KaliPAKU is a command-line tool for Kali Linux that provides an easy-to-use menu-driven interface to run various security tools. The tool is designed to simplify the process of running popular security tools and includes the top 10 tools from the Kali Linux distribution. One of the unique features of KaliPAKU is its intuitive menu system, which is based on the Ten-Key Numbering System. This allows users to quickly select the tool they want to run by typing the corresponding number on the keypad. This menu system is designed to be easy to use and can be quickly mastered even by those who are new to Kali Linux. Overall, KaliPAKU is a powerful and easy-to-use tool for anyone looking to simplify the process of running popular security tools on Kali Linux.
I call it "KaliPAKU" with a hint of irony, since it looks like a tool I made myself, using tools included in Kali Linux and adding a little PAKURI control. Incidentally, "karipaku" in Japanese slang indicates embezzling something borrowed.
借りパク (rōmaji karipaku) To take something borrowed and make it one's own property. Or to have it done to you by the other party. Wikitonary:かりぱく
KaliPAKU is a Bash shell script that allows users to easily access the Kali Linux tools included in the kali-tools-top10 package. One of its unique features is the Ten-Key Numbering System, which allows users to execute commands by simply typing numbers on the numeric keypad. This system is similar to the finger numbers used when learning to play a musical instrument, and is designed to make it easier for beginners to use Kali Linux.
In addition to its easy-to-use interface, KaliPAKU also includes an educational aspect. Whenever a command is executed, an explanation of the options used is displayed, helping users to learn more about the commands and options available.
KaliPAKU is based on the guidelines provided in NIST SP 800-115, which outlines the process and procedures for conducting penetration testing. As such, it includes the necessary Kali Linux tools to facilitate penetration testing, and assists users by providing step-by-step guidance.
To use KaliPAKU, simply download and run the script in the terminal. From there, users can select the desired Kali Linux tool from the numbered list and enter any necessary options. The tool will then execute and display the results.
KaliPAKU is a powerful tool for anyone looking to improve their penetration testing skills, and its user-friendly interface makes it accessible to people of all backgrounds and skill levels.
CAUTION |
---|
If you are interested, please use them in an environment under your control and at your own risk. And, if you execute the KaliPAKU on systems that are not under your control, it may be considered an attack and you may have legally liabillity for your action. |
The benefits of using our KaliPAKU include
- Red Team
- Efficiency: With the Ten-Key Numbering System, Red Team members can quickly execute commands without the need to remember complex syntax.
- Education: KaliPAKU includes explanations of the commands and options used, which can help Red Team members to better understand the tools they are using.
- Consistency: By using KaliPAKU, Red Team members can ensure that they are consistently using the same set of tools and commands, which can help to reduce errors and improve their overall effectiveness.
- Blue Team
- Monitoring: The assisting features provided by KaliPAKU help them understand the tools and procedures an attacker might use. This allows Blue Teams to detect and respond to signs of an attack earlier.
- Reverse Investigations: Blue Teams can use KaliPAKU to perform reverse investigations. This allows them to identify and remediate potential vulnerabilities and attack vectors.
- Training: KaliPAKU allows blue team members to perform validation procedures similar to those used by attackers. This allows the blue team to better assess the risk of an attack from a different perspective.
- Beginners & Scriptkiddy
- Ease of use: By using the Ten-Key Numbering System, beginners do not need to learn complicated commands.
- Learning: KaliPAKU includes explanations of commands and options so that beginners can better understand the tools they are using.
- Motivation: KaliPAKU makes it easy for beginners to perform tasks. This allows them to take the next step with confidence and increases their motivation to learn.
-
Just start kalipaku.sh. Installation is not required in principle.
┌──(kali㉿kali)-[~/KaliPAKU] └─$ ./kalipaku.sh
-
KaliPAKU Terminal Enter "kp" or "kalipaku" at the KaliPAKU terminal or enter the magic number "4649" to activate the KaliPAKU menu.
-
KaliPAKU Cheatsheet
Here is a partial cheat sheet of commands that can be called up in the KaliPAKU menu. To check the cheat sheet, use "cs", "cheat", or "cheatsheet". You can also use the magic number "4936".
- kali-tools-top10
- Other Kali tools
-
Github tools
-
Original
- vulncheck
-
To scan with Nmap, start KaliPAKU and activate the KaliPAKU menu. The magic number to type is "4649". The magic number is "4649", which means "greetings" in Japanese.
-
Then enter the magic number "1022" if you want to perform an Intense Scan of Nmap(It takes only about 0.5 seconds to transition to this screen)
-
You will then be prompted to enter the IP address of the destination.
-
Then, press "2" for "Yes" after the final confirmation if it is OK.
This completes the process. Now wait for the result.
- port scan
- vulnerability scan
- vulnerability enumeration
- Exploit code investigation
- Exploit Execution
Perform the above steps against metasploitable2 using KaliPAKU. Notice how concise and intuitive the behavior is using the ten-key numbering system!
- Using Faraday to Aggregate Information
- Service Enumeration
- Password List Attack
Use Faraday to effectively use the reconnaissance information collected in Demo1. See the procedure for starting Faraday and importing data using a ten-key numbering system.
- OS: Kali Linux 2022.4
- Memory: 8.0GB
If you have some new idea about this project, issue, feedback or found some valuable tool feel free to open an issue for just DM me via @Mr.Rabbit or @PAKURI.