In Japanese, imitating is called “Pakuru”.
ぱくる (godan conjugation, hiragana and katakana パクる, rōmaji pakuru)
- eat with a wide open mouth
- steal when one isn’t looking, snatch, swipe
- copy someone’s idea or design
- nab, be caught by the police
Pentesters love to move their hands. However, I do not like troublesome work. Simple work is performed semi-automatically with simple operations. PAKURI executes commands frequently used in penetration tests by simply operating the numeric keypad. You can test penetration as if you were playing a fighting game.
- November 2nd,2019: AV TOKYO 2018 Hive
Abilities of “PAKURI”.
- Intelligence gathering.
- Vulnerability analysis.
- Brute Force Attack.
By using our PAKURI, you will benefit from the following.
(a) This saves you the trouble of entering frequently used commands.
(b) Beginner pentester can learn the floe of attacks using PAKURI.
(c) Attack packets can be generated with a simple operation.
If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the PAKURI on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action.
- CUI-GUI switching
[email protected]:/usr/share/pakuri# ./pakuri.sh
Operation check environment
- OS: KAli Linux 2019.4
- Memory: 8.0GB
This tool is not yet complete. It will be updated sequentially.