This is a Grapical user interface (GUI) to automate the use of penetration test tools, for example: in reconnaissance mode, with a click you can enumerate domains using Amass, then it will check which hosts are alive and what are the ports open using Nmap, after it will take screenshots of the live websites.
- Amass (https://github.com/OWASP/Amass)
- Nmap (https://nmap.org)
- Screenshot websites
- Install python libraries:
pip install flask
pip install selenium
- Start the framework
python app.py
-
Shodan (https://www.shodan.io)
-
Metasploit (https://docs.rapid7.com/metasploit/pro-feature-api)
-
Burp Suite (https://portswigger.net/blog/burps-new-rest-api)
-
Nettacker (https://github.com/OWASP/Nettacker)
-
Brutespray (https://github.com/x90skysn3k/brutespray)
-
Acunetix (https://www.acunetix.com/blog/docs/managing-scans-python-acunetix-api)
-
Joomscan (https://github.com/OWASP/joomscan)
-
Wpscan (https://github.com/wpscanteam/wpscan)
-
Find endpoints using JS files
-
Add elegant template