Inguma is a penetration testing and vulnerability research toolkit. The framework includes modules that discover hosts, gather information, fuzz targets, brute force user names and passwords and attempt exploits. While the current exploitation capabilities are limited, the program provides numerous tools for information gathering and target auditing.
|Tags||Security Audit penetration testing network security Internet Networking|
|Operating Systems||Linux (32 and 64 bit) Windows Mac OS X|
|Implementation||Python 2.5 and above GTK|
Release Notes: This release adds a fuzzer UI. It rewrites the toolbars code and cleans them up. Updated to Bokken 1.0. Added systray functionality. A Logs tab warning has been added. The existing debugger has been removed; it was based on an external library that was quite old. Tab completion on OS X has been fixed. There are many cleanups in the CLI code. A new subdomain discover module has been added.
Release Notes: The most important change of this new release is the complete rewrite of the RCE interface and core. OpenDis has been removed, and so the objdump dependency, and a new interface has been added that uses Pyew as backend. This new interface offers most of the Pyew features in an easy-to-use GUI. The UI is much more stable now. A new GeoIP module has been added, based on the GeoIP library from MaxMind. Contextual node menus were added with additional information regarding a vulnerability. An autosave feature was added, which will save the KB after every module execution.
Release Notes: Many bugs were fixed. New modules were added and old, unmaintained ones were removed. The old Qt GUI has been removed and replaced with one based on PyGtk. Not all modules are working properly yet. The command line interface should work on Linux, Windows, and Mac OS X, but the GUI has only been tested on Linux.