PCWT – A Web Application That Makes It Easy To Run Your Pentest And Bug Bounty Projects

PCWT - A Web Application That Makes It Easy To Run Your Pentest And Bug Bounty Projects

A world wide web application that would make it uncomplicated to operate your pentest and bug bounty projects.

Description

The app delivers a handy net interface for doing the job with numerous varieties of documents that are employed throughout the pentest, automate port scan and subdomain lookup.

Principal site

PCWT 1 mainpage

 

Task configurations

PCWT 2 settings

Domains dashboard

PCWT 3 domains

 

Port scan

You can scan ports using nmap or masscan. The nmap is started off with the pursuing arguments:

nmap --top-ports 10000 -sV -Pn --min-amount 300 --max-retries 2 [ip]

The masscan is began with the adhering to arguments:

masscan -p 1-65535 --charge 2000

Subdomain search

Amass and findomain are made use of to discover subdomains.

Options

  • Go away notes to host, port or domain.
  • Mark host or area with tags.
  • Look for by any area connected with host, port or area (tags and notes are incorporated). Regexp is out there.
  • Various styles of sorting ara offered on pretty much all dashboards.
  • Operate port scan for all hosts, hosts with no port scan or custom made listing.
  • Create responsibilities for subdomains research (every 2 several hours, every single 5 hrs, every single day or each and every 7 days). You can also disable and allow them on desire employing Subdomain tasks dashboard.
  • Distinctive kinds of export are out there.
  • Notifications about the start out and conclusion of the scan, as perfectly as about new located domains can be despatched to Telegram. Update the config.py with your chat id and token.

Install from resources

Note 1: Improve the paths for amass, findomain, nmap and masscan in config.py prior to working commands. Notice 2: The application ought to be began as root if you want masscan to do the job.

apt put in python3 python-venv python3-pip
git clone https://github.com/ascr0b/PCWT
cd PCWT

python3 -m venv env
supply env/bin/activate
pip3 set up -r specifications.txt

flask init-db
flask crontab add

export FLASK_Application=app
flask run

The app is offered at http://127…1:5000

C7w7zW8EFnA

Impression and Posting Resource link

Examine A lot more on Pentesting Instruments

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: