Expand Pegasus Pentest Arsenal with 10 new scanners and fixes
Pegasus Pentest Arsenal (PPA)
/\
_ / |
/ \ | \
| |\| |
| | | /
| /| |/
|/ |/
,/; ; ;
,'/|; ,/,/,
,'/ |;/,/,/,/|
,/; |;|/,/,/,/,/|
,/'; |;|,/,/,/,/,/|
,/'; |;|/,/,/,/,/,/|,
/ ; |;|,/,/,/,/,/,/|
/ ,'; |;|/,/,/,/,/,/,/|
/,/'; |;|,/,/,/,/,/,/,/|
/;/ '; |;|/,/,/,/,/,/,/,/|
██████╗ ███████╗ ██████╗ █████╗ ███████╗██╗ ██╗███████╗
██╔══██╗██╔════╝██╔════╝ ██╔══██╗██╔════╝██║ ██║██╔════╝
██████╔╝█████╗ ██║ ███╗███████║███████╗██║ ██║███████╗
██╔═══╝ ██╔══╝ ██║ ██║██╔══██║╚════██║██║ ██║╚════██║
██║ ███████╗╚██████╔╝██║ ██║███████║╚██████╔╝███████║
╚═╝ ╚══════╝ ╚═════╝ ╚═╝ ╚═╝╚══════╝ ╚═════╝ ╚══════╝
P E N T E S T A R S E N A L
A comprehensive web application security testing toolkit that combines 20 powerful penetration testing features into one tool.
Author
- Letda Kes Dr. Sobri, S.Kom
- GitHub: sobri3195
- Email: muhammadsobrimaulana31@gmail.com
Support the Project
If you find this tool useful, consider supporting the development:
Features
-
Subdomain + Curl HTTP Scanner
- Discovers subdomains using a wordlist
- Checks HTTP status and security headers
- Identifies potential security misconfigurations
-
JWT Token Inspector
- Analyzes JWT token structure and claims
- Identifies security issues in token configuration
- Detects common JWT vulnerabilities
-
Parameter Pollution Finder
- Tests for HTTP Parameter Pollution (HPP)
- Identifies vulnerable parameters
- Detects server-side parameter handling issues
-
CORS Misconfiguration Scanner
- Tests for CORS policy misconfigurations
- Identifies dangerous wildcard policies
- Detects credential exposure risks
-
Upload Bypass Tester
- Tests file upload restrictions
- Attempts various bypass techniques
- Identifies dangerous file type handling
-
Exposed .git Directory Finder
- Scans for exposed version control files
- Identifies leaked Git repositories
- Tests for sensitive information disclosure
-
SSRF (Server Side Request Forgery) Detector
- Tests for SSRF vulnerabilities
- Identifies vulnerable parameters
- Includes cloud metadata endpoint tests
-
Blind SQL Injection Time Delay Detector
- Tests for time-based SQL injection
- Supports multiple database types
- Identifies injectable parameters
-
Local File Inclusion (LFI) Mapper
- Tests for LFI vulnerabilities
- Includes path traversal detection
- Supports various encoding bypasses
-
Web Application Firewall (WAF) Fingerprinter
- Identifies WAF presence
- Detects WAF vendor/type
- Tests WAF effectiveness
-
Security Headers Auditor
- Checks for missing or weak security headers
- Highlights CSP, HSTS, and clickjacking protection gaps
- Provides actionable recommendations
-
Robots.txt & Sitemap Analyzer
- Retrieves robots.txt directives and sitemap locations
- Highlights sensitive disallowed paths
- Extracts URLs from sitemap files
-
Directory & File Discovery
- Probes common admin, API, and backup paths
- Identifies exposed services and entry points
-
Backup/Config Exposure Scanner
- Looks for leaked backup archives and config files
- Flags potential data leakage points
-
Open Redirect Tester
- Tests redirect parameters for unsafe redirect behavior
- Flags reflected external redirect destinations
-
Reflected XSS Tester
- Injects XSS payloads into parameters
- Detects reflection that may lead to XSS
-
Host Header Injection Tester
- Sends forged Host/X-Forwarded-Host headers
- Checks for unsafe host reflection and redirect issues
-
HTTP Method Tester
- Identifies dangerous or unexpected HTTP methods
- Displays server Allow headers for quick review
-
Cookie Security Checker
- Audits Secure, HttpOnly, and SameSite flags
- Highlights weak session cookie configurations
-
Rate Limiting Tester
- Sends burst requests to detect rate limiting
- Flags response time spikes or 429 responses
Installation
- Clone the repository:
git clone https://github.com/sobri3195/pegasus-pentest-arsenal.git
cd pegasus-pentest-arsenal
- Create a virtual environment (recommended):
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
- Install dependencies:
pip install -r requirements.txt
Usage
- Run the main script:
python pegasus_pentest.py
- Select a tool from the menu (1-20)
- Follow the prompts to enter target information
- Review the results
Requirements
- Python 3.8+
- Required packages (see requirements.txt):
- requests
- httpx
- urllib3
- colorama
- pyjwt
- beautifulsoup4
Security Considerations
- This tool is for educational and authorized testing purposes only
- Always obtain proper authorization before testing any target
- Some features may trigger security alerts or be blocked by security controls
- Use responsibly and ethically
Contributing
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Create a Pull Request
License
This project is licensed under the MIT License - see the LICENSE file for details.
Disclaimer
This tool is provided for educational and authorized testing purposes only. Users are responsible for obtaining proper authorization before testing any target. The authors are not responsible for any misuse or damage caused by this tool.