Penetration Testing Tool to find vulnerable open ports
Explore the docs »
Report Bug
·
Request Feature
Table of Contents
This is a tool designed to help with penetration testing a network by listing all open vulnerable ports on all connected hosts from given subnet.
To get a local copy up and running follow these simple example steps.
Software needed for this application to work
- python 3.8
-
- Windows:
-
- Linux:
-
-
- Ubuntu/Debian
-
-
-
-
sudo apt install python3
-
-
-
-
- Fedora
-
-
-
-
sudo dnf install python3 python3-tk
-
-
- Clone the repo
git clone https://github.com/bradheff/Arxis-Pentester.git
- Install Requirements
python3 -m pip install -r requirements.txt
cd into bin directory
cd usr/local/bin
make script executable
chmod +x arxis-pentestor
then run the script file
./arxis-pentester
- Create Stylish GUI
- Create Functions and Features
- Imported Modules
- GUI in separate module
- Functions in separate module
- Thread control for scanning
See the open issues for a full list of proposed features (and known issues).
Contributions are what make the open source community such an amazing place to learn, inspire, and create. Any contributions you make are greatly appreciated.
If you have a suggestion that would make this better, please fork the repo and create a pull request. You can also simply open an issue with the tag "enhancement". Don't forget to give the project a star! Thanks again!
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature
) - Commit your Changes (
git commit -m 'Add some AmazingFeature'
) - Push to the Branch (
git push origin feature/AmazingFeature
) - Open a Pull Request
-->
Distributed under the GPL-3.0 License. See LICENSE
for more information.
Brad Heffernan - @bradheffernan - [email protected]
Project Link: https://github.com/bradheff/Arxis-Pentester