Skip to content

choity85/pentest-suite

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

PenTest Suite - recon.sh

Overview

PenTest Suite is a fully automated reconnaissance and penetration testing helper script for Kali Linux and similar environments.
It integrates multiple security tools to streamline network, domain, and vulnerability scanning processes into a single report.

The script can perform:

  • Domain enumeration and subdomain discovery
  • IP-based scanning and network reconnaissance
  • Port scanning and service enumeration
  • WAF and web technology fingerprinting
  • Directory/file brute-forcing
  • URL and parameter discovery
  • Automated SQLi and XSS checks
  • SSL/TLS inspection
  • Vulnerability scanning (Nikto, Nuclei, Wapiti, Skipfish)
  • SMB and SNMP enumeration
  • Brute-force attack recommendations
  • SearchSploit exploit matching

Author

Mst. Choity Akter
📧 Email: choitya85@gmail.com
🔗 LinkedIn: www.linkedin.com/in/mst-choity-akter-572067316
🔗 Facebook: facebook.com/sayeeda.mariam


Requirements

Tested OS

  • Kali Linux
  • Parrot Security OS
  • Any Debian/Ubuntu-based system with required tools

Required Tools

Make sure these tools are installed (script will warn if missing):

subfinder, amass, nmap, nikto, gobuster, sqlmap, xsser, curl, hakrawler, wafw00f, whatweb, getallurls, ffuf, nuclei, wapiti, skipfish, enum4linux, smbclient, snmpwalk, traceroute, whois, searchsploit, masscan, hydra, feroxbuster

You can install missing tools with:

sudo apt install <toolname>
# OR for Go-based tools:
go install github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest

Also ensure common wordlists exist:

  • /usr/share/wordlists/dirb/common.txt
  • /usr/share/seclists/Discovery/Web-Content/raft-small-words.txt

Installation

git clone https://github.com/choity85/pentest-suite.git
cd pentest-suite
chmod +x recon.sh

Usage

./recon.sh

Step 1: Choose scan type:

1) Domain (Web Testing)
2) IP Address (Network Testing)

Step 2: Enter target (domain or IP).

The script will run multiple tools and store results.


Output

  • Reports are saved in reports/ as Markdown files.
  • Raw scan data is stored in:
    • scans/
    • subdomains/

Example Commands Generated

The script will suggest manual commands like:

hydra -l admin -P /usr/share/wordlists/rockyou.txt ssh://192.168.1.5
nc target.com 80

Disclaimer

Legal Notice

This tool is for authorized security testing and educational purposes only .

Unauthorized scanning of systems you do not own or have explicit permission to test is illegal and may lead to severe consequences.

The author is not responsible for any misuse of this tool.


License

This project is licensed under the MIT License.

See the LICENSE file for details.


About

This will cover you basic recon for pentesting

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages