Penta is is Pentest automation tool using Python3.
(Future!) It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers.
penta requires the following packages.
$ pipenv installIf you dislike pipenv...
$ pip install -r requirements.txt
$ pipenv run start <options>If you dislike pipenv...
$ python penta/penta.py
Usage: List options
$ pipenv run start -h
usage: penta.py [-h] [-target TARGET] [-ports PORTS] [-proxy PROXY]
Penta is Pentest automation tool
-h, --help show this help message and exit
-target TARGET Specify target IP / domain
-ports PORTS Please, specify the target port(s) separated by comma.
-proxy PROXY Proxy[IP:PORT]
Usage: Main menu
[ ] === MENU LIST ===========================================
 Port scanning Default: 21,22,25,80,110,443,8080
 Nmap & vuln scanning
 Check HTTP option methods
 Grab DNS server info
 Shodan host search
 FTP connect with anonymous
 SSH connect with Brute Force
 Change target host
- Port scanning
To check ports for a target. Log output supported.
To check ports by additional means using nmap
- Check HTTP option methods
To check the methods (e.g. GET,POST) for a target.
- Grab DNS server info
To show the info about DNS server.
- Shodan host search To collect host service info from Shodan. Request Shodan API key to enable the feature.
- FTP connect with anonymous To check if it has anonymous access activated in port 21. FTP users can authenticate themselves using the plain text sign-in protocol (Typically username and password format), but they can connect anonymously if the server is configured to allow it. Anyone can log in to the server if the administrator has allowed an FTP connection with an anonymous login.
- SSH connect with Brute Force To check ssh connection to scan with Brute Force. Dictionary data is in