Inguma is a penetration testing toolkit entirely written in python. The framework includes modules to discover hosts, gather information about, fuzz targets, brute force user names and passwords and, of course, exploits for many products.
Inguma the word is the name of a Basque’s mythological spirit who kills people while sleeping and, also, the one who make the nightmares.
It was initially oriented to attack Oracle related systems but it can be used for any kind of setup.
What are the discover and gather modules you may ask? Discover modules are used to detect networks and host; gather modules are used to determine what services are listening at the host, what operative system is being used, what service pack, etc…
Sadly at this time it doesn’t work at all on Win32, again the problem with RAW sockets and the Scapy library won’t work for Win32. If you are running Win2k you might have less problems.
It’s a very early version of the software and development seems to have been quiet lately, I hope more people can contribute to this project and get it moving again.
It certainly has promise!
You can download Inguma here:
Or read more here.
- OAT – Oracle Auditing Tools For Database Security
- ODAT (Oracle Database Attacking Tool) – Test Oracle Database Security
- Navy Sys Admin Hacks Into Databases From Aircraft Carrier
- Inguma 0.0.5 Released for Download – Penetration Testing Toolkit
- Inguma Is Back – The Penetration Testing & Vulnerability Research Toolkit
- Inguma 0.0.7.2 Released for Download – Penetration Testing Toolkit
Most Read in Database Hacking: