Local, no‑cost web pentesting toolkit with:
- One‑command scans (
scan <target>) and a Streamlit GUI (pentest-gui). - ProjectDiscovery stack, ZAP, discovery/fuzzing, screenshots, wordlists.
- WAF‑aware adaptation (auto backoff, Slow/Very Slow), proxy, randomized headers.
- Browser priming (Playwright) + cookie reuse for bot‑managed paths.
Run the bootstrap installer — it clones this repo, installs deps, and creates launchers:
bash -c "$(curl -fsSL https://raw.githubusercontent.com/KasraBayani/web-pentest-orchestrator/main/scripts/bootstrap.sh)"
Alternatively, manual steps:
git clone https://github.com/KasraBayani/web-pentest-orchestrator.git ~/web-pentest-orchestrator
cd ~/web-pentest-orchestrator
./scripts/install.sh
This will:
- Install needed CLI tools (subfinder, httpx-toolkit, naabu, nuclei, dnsx, ffuf, feroxbuster, katana, gowitness, zaproxy, seclists, etc.)
- Install Python add‑ons (LinkFinder, SecretFinder, corscanner, streamlit), Go add‑ons (gau, waybackurls, anew, etc.)
- Set up
~/bin/scan,~/bin/webscan,~/bin/webauth, and thepentest-guilauncher - Create a desktop entry (Applications → Web Pentest Orchestrator)
- CLI:
scan example.com --deep(add--slowor--very-slowfor strict WAFs) - GUI:
pentest-gui
authsetup example.comthen edit~/pentest/auth/example.com.env, and runscan example.com --auth
bin/lightweight wrapperspentest/run-web.shorchestration scriptpentest/bin/*helperspentest/gui/app.pyStreamlit UIkali-harden/*optional hardening scriptsdocs/SESSION_NOTES.mdoperational notes
- Results are written to
~/pentest/out/<host>/(outside this repo)
- Remove the repo dir
~/web-pentest-orchestratorand the launchers in~/bin/(scan,webscan,webauth,pentest-gui).
MIT — see LICENSE.