Inguma v0.4 Released

Inguma is a penetration testing toolkit entirely written in python. The framework includes modules to discover hosts, gather information about, fuzz targets, brute force user names and passwords and, of course, exploits.

While the current exploitation capabilities in Inguma may be limited, this program provides numerous tools for information gathering and target auditing. Inguma is still being heavily developed so be sure to stay current and check back for news and updates.

Changelog v0.4

  • The GUI has been modified and cleaned in order to give more space to the most active areas like the network map, the RCE interface or the exploits/fuzzing areas.
  • We have updated Bokken subproject to the last stable version available, v1.0. It features an interactive mode, better code disassembly and analysis and better integration with Inguma’s GUI. More information about Bokken can be found here.
  • The systray functionality allows now to hide the Inguma GUI while it’s working and it will warn you once the running modules have finished.
  • A new fuzzing tab has been added to the Exploits workspace with two different fuzzers: Krash and Scapy.
  • The CLI interface has received some attention again and a few new shortcuts like ‘?’ for help or ‘..’ to go back to the main menu are now available in nearly all the modules.
  • Inguma CLI now works better on MacOS with autocompletion and key bindings.
  • All the fuzzing modules are now under the fuzzers category and have been fixed.
  • Minor changes here and there.
  • Lots of code refactoring and bugs fixed.

Download Inguma v0.4

MaxiSoler

www.artssec.com @maxisoler