TAPE is a powerful pentesting enumeration tool that automates reconnaissance and enumeration tasks, leveraging the flexibility of tmux to provide an efficient workflow for penetration testers. TAPE simplifies the process of running and managing multiple commands across a variety of services and protocols, all within a clean and customizable environment.
- Automated Reconnaissance: Automatically scans networks and extracts open ports.
- Service Enumeration: Supports multiple protocols and services, with predefined commands for various scenarios.
- Command Listing: View all commands globally or filter them by service or action.
- Flexible Execution Options: Run commands interactively or list them without execution.
- Tmux Integration: Automatically organizes tasks in tmux windows, categorized by protocol and action.
Ensure you have the following tools installed on your system:
- Python 3.8+
pip
(Python package manager)tmux
(Linux only, for terminal multiplexing)
-
Clone the Repository
git clone https://github.com/ChronosPK/TAPE.git cd TAPE
-
Run the Installation Script Execute the
install.sh
script to automatically install dependencies and set up TAPE:sudo ./install.sh
This script performs the following actions:
- Updates system packages.
- Installs required tools and dependencies (e.g.,
tmux
,nmap
,gobuster
). - Sets up Python packages required for TAPE.
- Adds TAPE to your system PATH for global usage.
-
Verify Installation After running the script, verify that TAPE is installed:
tape -h
usage: tape.py [-h] [-n NET] [-i IP] [-d DOMAIN] [-x] [-l] [-s SERVICE] [-q] [-f]
TAPE - Tmux Automated Pentesting Enumeration
options:
-h, --help Show this help message and exit
-n NET, --net NET Set target network (e.g., 192.168.1.0/24)
-i IP, --ip IP Set target IP address
-d DOMAIN, --domain DOMAIN Set target domain
-x, --execute Execute the enumeration process
-l, --list-commands List all available commands
-s SERVICE, --service SERVICE Specify a service to list commands for
-q, --quiet Suppress command output (commands are echoed by default)
-f, --force-recon Force reconnaissance scans even if already done
-
List All Commands
python tape.py -l
-
Run Reconnaissance on a Target IP
python tape.py -i 192.168.1.1 -x
-
Specify a Service for Enumeration
python tape.py -s FTP -i 192.168.1.1
-
Quiet Mode Suppress command output during execution:
python tape.py -i 192.168.1.1 -x -q
-
Combine IP and Domain for Verification
python tape.py -i 192.168.1.1 -d example.com
-
Force Reconnaissance
python tape.py -i 192.168.1.1 -f
TAPE provides a structured and streamlined approach to pentesting enumeration, addressing common challenges faced by security professionals:
- Efficiency: Automates repetitive tasks, saving time and effort.
- Organization: Leverages tmux to keep processes organized in separate windows.
- Flexibility: Allows users to customize commands and choose specific actions.
- Cross-Platform Compatibility: Works on Linux and Windows systems with appropriate dependencies.
TAPE includes predefined commands for the following:
- Reconnaissance: Nmap, Rustscan, Autorecon, etc.
- FTP: Anonymous login checks, brute force, directory listing.
- HTTP/HTTPS: Directory fuzzing, file fuzzing, parameter fuzzing.
- SMB: Share enumeration, user enumeration.
- DNS: Zone transfers, DNS enumeration.
- MySQL: Database brute force, SQL queries.
We welcome contributions from the community! If you have ideas for improvements or additional features, feel free to fork the repository and submit a pull request.
TAPE is released under the MIT License. See the LICENSE file for details.
For questions or support, please open an issue on the GitHub repository or contact the Chronos Security team.
Happy Hacking!