-
Notifications
You must be signed in to change notification settings - Fork 0
Features
Vasilis Ieropoulos edited this page Jun 13, 2025
·
1 revision
- Network Discovery: Nmap, Masscan, Zmap, Amass, Subfinder
- Web Application Testing: Gobuster, FFuF, Feroxbuster, Nikto, WhatWeb, SQLMap, Nuclei
- Vulnerability Scanning: Nuclei, Trivy, TestSSL
- Credential Attacks: Hydra, John the Ripper, Hashcat
- Information Gathering: TheHarvester, Amass, Subfinder, Shodan
- Enumeration: Enum4linux, NBTScan, LDAP Search, SNMP Check, SMB Client
- Specialized Tools: EyeWitness, GitLeaks, and more
- Conditional Logic: IF-THEN execution based on previous step results
- Variable Extraction: Regex-based data capture from tool outputs
- Dynamic Substitution: Real-time variable replacement in arguments
- Example Scenarios: Pre-built workflows for common penetration testing methodologies
- Scenario Management: Save, load, and share complex testing workflows
- Validation System: Real-time argument and variable validation
- Modern Dark Theme: Professional security-focused design
- Tool Categories: Organized tool selection with descriptions
- Real-time Execution: Live progress monitoring and log streaming
- Variable Picker: Visual variable selection and management
- Keyboard Shortcuts: Productivity enhancements for power users
- Responsive Design: Works on desktop, tablet, and mobile devices
- Thread-safe Execution: Parallel tool execution with proper resource management
- WebSocket Communication: Real-time bidirectional communication
- RESTful API: Complete API for automation and integration
- Error Handling: Comprehensive error recovery and reporting
- Logging System: Detailed execution logs and debugging information