All Projects → 01rabbit → Pakuri

01rabbit / Pakuri

Licence: gpl-3.0
Penetration test Achieve Knowledge Unite Rapid Interface

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Pakuri

Tigershark
Bilingual PhishingKit. TigerShark intergrates a vast array of various phishing tools and frameworks, from C2 servers, backdoors and delivery methods in multiple scripting languages in order to suit whatever your deployment needs may be.
Stars: ✭ 212 (+69.6%)
Mutual labels:  penetration-testing, pentest-tool, exploitation
Msploitego
Pentesting suite for Maltego based on data in a Metasploit database
Stars: ✭ 124 (-0.8%)
Mutual labels:  penetration-testing, pentest-tool, metasploit
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-80%)
Mutual labels:  penetration-testing, vulnerabilities, pentest-tool
Nightingale
It's a Docker Environment for pentesting which having all the required tool for VAPT.
Stars: ✭ 119 (-4.8%)
Mutual labels:  penetration-testing, vulnerabilities, pentest-tool
Webkiller
Tool Information Gathering Write By Python.
Stars: ✭ 300 (+140%)
Mutual labels:  penetration-testing, pentest-tool, kali
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+1938.4%)
Mutual labels:  penetration-testing, metasploit, scanning
Eggshell
iOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+928.8%)
Mutual labels:  pentest-tool, exploitation, metasploit
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+907.2%)
Mutual labels:  penetration-testing, pentest-tool, metasploit
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-17.6%)
Mutual labels:  penetration-testing, pentest-tool, exploitation
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+2612.8%)
Mutual labels:  penetration-testing, pentest-tool, scanning
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-51.2%)
Mutual labels:  penetration-testing, vulnerabilities, exploitation
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+6101.6%)
Mutual labels:  penetration-testing, exploitation, vulnerabilities
Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+2908%)
Mutual labels:  penetration-testing, vulnerabilities, metasploit
Babysploit
👶 BabySploit Beginner Pentesting Toolkit/Framework Written in Python 🐍
Stars: ✭ 883 (+606.4%)
Mutual labels:  penetration-testing, pentest-tool, kali
Winpayloads
Undetectable Windows Payload Generation
Stars: ✭ 1,211 (+868.8%)
Mutual labels:  metasploit, kali
In Spectre Meltdown
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-31.2%)
Mutual labels:  penetration-testing, pentest-tool
Eyes.sh
Let's you perform domain/IP information gathering... in BASH! Wasn't it esr who said "With enough eyeballs, all your IP info are belong to us?"
Stars: ✭ 89 (-28.8%)
Mutual labels:  penetration-testing, pentest-tool
Fuxi
Penetration Testing Platform
Stars: ✭ 1,103 (+782.4%)
Mutual labels:  penetration-testing, pentest-tool
Devil
Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Stars: ✭ 88 (-29.6%)
Mutual labels:  metasploit, kali
Arissploit
Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-8.8%)
Mutual labels:  exploitation, vulnerabilities

PAKURI: Penetration Test Achieve Knowledge Unite Rapid Interface

logo
version License release-date sns BHASIA


Overview

PAKURI is a penetration test tool with a terminal user interface (TUI) that can be operated with just the keypad.

overview

Presentation

What's PAKURI

I've consulted many pen testing tools. I then took the good points of those tools and incorporated them into my own tools. In Japanese slang, imitation is also called "paku-ru".

ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)

  1. eat with a wide open mouth
  2. steal when one isn't looking, snatch, swipe
  3. copy someone's idea or design
  4. nab, be caught by the police

Wiktionary:ぱくる


Description

PAKURI is a semi-automated, user-friendly framework for penetration testing tools. Using only the keypad, you can use the penetration test tool like a game.
It's also a great introductory tool for beginners. Learn the flow of penetration testing with PAKURI without having to wrestle with confusing command lines and tools.


Your benefits

By using our PAKURI, you will benefit from the following.

For redteam:
(a) Red Teams can easily perform operations such as information enumeration and vulnerability scanning.
(b) Visualizing the survey results is possible only with the numeric keypad.

For blueteam:
(c) The Blue Team can experience a dummy attack by simply operating the numeric keypad even they do not have any penetration testing skill.

For beginner:
(d) PAKURI has been created to support the early stages of penetration testing. These can be achieved with what is included in Kali-Tools. It can be useful for training the entry level pentesters.

NOTE
If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.

Features

Intelligence gathering

Vulnerability analysis

Exploit

Misc

  • Visualize
  • CUI-GUI switching
    PAKURI can be operated with CUI and does not require a high-spec machine, so it can be operated with Raspberry Pi.

Setup

  1. Update your apt and install git:

    [email protected]:~$ sudo apt update
    [email protected]:~$ sudo apt install git
    
  2. PAKURI uses the Docker. If you don't have it installed, you can install it by following the steps below.

    1. Install Docker. (I've been promoted to administrator privileges to reduce the amount of work involved. Add the GPG key from the official Docker repository to the system.

      -fsSL https://download.docker.com/linux/debian/gpg | apt-key add -
      
    2. Add the Docker repository to the APT source. (kali base debian)

      echo 'deb [arch=amd64] https://download.docker.com/linux/debian buster stable' > /etc/apt/sources.list.d/docker.list
      
    3. Update the repository and install docker-ce and docker-compose.

      [email protected]:~$ sudo apt update
      [email protected]:~$ sudo apt install docker-ce -y
      [email protected]:~$ sudo apt install docker-compose -y
      
  3. Download the PAKURI installer from the PAKURI Github repository:

    [email protected]:~$ git clone https://github.com/01rabbit/PAKURI.git
    
  4. CD into the PAKURI folder and run the setup script:

    [email protected]:~$ cd PAKURI  
    [email protected]:~/PAKURI$ chmod +x setup.sh
    [email protected]:~/PAKURI$ ./setup.sh
    
  5. Install OpenVAS/GVM if haven’t done so:

    sudo apt install -y openvas
    or
    sudo apt install -y gvm
    
  6. Initialize Faraday if you haven't done so:

    sudo systemctl start postgresql
    sudo faraday-manage initdb | tee faraday-setup.log
    
  7. Include the credentials in pakuri.conf:

    [email protected]:~/PAKURI$ vim pakuri.conf
    ...snip...
    
    # OpenVAS
    OMPUSER="admin"
    OMPPASS="admin"
    
  8. Faraday-server is started. After starting up, access from your browser and register your workspace:

    [email protected]:~/PAKURI$ systemctl start faraday.service  
    [email protected]:~/PAKURI$ firefox localhost:5985
    
  9. Register the workspace you just registered in pakuri.conf:

    [email protected]:~/PAKURI$ vim pakuri.conf
    ...snip...
    
    # Faraday
    WORKSPACE="test_workspace"
    

Usage

[email protected]:~/PAKURI$ ./pakuri.sh

PAKURI is not fully automated and requires the user interactions, to make sure to proceed the pentest and to avoid any unintended attack or trouble.


Operation check environment

  • OS: KAli Linux 2020.1
  • Memory: 8.0GB

Known Issues

  • This is intended for use Kali Linux. Operation on other OS is not guaranteed.
  • Due to major changes in OpenVAS, the commands used have changed. This will be fixed in the next version.

Contributors

If you have some new idea about this project, issue, feedback or found some valuable tool feel free to open an issue for just DM me via @Mr.Rabbit or @PAKURI.

Special thanks

Thanks to @cyberdefense_jp for contribute so many awesome ideas to this tool.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].