Skip to content

DRAGOWN/DRAXTER

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

DRAXTER - PROOF IN 1 CLICK

Draxter tool is used for managing a big list of IP addresses and ports for your pentest project. It’s designed to take an XML scan input, filter targets by criteria (ports or services), and export or run selected actions against those targets to support your pentest workflow.

Instalation & Execution

❗ Tested on Kali Linux

  1. git clone https://github.com/DRAGOWN/DRAXTER.git
  2. cd DRAXTER
  3. chmod 750 install.sh run.sh
  4. ./install.sh
  5. You will be asked to input sudoer's password
  6. Set application credentials
  7. ./run.sh
  8. Browse: https://localhost:5000

Requirements

Pip

  • Flask==3.0.3
  • Flask-SQLAlchemy==3.1.1
  • Flask-Login==0.6.3
  • imgkit==1.2.3
  • ansi2html==1.9.2
  • pandas>=2.2.2
  • openpyxl==3.1.2
  • SQLAlchemy>=2.0.36

Deb

  • libssl1.1
  • wkhtmltox_0.12.6.1

Steps

  1. Upload XML format of nmap/nessus scan
  2. Filter by specific port(s) or (services)
  3. Export a file of the targets
  4. Select the specific attack
  5. Execute the selected command according your testing purposes
  6. Check generated screenshots and output information files in /browse.html page

Common Attacks:

  1. Auto scan and screenshot a big list of targets with the following service protocols: SSH, WMI, SMB, HTTP, HTTPS, WebDAV, LDAP, RDP, VNC, MSSQL, NFS, WINRM, FTP, SSL, Redis, NFS, etc.

Export Targets:

  • Unique IP Export
  • HTTP(S) Targets Export
  • Customized Columns Export in XLSX

Improvements in v1.5

  • Redesigned CMD Execution Windows
  • Terminal screenshot per connection
  • Added protocol enumeration tags
  • Moore targeted templates

This is just a beginning 💥

About

PROOF IN 1 CLICK: Draxter tool is used for managing a big list of IP addresses and ports for your pentest project. It’s designed to take an XML scan input, filter targets by criteria (ports or services), and export or run selected actions against those targets to support your pentest workflow.

Topics

Resources

Stars

Watchers

Forks

Contributors