Skip to content
Penetration test Achieve Knowledge Unite Rapid Interface
Shell
Branch: develop
Clone or download
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
Presentation update Dec 31, 2019
documents update Dec 31, 2019
modules bug Jan 3, 2020
.config update Dec 31, 2019
LICENSE.md Create LICENSE.md Dec 9, 2019
README.md Update README.md Dec 31, 2019
install.sh update Dec 31, 2019
pakuri.sh Add files via upload Dec 20, 2019
targets.txt update brutespray Dec 9, 2019

README.md

PAKURI

logo version License release-date sns


What's PAKURI

I have imitated the good points of many tools. In Japanese, imitating is called “Pakuru”.

ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)

  1. eat with a wide open mouth
  2. steal when one isn't looking, snatch, swipe
  3. copy someone's idea or design
  4. nab, be caught by the police

Wiktionary:ぱくる

Description

Sometimes, the penetration testers love to perform a complicated job. However, I always prefer the easy way. PAKURI is an semi-automated user-friendly penetration testing tool framework. You can run the popular pentest tools using only the numeric keypad, just like a game. It is also a good entry tool for the beginners. They can use PAKURI to learn the flow to the penetration testing without struggling with a confusing command line/tools.


Presentation


Abilities of "PAKURI"

  • Intelligence gathering.
  • Vulnerability analysis.
  • Visualize.
  • Brute Force Attack.
  • Exploitation.

Your benefits

By using our PAKURI, you will benefit from the following.

For redteam:
(a) Red Teams can easily perform operations such as information enumeration and vulnerability scanning.
(b) Visualizing the survey results is possible only with the numeric keypad.

For blueteam:
(c) The Blue Team can experience a dummy attack by simply operating the numeric keypad even they do not have any penetration testing skill.

For beginner:
(d) PAKURI has been created to support the early stages of penetration testing. These can be achieved with what is included in Kali-Tools. It can be useful for training the entry level pentesters.

NOTE
If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.

Features


Install

  1. Update your apt and install git:

    root@kali:~# apt update
    root@kali:~# apt install git
  2. Download the PAKURI installer from the PAKURI Github repository:

    root@kali:~# git clone https://github.com/01rabbit/PAKURI.git
  3. CD into the PAKURI folder and run the install script:

    root@kali:~# cd PAKURI  
    root@kali:~/PAKURI# bash install.sh

Usage

  1. Check the OpenVAS admin user and password set them in the .config file:

    root@kali:~# vim /usr/share/PAKURI/.config
    ...snip...
    
    # OpenVAS
    OMPUSER="admin"
    OMPPASS="admin"
  2. Start Faraday-Server and set workspace:

    root@kali:~# systemctl start faraday-server.service  
    root@kali:~# firefox localhost:5985
  3. Set Workspace in the .config file.

    root@kali:~# vim /usr/share/PAKURI/.config
    ...snip...
    
    # Faraday
    WORKSPACE="test_workspace"
  4. CD into the PAKURI folder:

    root@kali:~# cd /usr/share/PAKURI
  5. Start PAKURI:

    root@kali:/usr/share/PAKURI# ./pakuri.sh
    
    ██████╗   █████╗    ██╗  ██╗   ██╗   ██╗   ██████╗    ██╗
    ██╔══██╗ ██╔══██╗   ██║ ██╔╝   ██║   ██║   ██╔══██╗   ██║
    ██████╔╝ ███████║   █████╔╝    ██║   ██║   ██████╔╝   ██║
    ██╔═══╝  ██╔══██║   ██╔═██╗    ██║   ██║   ██╔══██╗   ██║
    ██║   ██╗██║  ██║██╗██║  ██╗██╗╚██████╔╝██╗██║  ██║██╗██║
    ╚═╝   ╚═╝╚═╝  ╚═╝╚═╝╚═╝  ╚═╝╚═╝ ╚═════╝ ╚═╝╚═╝  ╚═╝╚═╝╚═╝
    
    - Penetration Test Achive Knowledge Unite Rapid Interface -
                        inspired by CDI
    
                                                        v1.0.2
                                           Author  : Mr.Rabbit
    
    Sun 29 Dec 2019 22:25:07 PM EST
    Working Directory : /root/demo
    ---------------------- Main Menu -----------------------
    +---+
    | 1 | Scanning
    +---+
    +---+
    | 2 | Exploit
    +---+
    +---+
    | 3 | Config
    +---+
    +---+
    | 4 | Assist
    +---+
    +---+
    | 9 | Back
    +---+

PAKURI is not fully automated and requires the user interactions, to make sure to proceed the pentest and to avoid any unintended attack or trouble.

Scanning

scanning

Exploit

exploit

Config

config

By operating the numeric keypad, it is possible to scan the network, scan for vulnerabilities, and perform simple pseudo attacks.


Operation check environment

  • OS: KAli Linux 2019.4
  • Memory: 8.0GB

Known Issues

This is intended for use Kali Linux. Operation on other OS is not guaranteed.


Support

Feature request / bug reports: https://github.com/01rabbit/PAKURI/issues

You can’t perform that action at this time.