Autopentestx launches as open-source penetration testing toolkit

AutoPentestX, a new open-source tool for automated penetration testing on Linux systems, allows users to conduct comprehensive security assessments with a single command. Developed by Gowtham Darkseid and released in November 2025, the toolkit emphasizes safe, non-destructive evaluations and generates detailed PDF reports. It targets distributions like Kali Linux, Ubuntu, and Debian.

AutoPentestX streamlines security testing by automating key processes such as operating system detection, port scanning, service enumeration, and vulnerability assessments. Released in November 2025 by developer Gowtham Darkseid, the toolkit is designed specifically for Linux environments, including Kali Linux, Ubuntu, and other Debian-based systems. It integrates established tools like Nmap for network discovery, Nikto and SQLMap for web application testing, and performs CVE lookups to score risks using CVSS metrics.

Results from scans are stored in an SQLite database, enabling persistent data for analysis and JSON exports for further integration. The tool also generates Metasploit RC scripts for reviewing potential exploits manually, but operates in a safe mode to avoid any actual harm or disruption to target systems. Installation requires Python 3.8 or higher, root access, and dependencies such as Nmap; users can clone the repository and run an install script or set up a virtual environment manually.

To use, administrators execute a simple command with a target IP address, which launches a full assessment lasting 5 to 30 minutes. Output directories include reports with professional PDFs featuring executive summaries, tables of open ports, CVE details, and risk classifications—such as critical for CVSS scores of 9.0 or above. These reports include weighted scores based on exploitability and provide remediation recommendations. Options allow skipping web scans or disabling safe mode, though the latter is discouraged.

All actions are logged for auditing purposes, and the toolkit includes clear disclaimers stressing its use only for authorized testing in compliance with legal standards. Looking ahead, planned enhancements involve support for multiple targets and machine learning-based predictions to improve vulnerability forecasting.

Makala yanayohusiana

Illustration of Kali Linux 2025.4 release on a hacker's laptop screen, showcasing new tools and updated desktop in a realistic cybersecurity workspace.
Picha iliyoundwa na AI

Kali Linux 2025.4 released with new tools and desktop updates

Imeripotiwa na AI Picha iliyoundwa na AI

Kali Linux has released version 2025.4 on December 12, 2025, marking its final update of the year. The release introduces three new hacking tools, significant desktop environment improvements, and enhanced support for Kali NetHunter. It focuses on modernizing the user experience for cybersecurity professionals and ethical hackers.

Offensive Security has released Kali Linux 2025.4, updating its penetration testing platform with improved desktop environments and fresh tools. The version focuses on usability across GNOME, KDE Plasma, and XFCE, while adding support for more devices in Kali NetHunter. It also defaults to Wayland for better compatibility.

Imeripotiwa na AI

The ParrotOS team has launched version 7.0 of its Debian-based ethical hacking and penetration testing distribution, codenamed Echo. Built on Debian 13 Trixie and Linux kernel 6.12 LTS, it features KDE Plasma as the default desktop environment on Wayland. New tools and RISC-V support highlight the update's focus on security professionals.

Oracle has updated its bpftune tool to version 0.4-1, enhancing automated tuning of Linux kernels using eBPF technology. The release improves usability with better documentation and focuses on optimizing network and memory settings in dynamic environments. This development aids system administrators in cloud and enterprise setups by reducing manual interventions.

Imeripotiwa na AI

Bc Security has launched Empire 6.3.0, an updated open-source tool for post-exploitation and adversary emulation. The release enhances capabilities for red teams and penetration testers through improved agent support and evasion techniques. It maintains a modular Python 3 architecture to simulate real-world attacks securely.

Threat actor zeta88 is promoting a new ransomware-as-a-service operation called The Gentlemen's RaaS on hacking forums, targeting Windows, Linux, and ESXi systems. The platform offers affiliates 90 percent of ransom payments and features cross-platform encryption tools developed in Go and C. This development highlights the ongoing commercialization of sophisticated ransomware targeting enterprise environments.

Imeripotiwa na AI

Ongoing exploitation of the React2Shell vulnerability (CVE-2025-55182)—previously detailed in coverage of China-nexus and cybercriminal campaigns—now includes widespread Linux backdoor installations, arbitrary command execution, and large-scale theft of cloud credentials.

Ijumaa, 30. Mwezi wa kwanza 2026, 21:23:53

Researchers uncover ShadowHS Linux exploitation framework

Ijumaa, 23. Mwezi wa kwanza 2026, 05:13:14

Fortinet FortiGate devices face automated attacks creating rogue accounts

Alhamisi, 8. Mwezi wa kwanza 2026, 08:48:32

The myth of Linux's invincibility in enterprise security

Alhamisi, 8. Mwezi wa kwanza 2026, 06:04:40

Linux battery utility TLP patched after authentication bypass flaw

Jumatano, 7. Mwezi wa kwanza 2026, 09:35:24

Gobruteforcer botnet targets Linux servers worldwide

Ijumaa, 26. Mwezi wa kumi na mbili 2025, 08:41:15

PorteuX 2.5 Linux distribution launches with kernel and desktop updates

Jumanne, 23. Mwezi wa kumi na mbili 2025, 03:11:38

Tools simplify GitHub binary management on Linux

Jumamosi, 20. Mwezi wa kumi na mbili 2025, 09:12:44

Researchers investigate executable stack issues in Linux systems

Jumamosi, 13. Mwezi wa kumi na mbili 2025, 02:22:17

Rust-based Luca stealer targets Linux and Windows systems

Jumatano, 29. Mwezi wa kumi 2025, 11:29:39

Malicious npm packages steal developer credentials on multiple platforms

 

 

 

Tovuti hii inatumia vidakuzi

Tunatumia vidakuzi kwa uchambuzi ili kuboresha tovuti yetu. Soma sera ya faragha yetu kwa maelezo zaidi.
Kataa