All-in-One Pentesting Framework for Ethical Hackers | 100+ Integrated Tools | Python & Bash
Complete penetration testing platform combining reconnaissance, vulnerability scanning, web security testing, and automated reporting. Built for bug bounty hunters, security researchers, and cybersecurity professionals.
Choose Your Version:
- π Python: Advanced features + PDF reports
- π» Bash: Interactive menu + native Linux integration
β
Network Reconnaissance - Port scanning, subdomain enumeration, DNS analysis
β
Vulnerability Detection - SQL injection, XSS, SSL/TLS testing
β
Web Application Security - Directory fuzzing, API endpoint discovery
β
Professional Reports - HTML, PDF, JSON formats with CVSS scoring
β
Zero Configuration - One command installation and setup
# Clone repository
git clone https://github.com/therealilyas/pentest-toolkit.git
cd pentest-toolkit
# Install dependencies
sudo apt update && sudo apt install -y python3 nmap nikto sqlmap gobuster
pip3 install -r requirements.txt
# Run first scan
python3 pentestkit.py https://example.comPython Version (Automated)
# Basic scan
python3 pentestkit.py https://target.com
# Custom output directory
python3 pentestkit.py https://target.com -o /path/to/results
# Verbose mode
python3 pentestkit.py https://target.com -vBash Version (Interactive)
# Launch interactive menu
sudo ./pentestkit.sh
# Select scan profile:
# - Quick Scan (~5 min)
# - Normal Scan (~15 min)
# - Deep Scan (~45 min)π― Bug Bounty Hunters - Automate reconnaissance and vulnerability discovery
π Security Auditors - Comprehensive infrastructure assessment
π΄ββ οΈ Red Team Operators - Simulate real-world attack scenarios
π Students & Learners - Hands-on penetration testing education
π CTF Players - Fast exploitation toolkit for competitions
| Feature | Benefit |
|---|---|
| 100+ Integrated Tools | No need to install tools separately |
| Dual Implementation | Python for automation, Bash for interaction |
| Professional Reports | Ready for client delivery |
| Active Development | Regular updates with latest techniques |
| MIT License | Free for commercial use |
π Installation Guide
π₯ Video Tutorials
π‘ Usage Examples
π Troubleshooting
- β Kali Linux
- β Parrot Security OS
- β Ubuntu 20.04+
- β Debian 10+
- β macOS (Python only)
- β Windows (WSL2)
This tool is designed for legal security testing with explicit permission. Unauthorized access to computer systems is illegal. Users are solely responsible for compliance with applicable laws.
We welcome contributions! Submit pull requests, report bugs, or suggest features in Issues.
π¬ GitHub Discussions - Ask questions
π Report Bugs - Found an issue?
β Star this repo to support development!
- AI-powered vulnerability detection
- Docker container support
- WordPress/CMS-specific modules
- Real-time notification system
- Metasploit integration
Made by Security Researchers for Security Researchers
Star β this repo if you find it useful!
Installation β’ Documentation β’ Discussions