Skip to content

an offensive security bot that does full penetration testing on specified targets and generate reports of exploitable vulnerabilities found

Notifications You must be signed in to change notification settings

hackerjoe69/pentest_bot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Pentest Bot

A multifunctional penetration testing automation tool that performs admin discovery, API testing, crawling, brute forcing, and lightweight network scans.


Quick setup

# clone the repository
git clone https://github.com/hackerjoe69/pentest_bot.git
cd pentest_bot

Example usage

Basic scan with admin discovery

python3 pentest_pro_bot.py example.com -ad

API testing with Postman collection

python3 pentest_pro_bot.py api.com -at -pc api.json

Admin discovery with brute force

python3 pentest_pro_bot.py webapp.com -ad -bf

All features with custom wordlist

python3 pentest_pro_bot.py target.com -ad -at -bf -pc api.json -aw custom_wordlist.txt -i aggressive -v

Quick network scan only

python3 pentest_pro_bot.py 192.168.1.0/24 -st network port -i quick

Custom crawling with verbose output

python3 pentest_pro_bot.py webapp.com -cd 5 -mp 200 -cld 0.5 -v

Options

Basic Options

-o  = --output        # Output directory
-v  = --verbose       # Verbose output
-i  = --intensity     # Scan intensity (e.g. quick, normal, aggressive)
-t  = --threads       # Number of threads
-st = --scan-types    # Scan types (e.g. network, port, web, all)

Crawling Options

-cd  = --crawl-depth   # Crawl depth (integer)
-mp  = --max-pages     # Max pages to crawl (integer)
-cld = --crawl-delay   # Crawl delay in seconds (float)
-ua  = --user-agent    # Custom User-Agent string

API Testing Options

-pc = --postman-collection  # Postman collection file (JSON)
-at = --api-test            # Enable API testing

Admin Discovery Options

-ad = --admin-discovery     # Enable admin discovery
-aw = --admin-wordlist      # Custom admin wordlist file
-bf = --brute-force-admin   # Enable brute force against admin endpoints

Notes & best practices

  • Always have written permission before running pentests. Use this tool only on systems you are authorized to test.
  • Run scans from an isolated environment or a machine you control to avoid collateral damage.
  • Adjust intensity (-i) and threads (-t) according to target stability and your available bandwidth.
  • Supply sufficiently large delays (-cld) when crawling to reduce load on target servers.
  • If using Postman collections for API testing, validate the JSON file beforehand.

Troubleshooting

  • If the script fails due to missing modules, run pip install for the missing packages.
  • If network scanning fails, check local firewall and routing, and ensure you have permission to scan the target network.

About

an offensive security bot that does full penetration testing on specified targets and generate reports of exploitable vulnerabilities found

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages