PCWT – A Web Application That Makes It Easy To Run Your Pentest And Bug Bounty Projects

A world wide web application that would make it uncomplicated to operate your pentest and bug bounty projects.
Description
The app delivers a handy net interface for doing the job with numerous varieties of documents that are employed throughout the pentest, automate port scan and subdomain lookup.
Principal site
Task configurations
Domains dashboard
Port scan
You can scan ports using nmap or masscan. The nmap is started off with the pursuing arguments:
nmap --top-ports 10000 -sV -Pn --min-amount 300 --max-retries 2 [ip]
The masscan is began with the adhering to arguments:
masscan -p 1-65535 --charge 2000
Subdomain search
Amass and findomain are made use of to discover subdomains.
Options
- Go away notes to host, port or domain.
- Mark host or area with tags.
- Look for by any area connected with host, port or area (tags and notes are incorporated). Regexp is out there.
- Various styles of sorting ara offered on pretty much all dashboards.
- Operate port scan for all hosts, hosts with no port scan or custom made listing.
- Create responsibilities for subdomains research (every 2 several hours, every single 5 hrs, every single day or each and every 7 days). You can also disable and allow them on desire employing
Subdomain tasks
dashboard. - Distinctive kinds of export are out there.
- Notifications about the start out and conclusion of the scan, as perfectly as about new located domains can be despatched to Telegram. Update the
config.py
with your chat id and token.
Install from resources
Note 1: Improve the paths for amass, findomain, nmap and masscan in config.py
prior to working commands. Notice 2: The application ought to be began as root if you want masscan to do the job.
apt put in python3 python-venv python3-pip
git clone https://github.com/ascr0b/PCWT
cd PCWT
python3 -m venv env
supply env/bin/activate
pip3 set up -r specifications.txt
flask init-db
flask crontab add
export FLASK_Application=app
flask run
The app is offered at http://127…1:5000