katana

Multi Purpose Hacking/ Pentesting Tools


What is Katana
Katana is a flexible set of components that is used for building and hosting OWIN-based web applications on .NET Framework. This repo is the home for the Katana host, server, and middleware source code and documentation. Official releases of Katana components (including prerelease versions) can be found here. These tools are developed by the ASP.NET team at Microsoft in collaboration with a community of open source developers.

Is Katana free?
Yes, Katana is free to use and supported distributions include: Kali Linux, Debian(8), Parrot OS, Wifislax, OpenSuse, Arch Linux, Raspbian, Ubuntu and Xbuntu.

Below are the features and tools of Katana:

  1. web/cp.finder – Administrator Panel Finder.
  2. web/bypass.sql – bypass SQLi with Cheats Injections.
  3. web/bt.form – Brute force to Form-based.
  4. web/bt.http – Brute force to Http Authentication.
  5. web/whois – Whois, DNS Lookup.
  6. web/clt.lfd – LFD Vulnerability Console.
  7. net/sf.arp – ARP tables Monitor.
  8. net/sc.hosts – Hosts live Scan in LAN.
  9. net/sc.scan – Scan [Ports, OS, Etc] IP.
  10. net/work.sniff – HTTP sniffer.
  11. net/arp.pson – ARP poisoning Attack.
  12. net/arp.dos – ARP D.O.S Attack.
  13. net/dns.spoof – DNS Spoofing.
  14. net/dns.fake – DNS fake Server Spoof.
  15. net/web.dos – Web D.O.S Attack in LAN.
  16. msf/back.door – Generate backdoors with MSF.
  17. set/web.hot – Gathering Information with web.
  18. set/em.boom – E-mail Boombing (SPAM).
  19. clt/cl.sql – Mysql Console Client.
  20. clt/cl.ftp – FTP Console Client.
  21. clt/cl.pop – POP Console Client.
  22. clt/cl.adb – ADB Console Client (Android).
  23. btf/pr.ftp – Brute Force to FTprotocol.
  24. btf/pr.sql – Brute Force to SQL protocol.
  25. btf/pr.ssh – Brute Force to SSH protocol.
  26. btf/pr.pop – Brute Force to POP3 protocol.
  27. anf/af.imagen – Forensic image analysis.
  28. fle/bt.rar – Brute Force to RAR file.
  29. fle/scan.file – Report of Virus Scan file.
  30. fle/bt.zip – Brute Force to ZIP file.
  31. mcs/gn.words – Generator Dictionaries.
  32. mcs/i.settup – Show Properties of System Current.
  33. mcs/ts.login – Test Credentials protocols.
  34. mcs/px.checker – Proxy list checker.
  35. wifi/ap.dos – Access Point D.O.S attack.
  36. wifi/ev.twin – Access Point Phising.

For information about individual components, you may visit the list of Packages

What are the Typical Uses for Katana
Katana is written in Python and a framework made for penetration testing. It is based on a simple and comprehensive structure for anyone to use, modify and share. The current version is not completely stable so it is recommended to update of ever you use it.


How To Install Katana
This tool works best on Linux, preferably something like Kali Linux, Backbox or any other flavours therein for Pentesting Purposes.

Step 1: cd Desktop

Step 2: git clone https://github.com/PowerScript/KatanaFramework.git

Step 3: cd katana

Step 4: chmod 777 install

Step 5: ./install


Enjoy and use responsibly!



Leave a comment or reply below...thanks!