Penhelper is a Python-based automation tool designed for web security assessment, penetration testing, and vulnerability detection. The tool offers a range of modules that automate tasks such as technologies detection, subdomain enumeration, endpoint detection, security header analysis, DNS reconnaissance, and more. Penhelper simplifies the process of identifying vulnerabilities and potential security weaknesses in web applications.
Please Note: This tool is currently in an alpha release, which means it's not yet feature-complete and might contain bugs or incomplete functionality. Contributions and feedback are welcome as we work towards improving and enhancing the tool.
-
Clone the Repository:
git clone https://github.com/kaster-san/Penhelper.git cd Penhelper
-
Install Dependencies:
pip install -r requirements.txt
-
Go to the Google Cloud Console.
-
Create a new project or select an existing one.
-
In the navigation pane, click on "APIs & Services" > "Dashboard."
-
Click on "+ ENABLE APIS AND SERVICES" at the top of the page.
-
Search for "Custom Search JSON API" and select it.
-
Click on the "Enable" button for the "Custom Search JSON API."
-
In the navigation pane, click on "APIs & Services" > "Credentials."
-
Click on "+ CREATE CREDENTIALS" and select "API Key."
-
A new API key will be created. Copy the generated API key.
-
Go to Google Custom Search.
-
Click on "Create a Programmable Search Engine."
-
Follow the setup process to create a new search engine.
-
In the "Sites to Search" section, add the sites you want to search using Google Dorking.
-
Once the search engine is created, go to "Control Panel" > "Details" and copy the "Search Engine ID."
-
Open the
Penhelper.py
script. -
Find the section where Google Dorking Module is performed.
-
Replace the placeholders 'YOUR_API_KEY' and 'YOUR_SEARCH_ENGINE_ID' with your API key and Custom Search Engine ID:
-
Save the changes.
With the Google API key and Custom Search Engine ID configured in the script, you can now use the Google Dorking feature of the Penhelper tool to search for potential sensitive information exposed via Google search results.
By following these steps, you'll be able to leverage the power of Google Dorking to enhance your security assessment workflows and discover potential vulnerabilities and exposures in your target websites.
Run the main script Penhelper.py
with the target URLs as arguments:
python Penhelper.py https://example.com
The Penhelper tool includes the following modules:
- Technologies Detection and WordPress Scan
- Google Dorking
- Subdomain Enumeration
- Endpoints Enumeration
- SQL Injection (SQLi) Testing
- Security Headers Analysis
- DNS Enumeration and Open Ports Scan
- Service Scan (FTP, SMB, Telnet)
Contributions to the Penhelper tool are welcome! Feel free to open issues for bug reports or suggestions, and submit pull requests to contribute improvements or additional features.
Penhelper is released under the GNU General Public License v3.0 (GPL-3.0) License.
This means that you are free to use, modify, and distribute this software under the terms of the GPL-3.0 license. However, it's important to understand and adhere to the terms outlined in the license document. You can find a copy of the full license text in the LICENSE file.
Please note that any contributions you make to this project will also be covered by the same license terms.
For more details, please visit the GNU website to learn about the rights and restrictions provided by this license.