Draxter tool is used for managing a big list of IP addresses and ports for your pentest project. It’s designed to take an XML scan input, filter targets by criteria (ports or services), and export or run selected actions against those targets to support your pentest workflow.
❗ Tested on Kali Linux
git clone https://github.com/DRAGOWN/DRAXTER.gitcd DRAXTERchmod 750 install.sh run.sh./install.sh- You will be asked to input sudoer's password
- Set application credentials
./run.sh- Browse: https://localhost:5000
Pip
- Flask==3.0.3
- Flask-SQLAlchemy==3.1.1
- Flask-Login==0.6.3
- imgkit==1.2.3
- ansi2html==1.9.2
- pandas>=2.2.2
- openpyxl==3.1.2
- SQLAlchemy>=2.0.36
Deb
- libssl1.1
- wkhtmltox_0.12.6.1
- Upload XML format of nmap/nessus scan
- Filter by specific port(s) or (services)
- Export a file of the targets
- Select the specific attack
- Execute the selected command according your testing purposes
- Check generated screenshots and output information files in /browse.html page
- Auto scan and screenshot a big list of targets with the following service protocols: SSH, WMI, SMB, HTTP, HTTPS, WebDAV, LDAP, RDP, VNC, MSSQL, NFS, WINRM, FTP, SSL, Redis, NFS, etc.
- Unique IP Export
- HTTP(S) Targets Export
- Customized Columns Export in XLSX
- Redesigned CMD Execution Windows
- Terminal screenshot per connection
- Added protocol enumeration tags
- Moore targeted templates
This is just a beginning 💥

