Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'pollenisator'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 1 result

  1. Pollenisator is a tool aiming to assist pentesters and auditor automating the use of some tools/scripts and keep track of them. Written in python 3 Provides a modelisation of "pentest objects" : Scope, Hosts, Ports, Commands, Tools etc. Tools/scripts are separated into 4 categories : wave, Network/domain, IP, Port Objects are stored in a NoSQL DB (Mongo) Keep links between them to allow queries Objects can be created through parsers / manual input Business logic can be implemented (auto vuln referencing, item triggers, etc.) Many tools/scripts launch conditions are availiable to avoid overloading the target or the scanner. A GUI based on tcl/tk Features Register your own tools Add command line options in your database. Create your own light plugin to parse your tool output. Use the objects Models to add, update or delete objects to the pentest inside plugins. Limit the number of parallel execution of noisy/heavy tools Define a recon/fingerprinting procedure with custom tools Choose a period to start and stop the tools Define your scope with domains and network IP ranges. Custom settings to include new hosts in the scope Keep results of all files generated through tools executions Start the given docker to implement numerous tools for LAN and Web pentest Collaborative pentests Split the work between your machines by starting one worker by computer you want to use. Tags ip or tools to show your team mates that you powned it. Take notes on every object to keep trace of your discoveries Follow tools status live Search in all your objects properties with the fitler bar. have a quick summary of all hosts and their open ports and check if some are powned. Reporting Create security defects on IPs and ports Make your plugins create defects directly so you don't have to Generate a Word report of security defects found. You can use your own template with extra work. Generate a Powerpoint report of security defects found. You can use your own template with extra work. Currently integrated tools IP / port recon : Nmap (Quick nmaps followed by thorough scan) Domain enumeration : Knockpy, Sublist3r, dig reverse, crtsh Web : WhatWeb, Nikto, http methods, Dirsearch LAN : Crackmapexec, eternalblue and bluekeep scan, smbmap, anonymous ftp, enum4linux Unknown ports : amap, nmap scripts Misc : ikescan, ssh_scan, openrelay Roadmap Change the architecture to an API based one Get rid of Celery Add flexibity for commands Improve UX Add more plugin and improve existing ones Add real support for users / authenticated commands [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.