Penta - Open Source All-In-One CLI Tool To Automate Pentesting


Penta is is Pentest automation tool using Python3.It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers. Installation Install requirements: Penta requires the following packages Python3.7 pipenv Resolve python package dependency. $ pipenv install If you dislike pipenv: $ pip install -r requirements.txt Usage $ pipenv run start <options> If you dislike pipenv: $ python penta/ Usage: List options $ pipenv run start -h usage: [-h] [-target TARGET] [-ports PORTS] [-proxy PROXY] Penta is Pentest automation tool optional arguments: -h, --help show this help message and exit -target TARGET Specify target IP / domain -ports PORTS Please, specify the target port(s) separated by comma. Default: 21,22,25,80,110,443,8080 -proxy PROXY Proxy[IP:PORT] Usage: Main menu [ ] === MENU LIST =========================================== [0] EXIT [1] Port scanning Default: 21,22,25,80,110,443,8080 [2] Nmap & vuln scanning [3] Check HTTP option methods [4] Grab DNS server info [5] Shodan....

October 21, 2019


Hakin9 TEAM
Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Notify of
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.