Skip to content

Commit 88659af

Browse files
author
Fernando Fernández
committed
Added fuzzing option
1 parent f661357 commit 88659af

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

pentesting-multitool.py

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
#! /usr/bin/env python3
22

33
import sys
4-
from utility_scripts import dns_utility, whois_utility, shodan_utility, bannergrab_utility, flooder_utility
4+
from utility_scripts import dns_utility, whois_utility, shodan_utility, bannergrab_utility, flooder_utility, fuzzing_utility
55

66
def main():
77
if len(sys.argv) < 2:
@@ -14,7 +14,8 @@ def main():
1414
"whois: Using it you can get information about a domain. \n"
1515
"ssearch: Using it you can get information about the devices and services connected in a network. \n"
1616
"bgrab: Using it you can get information about some services in the specified ports and IP. \n"
17-
"flooder: Using it you can do a DOS Attack (Ping of death) or generate the PCAP file for do it.")
17+
"flooder: Using it you can do a DOS Attack (Ping of death) or generate the PCAP file for do it.\n"
18+
"fuzzing: Using it you can do a fuzzing test and write a PCAP with results. Please read documentation for know about the PCAP format.\n")
1819

1920
elif sys.argv[1] == "DNS":
2021
dns_utility.dns_scan()
@@ -31,6 +32,9 @@ def main():
3132
elif sys.argv[1] == "flooder":
3233
flooder_utility.flooder_attack()
3334

35+
elif sys.argv[1] == "fuzzing":
36+
fuzzing_utility.fuzzing_attack()
37+
3438
else:
3539
print('Unknown function, please use -h for show the avaliable methods.')
3640

0 commit comments

Comments
 (0)