Skip to content
Penetration test Achieve Knowledge Unite Rapid Interface
Branch: develop
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
Presentation update Dec 31, 2019
documents update Dec 31, 2019
modules bug Jan 3, 2020
.config update Dec 31, 2019 Create Dec 9, 2019 Update Dec 31, 2019 update Dec 31, 2019 Add files via upload Dec 20, 2019
targets.txt update brutespray Dec 9, 2019


logo version License release-date sns


I have imitated the good points of many tools. In Japanese, imitating is called “Pakuru”.

ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)

  1. eat with a wide open mouth
  2. steal when one isn't looking, snatch, swipe
  3. copy someone's idea or design
  4. nab, be caught by the police



Sometimes, the penetration testers love to perform a complicated job. However, I always prefer the easy way. PAKURI is an semi-automated user-friendly penetration testing tool framework. You can run the popular pentest tools using only the numeric keypad, just like a game. It is also a good entry tool for the beginners. They can use PAKURI to learn the flow to the penetration testing without struggling with a confusing command line/tools.


Abilities of "PAKURI"

  • Intelligence gathering.
  • Vulnerability analysis.
  • Visualize.
  • Brute Force Attack.
  • Exploitation.

Your benefits

By using our PAKURI, you will benefit from the following.

For redteam:
(a) Red Teams can easily perform operations such as information enumeration and vulnerability scanning.
(b) Visualizing the survey results is possible only with the numeric keypad.

For blueteam:
(c) The Blue Team can experience a dummy attack by simply operating the numeric keypad even they do not have any penetration testing skill.

For beginner:
(d) PAKURI has been created to support the early stages of penetration testing. These can be achieved with what is included in Kali-Tools. It can be useful for training the entry level pentesters.

If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.



  1. Update your apt and install git:

    root@kali:~# apt update
    root@kali:~# apt install git
  2. Download the PAKURI installer from the PAKURI Github repository:

    root@kali:~# git clone
  3. CD into the PAKURI folder and run the install script:

    root@kali:~# cd PAKURI  
    root@kali:~/PAKURI# bash


  1. Check the OpenVAS admin user and password set them in the .config file:

    root@kali:~# vim /usr/share/PAKURI/.config
    # OpenVAS
  2. Start Faraday-Server and set workspace:

    root@kali:~# systemctl start faraday-server.service  
    root@kali:~# firefox localhost:5985
  3. Set Workspace in the .config file.

    root@kali:~# vim /usr/share/PAKURI/.config
    # Faraday
  4. CD into the PAKURI folder:

    root@kali:~# cd /usr/share/PAKURI
  5. Start PAKURI:

    root@kali:/usr/share/PAKURI# ./
    ██████╗   █████╗    ██╗  ██╗   ██╗   ██╗   ██████╗    ██╗
    ██╔══██╗ ██╔══██╗   ██║ ██╔╝   ██║   ██║   ██╔══██╗   ██║
    ██████╔╝ ███████║   █████╔╝    ██║   ██║   ██████╔╝   ██║
    ██╔═══╝  ██╔══██║   ██╔═██╗    ██║   ██║   ██╔══██╗   ██║
    ██║   ██╗██║  ██║██╗██║  ██╗██╗╚██████╔╝██╗██║  ██║██╗██║
    ╚═╝   ╚═╝╚═╝  ╚═╝╚═╝╚═╝  ╚═╝╚═╝ ╚═════╝ ╚═╝╚═╝  ╚═╝╚═╝╚═╝
    - Penetration Test Achive Knowledge Unite Rapid Interface -
                        inspired by CDI
                                           Author  : Mr.Rabbit
    Sun 29 Dec 2019 22:25:07 PM EST
    Working Directory : /root/demo
    ---------------------- Main Menu -----------------------
    | 1 | Scanning
    | 2 | Exploit
    | 3 | Config
    | 4 | Assist
    | 9 | Back

PAKURI is not fully automated and requires the user interactions, to make sure to proceed the pentest and to avoid any unintended attack or trouble.







By operating the numeric keypad, it is possible to scan the network, scan for vulnerabilities, and perform simple pseudo attacks.

Operation check environment

  • OS: KAli Linux 2019.4
  • Memory: 8.0GB

Known Issues

This is intended for use Kali Linux. Operation on other OS is not guaranteed.


Feature request / bug reports:

You can’t perform that action at this time.