Draxter tool is used for managing a big list of IP addresses and ports for your pentest project. It’s designed to take an XML scan input, filter targets by criteria (ports or services), and export or run selected actions against those targets to support your pentest workflow.
❗❗❗ Compatible with Kali Linux
git clone https://github.com/DRAGOWN/DRAXTER.gitcd DRAXTERchmod 750 install.sh run.sh./install.sh- You will be asked to input sudoer's password
- Set application credentials
./run.sh- Browse: https://localhost:5000
- Flask==3.0.3
- Flask-SQLAlchemy==3.1.1
- Flask-Login==0.6.3
- imgkit
- ansi2html
- pandas>=2.2.2
- openpyxl==3.1.2
- SQLAlchemy>=2.0.36
- wkhtmltox_0.12.6.1 (with dpkg - requires privileges)
- Upload XML format of nmap scan
- Filter by specific port(s) or (services)
- Export a file of the targets
- Select the specific attack
- Execute the selected command according your testing purposes
-
Auto screenshot a big list of HTTP(s) targets (thanks to gowitness)
-
Auto screenshot a big list of RDP targets with NLA disabled (thanks to netexec)
-
Auto scan a big list of targets with the following service protocols:
3.1. SSH, WMI, SMB, HTTP, HTTPS, WebDAV, LDAP, RDP, VNC, MSSQL, NFS, WINRM, FTP, SSL
- Improved terminal view (thanks to ansi2html)
- Added custom command execution
- Added sslscan
- Improvements in gowitness target selection process
- Now DRAXTER speaks in Nessus language: Made DRAXTER compatible to Nessus XML output by the request of our intelligent users.
This is just a beginning 💥

