The KITT Penetration Testing Framework was developed as an open source solution for pentesters and programmers alike to compile the tools they use with what they know into an open source project. With KITT, users are able to easily access a list of commonly used tools to their profession which are all open to configuration in the source code.
WARNING: This project is no longer being updated and some installation features may not be compatible with 2020+ versions of Kali! Use Kali 2019 for easiest installation or switch over to KITT-Lite.
If you prefer a CLI tool to a GUI tool KITT Lite, a lighter and more advanced tool for the command line, can be found here
- FOCA - Fingerprinting Organizations w/ Collected Archives
- Google Dorks List - Custom list of google dorks
- recon-ng - Web Reconnaissance Framework
- fbi_master - Facebook Informations Tool
- Autosploit - Automated Mass Exploiter
- net-creds.py - Network Traffic Credentials Sniffer
- Domainsticate - Custom domain enumeration tool
- Shodan Search - Quick Shodan search tool
- PhoneInfoga - OSINT tool for phone numbers
- sonar.py - Mass email sender
- blackeye - Webpage Phishing Tool
- SET - Social Engineers Toolkit
- Metasploit - Exploitation Framework
- LM Exploit for Windows - Custom Ubuntu usb boot exploit
- Unplug.sh - hosts file editor script
- Cisco_E4200_vuln.py - Cisco Router Vulnerability
- Redis-Server-Exploit.py - Redis Server Vulnerability
- Payloads - PHP Web shells, P4wnP1 ALOA HID Scripts
- OWASP-ZSC - Payload Encoder
- BIOS_UBTU_Rooter.sh - Custom Ubuntu usb boot exploit
- LinEnum - Linux shell enumeration tool
- Linux - Linux Exploits and Enumeration Scripts
- Mimikatz_trunk - Windows post exploitation tool
- mysql - MSQL exploits and enumeration scripts
- passwd_backdoor.sh - Custom passwd/ backdoor exploit for post-exploitation
- pspy - Process scanner for linux
- windows-privesc-check - Windows PrivEsc Scripts
- Windows-Privlege-Escalation - Windows PrivEsc Scripts
- append_num.py - appends number range 0-99 to any wordlist
- burpsuite - web app vulnerability scanner
- decoders - Popular website for encryption decoding
- ROT_Decrypt - ROT Cipher Brute-Forcer
- Airsuite-ng - Software suite w/ detector, packet sniffer, WEP and WPA/WPA2-PSK Cracker and analysis tool
- Wash & Reaver - WPS Cracking tools
- Wifite2 - Network Auditing Tool
- Ettercap - MiTM Attack Suite
- Fluxion - MiTM Attack Suite
- Airgeddon - Network Auditing Tool
- WiFi-Pumpkin - GUI AP Spoofing Tool
- HomePwn - IoT Exploitation Framework
- PentBox - HoneyPot Setup Tool
- Spooftooph - BT Spoofing
- BtVerifier - Rfcomm Channel Verifier
- Android Rootkits - HiddenSMSTracker & NewKingroot
- MouseJack - BT Keyboard and Mouse Hijacker
- Keyloggers - Winupdate, kidlogger(win) and staffcounter(lin)
- Digispark Tools - Duck2Spark converter for Digispark Devices
- GPIO_CTL - Custom GPIO Controller for RPi
- MAC_changer - MAC Address Spoofer
- ssh_port_randomizer - SSHD Port Randomizer
- ssh rsa_key generator - RSA Key generator
- proxy router - Traffic Proxy Router
- ssh_encryption - Buffing SSHD Security Protocols
- static IP setter - Sets static IP for device
- Fail2ban Configurations - Fail2ban Protocol Auditer
- File Backup - File Backup Tool
- IRCssi - CLI IRC tool
WARNING: KITT was developed and tested on Kali Linux for RPi, I have not added support for any other distro yet but plan to in the near future.
To begin, run ./KITT_INSTALLER.sh
to install all necessary libraries and configure PATH usage.
Simply follow all instructions in the installer.
If you do not want to install KITT to alias then simply run python3 lib_install.py
or ./lib_install.py
to install necessary libraries
To begin the framework, type KITT2
and execute in terminal.
Usage of KITT and/or the tools installed with KITT for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.
- RPi 3B+ - Micro-Computer Developed by the Raspberry Pi Foundation
- Kali Linux - Pentesting OS Developed by Offensive Security
- GitHub - This Website!
- Cisc0-gif - Main Contributor/Author: Ecorp7@protonmail.com
This project is licensed under the GNU General Public License v3 - see the LICENSE file for details
All credits are given to the authors and contributors to tools used in this software