scan
- p0f
- stunnel
- wget
- socat
- whatweb
- sqlmap
- json.sh - Merge all fuzzdb-project json payloads into one file.
- lfi.sh - Merge all fuzzdb-project lfi payloads into one file.
- create-cmd.sh - Create specific command injection payloads using fuzzdb-project os-command template.
- os-cmd-execution-linux.sh - Merge all fuzzdb-project linux os-command-execution payloads into one file.
- os-cmd-execution-osx.sh - Merge all fuzzdb-project osx os-command-execution payloads into one file.
- os-cmd-execution-windows.sh - Merge all fuzzdb-project windows os-command-execution payloads into one file.
- os-cmd-execution-unix.sh - Merge all fuzzdb-project unix os-command-execution payloads into one file.
- path-traversal.sh - Merge all fuzzdb-project path-traversal payloads into one file.
- sqli-blind.sh - Merge all fuzzdb-project sqli blind payloads into one file.
- sqli-detect.sh - Merge all fuzzdb-project sqli detect payloads into one file.
- sqli-exploit.sh - Merge all fuzzdb-project sqli exploit payloads into one file.
- xml.sh - Merge all fuzzdb-project xml payloads into one file.
- xpath.sh - Merge all fuzzdb-project xpath payloads into one file.
- xss.sh - Merge all fuzzdb-project xss payloads into one file.
- email.sh - Merge all fuzzdb-project email payloads into one file.
- html-js.sh - Merge all fuzzdb-project html and javascript payloads into one file.
- unicode.sh - Merge all fuzzdb-project unicode payloads into one file.
- secure-headers-checker.py - Test OWASP HTTP Secure Headers.
- web-headers-null.sh - Check web headers for OS details. Send null.
- banner-grabbing.sh - Banner grabbing - Check web headers for OS details.
- web-headers-malformed.sh - Check web headers for OS details. Malformed request.
- web-headers-malformed-2.sh - Check web headers for OS details. Malformed request.
- nessus-helper.py - Nessus helper
- nikto-scan-http.sh - Scan HTTP service using nikto.
- nikto-scan-https.sh - Scan HTTPS service using nikto.
- dir-scanner.sh - Web content scanning using dirb.
- content-type-checker.py - Test supported Content-Types using requests from Burp.
- curl-get.sh - Make GET requests using curl.
- curl-post.sh - Make POST requests using curl.
- curl-delete.sh - Make DELETE requests using curl.
- curl-put.sh - Make PUT requests using curl.
- curl-options.sh - Make OPTIONS requests using curl.
- robots.sh - Retrieve robots.txt. HTTP.
- robots-ssl.sh - Retrieve robots.txt. HTTPS.
- ssl-scan.sh - Query SSL services using sslscan.
- discover-live-hosts.sh - Discover live hosts.
- discover-local-live-hosts-1.sh - Discover local network's live hosts using netdiscover.
- discover-local-live-hosts-2.sh - Discover local network's live hosts using arp-scan.
- passive-discover-local-live-hosts.sh - Discover local network's live hosts passively using p0f.
- discover-local-live-hosts-scada.sh - Discover local network's live hosts during ICS/SCADA PT using arp-scan.
- passive-discover-local-live-hosts.sh - Discover local network's live hosts passively using p0f.
- tcp-ports-scan-1000.sh - Scan 1000 most common TCP ports.
- tcp-ports-scan-1000-delay.sh - Scan 1000 most common TCP ports. Send packets no faster than 1 per second.
- tcp-ports-scan-full.sh - Scan all 65535 TCP ports.
- tcp-ports-scan-full-delay.sh - Scan all 65535 TCP ports. Send packets no faster than 1 per second.
- tcp-services-scan.sh - Identify services running on a list of open TCP ports.
- tcp-services-scan-1000.sh - Identify services running on 1000 most common TCP ports.
- udp-ports-scan-1000.sh - Scan 1000 most common UDP ports.
- udp-services-scan.sh - Identify services running on a list of open UDP ports.
- udp-services-scan-1000.sh - Identify services running on 1000 most common UDP ports.
- git clone https://github.com/maldevel/PenTestKit.git
- pip install -r requirements.txt
./json.sh
./lfi.sh
./create-cmd.sh <command>
./os-cmd-execution-linux.sh
./os-cmd-execution-osx.sh
./os-cmd-execution-windows.sh
./os-cmd-execution-unix.sh
./path-traversal.sh
./sqli-blind.sh
./sqli-detect.sh
./sqli-exploit.sh
./xml.sh
./xpath.sh
./xss.sh
./email.sh
./html-js.sh
./unicode.sh
python secure-headers-checker.py -H http://example.com
python secure-headers-checker.py -H https://example.com -x http://127.0.0.1:8080
python secure-headers-checker.py -H http://127.0.0.1
./web-headers-null.sh example.com 443
./banner-grabbing.sh example.com 443
./web-headers-malformed.sh example.com 443
./web-headers-malformed-2.sh example.com 443
python nessus-helper.py -n https://<nessus.scanner.url>:8834 -u <nessus_username> -l
./nikto-scan-http.sh example.com 80
./nikto-scan-https.sh example.com 443
./dir-scanner.sh http://example.com
python content-type-checker.py -t lists/common-content-types.list -r requests/myrequest.req -o results.txt -x http://127.0.0.1:8080
python content-type-checker.py -t ../fuzzdb/attack/mimetypes/MimeTypes.txt -r requests/myrequest.req -o results.txt -x http://127.0.0.1:8080
./curl-get.sh 'Accept: application/json' 'Cookie: blah blah' 'http://127.0.0.1:8080' 'https://example.com'
./curl-post.sh 'Accept: application/json' 'Content-Type: application/x-www-form-urlencoded' 'Cookie: blah blah' 'param1=value1¶m2=value2' 'http://127.0.0.1:8080' 'https://example.com'
./curl-delete.sh 'Accept: application/json' 'Cookie: blah blah' 'http://127.0.0.1:8080' 'https://example.com'
./curl-put.sh 'Accept: application/json' 'Content-Type: application/json' 'Cookie: blah blah' '{"param1":"value1","param2":"value2"}' 'http://127.0.0.1:8080' 'https://example.com'
./curl-options.sh http://127.0.0.1:8080 https://example.com:8443
./robots.sh example.com
./robots-ssl.sh example.com
./ssl-scan.sh example.com
sudo ./discover-live-hosts.sh 192.168.1.0/24
sudo ./discover-local-live-hosts-1.sh eth0 192.168.1.0/24
sudo ./discover-local-live-hosts-2.sh eth0 192.168.1.0/24
sudo ./passive-discover-local-live-hosts.sh eth0
sudo ./discover-local-live-hosts-scada.sh eth0 192.168.1.0/24
./tcp-ports-scan-1000.sh example.com
./tcp-ports-scan-1000-delay.sh example.com
./tcp-ports-scan-full.sh example.com
./tcp-ports-scan-full-delay.sh example.com
./tcp-services-scan.sh example.com 22,80,443
./tcp-services-scan-1000.sh example.com
./udp-ports-scan-1000.sh example.com
./udp-services-scan.sh example.com 68,111,137
./udp-services-scan-1000.sh example.com
POST uri HTTP/1.1
Host: example.com
Accept: **************
Accept-Language: en
Content-Type: ************
Cookie: *************
Content-Length: ******
post data blah blah
- web_headers_checker.py from nma-io.
- AutoNessus from redteamsecurity.