Penstaller is a Python-based automation tool designed to simplify the installation of essential bug bounty and penetration testing tools. With just one command, Penstaller sets up your system with all the necessary tools for reconnaissance, fuzzing, web vulnerability scanning, and more. It ensures a clean and efficient setup, saving you time and effort when configuring new environments for bug hunting or security testing. Perfect for both beginners and seasoned professionals, Penstaller keeps your system lightweight and ready for action.
The Penstaller
script handles:
→ Installation of essential programming languages and package managers like Go, CMake, Pip, and Cargo.
→ Automated installation of various pentesting tools, including subdomain enumeration, fuzzing, web reconnaissance, and more.
→ A detailed list of recommended wordlists to be manually installed for enhanced performance.
📌 Start Fresh: Boot into a clean OS with no pre-installed bloatware.
📌 Run Penstaller: Execute the script to automatically install your entire bug bounty & pentesting toolkit.
📌 Get to Work: Once completed, you are ready to start bug hunting and pentesting without any unnecessary clutter on your system.
unzip |
wget |
go |
cmake |
pip |
cargo |
ruby |
xsstrike |
dalfox |
puredns |
httprobe |
naabu |
hakrawler |
gospider |
LinkFinder |
SecretFinder |
subjs |
xnLinkFinder |
cors |
gobuster |
nikto |
wpscan |
jq |
x8 |
urldedupe |
qsreplace |
gau |
gf |
waybackurls |
uro |
ffuf |
anew |
subfinder |
httpx |
nmap |
dirsearch |
amass |
sublist3r |
assetfinder |
nuclei |
massdns |
shuffledns |
paramspider |
arjun |
katana |
sqlmap |
ghauri |
pii |
pdsi |
Before using Penstaller
, make sure your system meets the following prerequisites:
- Operating System: Ubuntu/Debian-based distributions (support for other Linux distributions may vary).
- Install the Requirements.txt: Install the requirements.txt with
pip3 install -r requirements.txt
. Ensure you have the necessary permissions.- Internet Connection: A stable internet connection is required to download the tools and dependencies.
To use FindME, follow these steps:
-
git clone https://github.com/0xSaikat/penstaller.git cd penstaller
-
pip3 install -r requirements.txt
-
chmod +x penstaller.py
-
python3 penstaller.py
After running the script, you'll need to manually install the recommended wordlists:
- SecLists: SecLists GitHub
- OneListForAll: OneListForAll GitHub
- bbFuzzing: bbFuzzing GitHub
- PayloadsAllTheThings: PayloadsAllTheThings GitHub
- Dirsearch Wordlist: Dirsearch Wordlist
- Gf-Patterns: Gf-Patterns GitHub
- More Gf-Patterns: Gf-Patterns Collection GitHub
- Nuclei-Templates: Nuclei-Templates GitHub
- Commonspeak2: Commonspeak2 Wordlist
The script will provide the full list of wordlists and corresponding links when it's run.
I am Sakil Hasan Saikat, a cybersecurity enthusiast and the founder of HackBit. I specialize in offensive security, penetration testing, and building automated tools for cybersecurity research. My passion for ethical hacking has driven me to create several tools that contribute to the security community.
You can learn more about my work on my personal website: https://saikat.hackbit.org.
Connect with me on LinkedIn for updates and collaborations.
HackBit is a cybersecurity-focused organization committed to discovering vulnerabilities, creating solutions, and making the internet a safer place. Join us in our mission to secure the digital world.
This project is licensed under the MIT License - see the LICENSE file for details.