IPTF AbuAliAQ June 2025 WebApp
Active Scans
8
Vulnerabilities
127
CVEs Detected
42
Tools Installed
312
Target Input Console
[+] Loading 312 pentesting tools...
[+] CVE Database connected (updated: 2025-06-15)
[+] Ready for target input
_
Recent Scans
192.168.1.105
Full Network Scan
example.com
Web App Scan
10.0.0.2
Vulnerability Scan
api.example.org
API Security Scan
Network Visualization
Quick Tools
Whois Lookup
Ping
Traceroute
Port Scanner
SSL Checker
DNS Lookup
Reconnaissance Tools
This phase involves gathering information about the target system. Tools available:
Maltego
For open-source intelligence (OSINT) and forensics
theHarvester
Gather emails, subdomains, hosts, employee names
Recon-ng
Web reconnaissance framework
SpiderFoot
Automated OSINT collection
Shodan
Search engine for Internet-connected devices
FOCA
Fingerprinting Organizations with Collected Archives
Scanning Tools
This phase involves identifying open ports, services, and vulnerabilities.
Nmap
Network discovery and security auditing
Nessus
Vulnerability scanner
OpenVAS
Vulnerability assessment system
Nikto
Web server scanner
WPScan
WordPress vulnerability scanner
ZAP
OWASP Zed Attack Proxy
Gaining Access Tools
This phase involves exploiting vulnerabilities to gain access to systems.
Metasploit
Penetration testing framework
SQLmap
SQL injection tool
Burp Suite
Web application security testing
Hydra
Password cracking tool
John the Ripper
Password cracker
BeEF
Browser Exploitation Framework
Maintaining Access Tools
This phase involves maintaining access to the compromised system.
Meterpreter
Metasploit's advanced payload
Cobalt Strike
Post-exploitation framework
Empire
Post-exploitation framework
Powersploit
PowerShell post-exploitation framework
Netcat
Network utility for reading/writing network connections
SSH
Secure Shell for remote access
Covering Tracks Tools
This phase involves removing evidence of the penetration.
Timestomp
Modify file timestamps
Clearev
Clear event logs
Slacker
Hide files in slack space
BleachBit
System cleaner
CCleaner
System optimization and cleaning
LogCleaner
Clean system logs
Reporting Tools
This phase involves documenting findings and creating reports.
Dradis
Collaboration and reporting framework
Faraday
Collaborative pentest IDE
Serpico
Pentest reporting tool
Pandoc
Document converter
ReportGenerator
Automated report generation
MagicTree
Data collaboration and reporting
Automation Tools
This phase involves automating the penetration testing process.
AutoSploit
Automated exploitation
AutoRecon
Automated reconnaissance
Pentest Automation
Custom automation scripts
Robot Framework
Test automation
Ansible
Configuration management
Custom Scripts
Python, Perl, Ruby, GoLang