Initializes a pentest folder structure and creates two scripts: initial_scan.sh and detailed_scan.sh. The first script runs a full nmap scan on the specified IP address and stores the results in scans/initial.nmap. The second script runs a detailed nmap scan on the open ports found in scans/initial.nmap, limits the scope of the scan to the IP's subnet, and stores the results in scans/detailed.nmap.
initpentest [folder] [ip_address]
I did not add the #!/bin/bash
command on top of the file for the simple reason that I am sourcing this file from my .zshrc
, mostly our of preference:
I also removed the .sh
extension, again, out of preference for partial scripts.
# Loading initpentest
source ~/.initpentest
Here is an overview of the structure it creates
.[folder]
├── exploit
├── loot
├── Notes.md
├── scans
│ ├── detailed.nmap
│ └── initial.nmap
└── scripts
├── detailed_scan.sh
└── initial_scan.sh
The Notes.md
folder has a basic header pre-filled with the name of the folder (usually the name of the machine targetted) along with the IP Address with this format:
Important: This format within
Notes.md
is used by the scripts to target the right IP Address.
# Machine Name
## <Ip Address>
Feel free to make a pull request if you :
- See something odd
- Want to add features
Or you can simply open an issue for features you'd like to see added.
I'm a sloppy bash coder so forgive the wacky syntax. Feel free to provide constructive criticism if you feel like it!
View LICENSE.md
This was a test project with OpenAI ChatGPT, so credits where due, but I worked all night to fix the dump mistakes it would do. I probably made some more mistakes myself in the process.