-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
1 changed file
with
25 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
# ptoolkitinvalida | ||
PToolkit is developed to ease the use of penetration testing tools with minimal knowledge and effort. | ||
|
||
PToolkit provides a simple UI that let user to view integrated tools' main arguments. Users can select the arguments and provide value for that argument. | ||
All argument inputs are implemented with multiple input validation that help user to reduce the occurence of invalid argument value that lead to a different attack result. | ||
There are many input validations implemented, such as blank input, input with spaces, valid services, check existing file, valid port range, argument value's format check, and etc. | ||
|
||
After users had provided the argument value, the command is generated on the user interface immediately. The user can launch the attack once all required arguments are not empty. | ||
|
||
PToolkit provide a simple way to launch an attack without memorizing different tools arguments keyword and generate the command automatically to avoid a typo in the error-prone command. | ||
|
||
Currently PToolkit support the following features: | ||
|
||
1. Install, update, uninstall integrated tools. | ||
2. Batch installation, update, and uninstallation. | ||
3. Connect to Tor Proxy | ||
4. Reconnaissance | ||
5. Scanning | ||
6. Web application scanning and vulnerability scanner | ||
7. Password attack | ||
8. Hash Dictionary/Brute Force Attack | ||
9. Denial-of-Service Attack | ||
10. SQL injection Attack | ||
11. Directory and Files discovery | ||
12. Generate Payload (MSFvenom) |