0xMarcio 1ec50d14a3 docs: remove em dashes; convert pseudo-links to real Markdown links; improve formatting
- Replace all em dashes with simple hyphens across repo\n- README: real links in Docs Index, badges and headings\n- HOWTO: clickable TOC, clean headings, hyphen usage\n- TOOLKIT: clickable TOC, cleaned bullets, crosslinks and examples\n- Dashboard and pack_report strings updated to avoid em dashes\n- .zshrc comment cleaned
2025-10-08 16:11:24 +02:00

PentestPilot

AIassisted pentest recon and orchestration toolkit with resumeable pipelines, a rich terminal dashboard, and techaware routing.

Made for Pentesters AI‑Ready Resumeable Pipelines Dashboard

Overview

Scriptdriven toolkit to accelerate common OSCP/HTB workflows: discovery, web recon, AD, password hygiene, shells, tunnels, transfers, privilege escalation, postexploitation, reporting.

AI agents and orchestrators automate reconnaissance and organize results. Works with OpenAI (OPENAI_API_KEY) or local Ollama.

New? Start with HOWTO.md:1 for stepbystep usage, dashboard details, and resumeable pipelines.

Quick Start (Dashboard in ~35 minutes)

  • Clone/open the repo and load the shell profile: echo "source $(pwd)/.zshrc.htb" >> ~/.zshrc && exec zsh
  • Minimal deps (Debian/Ubuntu): sudo apt update && sudo apt install -y nmap curl jq ripgrep python3 tmux pipx install httpx-toolkit nuclei gowitness || true
  • Create a target workspace: settarget target.htb
  • Kick off oneclick recon (resumeaware): agent full target.htb
  • Watch progress: dashboard --compact (add --no-color if needed)
  • Resume many later: resumeall (resumes incomplete pipelines for all targets) See HOWTO.md:1 for details, alternatives, and troubleshooting.

AI Setup

  • OpenAI: export OPENAI_API_KEY=sk...
  • Ollama: install and run ollama; optionally export OLLAMA_MODEL=llama3.1
  • Test: ask.py "You online?"

Key Commands (aliases)

  • nq | nf | nu → nmap quick/full/udp
  • webrecon → focused web recon on detected web ports
  • wideweb <hosts.txt> → httpx + screenshots + nuclei
  • fullpipe <domain|hosts.txt> → chain DNS→httpx→nuclei→tech route (+WPScan)
  • notesinit / notesattach → notes scaffolding
  • agent → multiagent runner (web|full|notes|post|ad)

AI Orchestration

  • bin/ai/agent_orchestrator.py
  • agent web hosts.txt → httpx→nuclei→screenshots→AI plan (resume-aware; use --force to rerun)
    • agent full domain.tld → run full pipeline
    • agent notes $TARGET → init + attach notes
  • agent post $TARGET → linux_loot + report pack (resume-aware)
    • agent ad $TARGET → enum4linuxng + smbmap + rpcclient
  • Robust completion utils: bin/ai/_ai_utils.py (retries, provider fallback)
  • Planning/Review tools: commands_planner.py, orchestrate_web.py, review_findings.py

State & Resume

  • Target manifest at targets//manifest.json
  • Manage via bin/automation/manifest.py
    • init, set, get, addlist, show, task start|ok|fail [meta], taskstatus, taskreset
  • Pipelines update tasks with timestamps and metadata (dns, httpx, nuclei, techroute, wpscan, full_pipeline). Agents add web_* (httpx/nuclei/screenshots/plan), notes_* and post_* tasks, and ad_* tasks.

Features at a Glance

  • Resumeable pipelines (agent full, resumeall) and color dashboard with severity bars + perphase durations
  • Evidencefirst storage (httpx/nuclei JSON + summaries) to drive next actions
  • Techaware routing (WP/Drupal/Joomla/Jenkins/SonarQube/Magento/Jira/Confluence)
  • AI helpers for planning and findings review (OpenAI or Ollama)
  • QoL utilities: proxies, cleanup, tmux bootstrap, URL extraction

Dependencies

  • Recommended: nmap, ffuf, httpx, nuclei, gobuster, gowitness, subfinder|amass, sqlmap, wpscan, droopescan, joomscan, magescan, impacket, ldap-utils, snmp, ripgrep, jq, python3 requests, socat, chisel

Documentation

  • See HOWTO for in-depth usage, recommended tools, pipeline semantics, dashboard legend, manifest schema, and examples.
  • See TOOLKIT for a categorized command catalog with examples and links back to HOWTO.

Safety

  • Intended for systems you have explicit permission to test. Scripts default to safe, passive checks unless you optin to aggressive actions.
Description
No description provided
Readme 132 KiB
Languages
Shell 50.3%
Python 46.2%
PowerShell 3.5%