This document tracks planned features, improvements, and ideas for the PenWeb project.
- LinkedIn Spider Integration 🕷️
- Integrate linkedin-spider as a reconnaissance tool
- Add as git submodule in
modules/linkedin-spider/ - Create CLI menu option for LinkedIn profile collection
- Use cases: OSINT, reconnaissance, social engineering assessments
- Features: Google Search-based scraping, profile data collection, Excel export
- Installation:
pip install linkedin-spider(when available)
-
Port Scanner
- Add comprehensive port scanning functionality
- Integration with nmap or custom implementation
- Support for TCP/UDP scanning
- Service version detection
- Output in multiple formats (JSON, CSV, HTML)
-
Subdomain Enumeration
- Discover subdomains for target domains
- Multiple enumeration techniques (DNS, certificates, search engines)
- Integration with existing tools or custom implementation
-
SQL Injection Tester
- Automated SQL injection detection
- Support for various database types
- Payload customization
- Safe testing mode with detailed reporting
-
XSS Scanner
- Cross-Site Scripting vulnerability detection
- Multiple payload types (reflected, stored, DOM-based)
- Context-aware testing
- HTML report generation
-
Tor Integration
- Built-in Tor proxy support
- Circuit rotation and management
- Exit node selection by country
- Integration with existing tools
-
Proxy Chain Manager
- Multiple proxy protocol support (HTTP, SOCKS4, SOCKS5)
- Proxy list management and testing
- Chain configuration for enhanced anonymity
- Health check and auto-rotation
-
WHOIS Lookup
- Domain registration information
- Historical WHOIS data
- Bulk lookup support
-
DNS Enumeration
- Comprehensive DNS record queries
- Zone transfer testing
- DNS history and changes
- Reverse DNS lookup
-
SSL/TLS Analysis
- Certificate information extraction
- Cipher suite analysis
- Vulnerability detection (Heartbleed, POODLE, etc.)
- Certificate chain validation
-
Directory Brute-Forcing
- Common directory and file discovery
- Custom wordlist support
- Recursive scanning
- Status code filtering
-
API Testing Module
- REST API endpoint discovery
- Authentication testing
- Rate limit testing enhancement
- GraphQL support
-
Header Analysis
- Security headers checker
- Missing headers detection
- Configuration recommendations
- Compliance validation (OWASP, PCI-DSS)
-
Expand Test Coverage
- Unit tests for all services (clone, d2, attempt_login)
- Integration tests for CLI workflows
- Lambda function comprehensive tests
- Mock external dependencies
- Target: 80%+ code coverage
-
Performance Optimization
- Async/await for concurrent operations
- Connection pooling for HTTP requests
- Caching mechanism for repeated queries
- Memory usage optimization
-
Code Quality
- Add type hints to all functions
- Improve docstrings (Google/NumPy style)
- Refactor large functions
- Apply SOLID principles
-
Docker Support
- Multi-stage Dockerfile for production
- Docker Compose for development environment
- Pre-built images on Docker Hub
- Kubernetes deployment manifests
-
Database Integration
- PostgreSQL for persistent storage
- Store scan results and history
- Query interface for historical data
- Export to various formats
-
Web Interface
- Flask/FastAPI web dashboard
- Real-time scan monitoring
- Historical data visualization
- REST API for programmatic access
-
Configuration Profiles
- Preset configurations for common scenarios
- Quick-switch between profiles
- Import/export profile settings
- Cloud sync for configurations
-
Plugin System
- Plugin architecture for extensibility
- Community plugin repository
- Auto-update mechanism
- Plugin marketplace
-
Output & Reporting
- HTML report generation with charts
- PDF export functionality
- Multiple output formats (JSON, XML, CSV, Markdown)
- Custom report templates
-
Video Tutorials
- Getting started guide
- Tool-by-tool walkthroughs
- Advanced usage scenarios
- YouTube channel or documentation site
-
Use Case Examples
- Real-world penetration testing scenarios
- Bug bounty hunting workflows
- Security audit procedures
- Educational content for learners
-
API Documentation
- Comprehensive API reference
- Code examples in multiple languages
- Interactive API explorer
- Postman collection
-
Shodan Integration
- Search Shodan for target information
- Vulnerability data enrichment
- Historical data access
-
VirusTotal Integration
- URL/domain reputation checking
- Malware detection
- Threat intelligence
-
HaveIBeenPwned Integration
- Email/password breach checking
- Credential validation
- Security awareness
-
OWASP ZAP Integration
- Active/passive scanning
- Automated security testing
- Report consolidation
-
Enhanced CLI Interface
- Progress bars for long operations
- Colored output themes
- Better error messages with suggestions
- Command history and autocomplete
-
TUI (Text User Interface)
- Full-screen terminal UI with
textualorblessed - Split-pane views for monitoring
- Real-time dashboards
- Mouse support
- Full-screen terminal UI with
-
Encrypted Storage
- Encrypt sensitive configuration data
- Secure credential storage
- Key management system
-
Audit Logging
- Comprehensive activity logging
- Tamper-evident logs
- Log rotation and archival
- SIEM integration support
-
Authentication & Authorization
- Multi-user support
- Role-based access control (RBAC)
- API key management
- Session management
-
Mobile App
- React Native or Flutter app
- Remote control of CLI tools
- Push notifications for scan completion
- Offline mode for reports
-
Browser Extension
- Quick security checks from browser
- Context menu integration
- Passive reconnaissance
- One-click vulnerability scanning
-
Contribution Templates
- Issue templates for bugs/features
- Pull request templates
- Feature request form
- Bug report form with auto-collection
-
Community Plugins
- Plugin development guide
- Plugin review process
- Featured plugins showcase
- Plugin dependency management
- Machine Learning for vulnerability prediction
- Blockchain integration for audit trails
- Automated exploit development (educational only)
- Cloud-native scanning (AWS, GCP, Azure)
- IoT device security testing
- Mobile application security testing
- Social media OSINT tools
- Threat modeling automation
- Red team collaboration platform
- CTF (Capture The Flag) training mode
- Features marked with 🕷️ have external dependencies or integrations
- Priority may change based on community feedback
- Some features may be split into separate projects
- Always follow ethical hacking guidelines and obtain proper authorization
Have an idea for a cool feature?
- Check if it's already listed here
- Open an issue on GitHub with the
enhancementlabel - Discuss the feature with maintainers
- Submit a PR if you want to implement it yourself
See CONTRIBUTING.md for detailed guidelines.
Last Updated: November 2025
Version: 0.3.2