PAKURI – Penetration Test Achieve Knowledge Unite Rapid Interface

PAKURI 1

What’s PAKURI
In Japanese, imitating is called “Pakuru”.

ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)

  1. eat with a wide open mouth
  2. steal when one isn’t looking, snatch, swipe
  3. copy someone’s idea or design
  4. nab, be caught by the police

Wiktionary:ぱくる

Description
Pentesters love to move their hands. However, I do not like troublesome work. Simple work is performed semi-automatically with simple operations. PAKURI executes commands frequently used in penetration tests by simply operating the numeric keypad. You can test penetration as if you were playing a fighting game.

Presentation

  • November 2nd,2019: AV TOKYO 2018 Hive

Abilities of “PAKURI”.

  • Intelligence gathering.
  • Vulnerability analysis.
  • Visualize.
  • Brute Force Attack.
  • Exploitation.

Your benefits.
By using our PAKURI, you will benefit from the following.
For redteam:
(a) This saves you the trouble of entering frequently used commands.
(b) Beginner pentester can learn the floe of attacks using PAKURI.
For blueteam:
(c) Attack packets can be generated with a simple operation.
NOTE
If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.

Features

  • Scan
    • Nmap
    • AutoRecon
    • OpenVAS
  • Exploit
    • BruteSpray
    • Metasploit
  • Visualize
    • Faraday
  • CUI-GUI switching

Install
bash install.sh

Usage
root@kali:/usr/share/pakuri# ./pakuri.sh

Main

PAKURI 2

Scanning

PAKURI 3

Exploit

PAKURI 4

Config

PAKURI 5

Command

PAKURI 6

PAKURI 7

Operation check environment

  • OS: KAli Linux 2019.4
  • Memory: 8.0GB

This tool is not yet complete. It will be updated sequentially.

Download PAKURI
Original Source