
Penta is is Pentest automation tool using Python3.It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers.
Installation
Install requirements:
Penta requires the following packages
- Python3.7
- pipenv
Resolve python package dependency.
$ pipenv install
If you dislike pipenv:
$ pip install -r requirements.txt
Usage
$ pipenv run start <options>
If you dislike pipenv:
$ python penta/penta.py
Usage: List options
$ pipenv run start -h
usage: penta.py [-h] [-target TARGET] [-ports PORTS] [-proxy PROXY]
Penta is Pentest automation tool
optional arguments:
-h, --help show this help message and exit
-target TARGET Specify target IP / domain
-ports PORTS Please, specify the target port(s) separated by comma.
Default: 21,22,25,80,110,443,8080
-proxy PROXY Proxy[IP:PORT]
Usage: Main menu
[ ] === MENU LIST ===========================================
[0] EXIT
[1] Port scanning Default: 21,22,25,80,110,443,8080
[2] Nmap & vuln scanning
[3] Check HTTP option methods
[4] Grab DNS server info
[5] Shodan host search
[6] FTP connect with anonymous
[7] SSH connect with Brute Force
[99] Change target host
- Port scanning
To check ports for a target. Log output supported. - Nmap
To check ports by additional means using nmap - Check HTTP option methods
To check the methods (e.g. GET,POST) for a target. - Grab DNS server info
To show the info about DNS server. - Shodan host search
To collect host service info from Shodan.
Request Shodan API key to enable the feature. - FTP connect with anonymous
To check if it has anonymous access activated in port 21.
FTP users can authenticate themselves using the plain text sign-in protocol (Typically username and password format), but they can connect anonymously if the server is configured to allow it. Anyone can log in to the server if the administrator has allowed an FTP connection with an anonymous login. - SSH connect with Brute Force
To check ssh connection to scan with Brute Force.
Dictionary data is indata/dict
. - Metasploit Frame Work [Auto Scan is Future Work!!!] To check useful msf modules from opened ports. Module DB is in
data/msf/module_list.db
Download tool: https://github.com/takuzoo3868/penta
Author

- Hakin9 is a monthly magazine dedicated to hacking and cybersecurity. In every edition, we try to focus on different approaches to show various techniques - defensive and offensive. This knowledge will help you understand how most popular attacks are performed and how to protect your data from them. Our tutorials, case studies and online courses will prepare you for the upcoming, potential threats in the cyber security world. We collaborate with many individuals and universities and public institutions, but also with companies such as Xento Systems, CATO Networks, EY, CIPHER Intelligence LAB, redBorder, TSG, and others.
Latest Articles
Blog2022.12.13What are the Common Security Weaknesses of Cloud Based Networks?
Blog2022.10.12Vulnerability management with Wazuh open source XDR
Blog2022.08.29Deception Technologies: Improving Incident Detection and Response by Alex Vakulov
Blog2022.08.25Exploring the Heightened Importance of Cybersecurity in Mobile App Development by Jeff Kalwerisky
Subscribe
0 Comments