Skip to content

DracSec/DRAXTER

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DRAXTER - PROOF IN 1 CLICK

Draxter tool is used for managing a big list of IP addresses and ports for your pentest project. It’s designed to take an XML scan input, filter targets by criteria (ports or services), and export or run selected actions against those targets to support your pentest workflow.

Instalation & Execution

❗❗❗ Compatible with Kali Linux

  1. git clone https://github.com/DRAGOWN/DRAXTER.git
  2. cd DRAXTER
  3. chmod 750 install.sh run.sh
  4. ./install.sh
  5. You will be asked to input sudoer's password
  6. Set application credentials
  7. ./run.sh
  8. Browse: https://localhost:5000

Requirements

  • Flask==3.0.3
  • Flask-SQLAlchemy==3.1.1
  • Flask-Login==0.6.3
  • imgkit
  • ansi2html
  • pandas>=2.2.2
  • openpyxl==3.1.2
  • SQLAlchemy>=2.0.36
  • wkhtmltox_0.12.6.1 (with dpkg - requires privileges)

Steps

  1. Upload XML format of nmap scan
  2. Filter by specific port(s) or (services)
  3. Export a file of the targets
  4. Select the specific attack
  5. Execute the selected command according your testing purposes

Common Attacks:

  1. Auto screenshot a big list of HTTP(s) targets (thanks to gowitness)

  2. Auto screenshot a big list of RDP targets with NLA disabled (thanks to netexec)

  3. Auto scan a big list of targets with the following service protocols:

    3.1. SSH, WMI, SMB, HTTP, HTTPS, WebDAV, LDAP, RDP, VNC, MSSQL, NFS, WINRM, FTP, SSL

Improvements in v1.4

  • Improved terminal view (thanks to ansi2html)
  • Added custom command execution
  • Added sslscan
  • Improvements in gowitness target selection process
  • Now DRAXTER speaks in Nessus language: Made DRAXTER compatible to Nessus XML output by the request of our intelligent users.

This is just a beginning 💥

About

PROOF IN 1 CLICK: Draxter tool is used for managing a big list of IP addresses and ports for your pentest project. It’s designed to take an XML scan input, filter targets by criteria (ports or services), and export or run selected actions against those targets to support your pentest workflow.

Topics

Resources

Stars

Watchers

Forks

Contributors

Languages

  • HTML 72.5%
  • Python 26.0%
  • Shell 1.5%