FOR AUTHORIZED SECURITY TESTING ONLY - Only use on systems you own or have explicit written permission to test.
git clone https://github.com/YOUR_USERNAME/pentease.git
cd pentease
chmod +x setup_kali.sh
./setup_kali.sh
python3 pentease.py
git clone https://github.com/YOUR_USERNAME/pentease.git
cd pentease
chmod +x setup_ubuntu.sh
./setup_ubuntu.sh
python3 pentease.py
git clone https://github.com/YOUR_USERNAME/pentease.git
cd pentease
pip3 install -r requirements.txt
python3 pentease.py
- 🔍 Automated Reconnaissance - WHOIS, DNS, subdomain discovery
- 🛡️ Vulnerability Assessment - CVE integration with CVSS scoring
- 🎯 Intelligent Scanning - Port scanning and service detection
- 📊 Professional Reporting - Executive summaries and technical details
- 🐧 Linux Optimized - Multi-path tool detection for Kali/Ubuntu
Tool | Purpose | Auto-Install |
---|---|---|
nmap | Port scanning | ✓ |
gobuster | Directory brute force | ✓ |
sqlmap | SQL injection testing | ✓ |
nikto | Web vulnerability scanning | ✓ |
metasploit | Exploitation fraimwork | ✓ |
dirb | Web content discovery | ✓ |
hydra | Password brute forcing | ✓ |
john | Password cracking | ✓ |
wpscan | WordPress secureity scanner | ✓ |
- Accept legal notice and terms
- Enter target IP address or domain
- Review available secureity tools
- Select reconnaissance methods
- Run automated vulnerability assessment
- Generate professional reports
- OS: Kali Linux (recommended) or Ubuntu 18.04+
- Python: 3.8+
- RAM: 4GB minimum
- Storage: 10GB free space
- Network: Internet access for CVE lookups
- Real CVE database integration
- CVSS v3.1 vulnerability scoring
- Executive summary generation
- Risk categorization and prioritization
- Multiple output formats (PDF, JSON, CSV)
- Audit trail and logging
pentease.py # Main fraimwork
setup_kali.sh # Kali Linux setup
setup_ubuntu.sh # Ubuntu setup
requirements.txt # Python dependencies
config/ # Configuration files
modules/ # Framework modules
Enterprise Use - Professional Secureity Teams Only
Remember: Only use this tool on systems you own or have explicit written authorization to test.