Pollenisator: A collection of tools for Penetration Testers

The Pollenisator is a tool that aims to help pentesters and bug hunters automate the use of certain tools / scripts and monitor them.

 

  • Written in python 3
  • Παρέχει pentest for Hosts, Ports, Commands, Tools, etc.
  • The tools / scripts are divided into 4 categories: wave, Network / domain, IP, Port
  • Objects are stored on a NoSQL DB (Mongo)
  • Keep links between them to allow queries
  • Objects can be created programmatically s / manual entry
  • Business logic can be applied (automatic violent reporting, data activations, etc.)
  • Many scripting tools are available to prevent the target or scanner from overloading.
  • A tcl / tk based GUI

 

Specifications

  • Enter your own tools
    • Add command line options to your database
    • Create your own light to analyze the output of your tool
    • Use the Models objects to add, update, or delete objects in the pentest media of plugins
    • Limit the number of noisy / heavy tools running at the same time
  • Define an identification / capture process with custom tools
    • Select a period to start and stop the tools
    • Define your range with IP network domains and areas.
    • Adjusted settings to include new hosts in the field ς
    • Save the results of all files created through tool execution
    • Start this connection program to apply many tools for LAN and Web pentest
  • Collaborative pentests
    • Separate the task between your machines by starting a task from the computer you want to use
    • Ip tags or tools to show your co-workers that you have completed a task
    • Take notes on each item to keep track of your discoveries
    • Live monitor the status of the tools
    • Search all the properties of your objects with the filter bar
    • have a quick overview of all the servers and their open ports and check if some are pwned
  • Report
    • Create security vulnerabilities in IPs and ports
    • Make your additions create immediate flaws
    • Create a Word report for security vulnerabilities found. You can use your own template with extra work
    • Generate a Powerpoint report for security vulnerabilities detected. You can use your own template with extra work
  • Currently built-in tools
    • IP / Port Identification: Nmap (Quick nmaps followed by thorough scanning)
    • Domain listing: Knockpy, Sublist3r, dig reverse, crtsh
    • Web: WhatWeb, Nikto, http methods, Dirsearch
    • LAN: Crackmapexec, foreverblue and bluekeep scan, smbmap, anonymous ftp, enum4linux
    • Unknown ports: scripts amap, nmap
    • Miscellaneous: ikescan, ssh_scan, openrelay

 

Information about the installation and what use of the program, you will find here.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Anastasis Vasileiadis

Translations are like women. When they are beautiful they are not faithful and when they are faithful they are not beautiful.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).