4Nonimizer – A Tol For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers

It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid. By default, it includes several pre-configured VPN connections to different peers (.ovpn files) and download the credentials (if the corresponding provider support it). Also, it records each used IP that we use every 300 seconds in log files.This script is enabled as a service in systemd systems and uses a default vpn (VPNBook) at system startup.Since version 1.06 the dns resolution requests are done throught DnsCrypt (enable and disable with option enable_dns or disable_dns)Since version 1.12 the logs of connections vpn saved in sqlite in /logs/Attention VPN Providers!If you are a provider, you support OpenVPN and want your VPN to be integrated into 4nonimizer contact the developers at hackplayers @ ymail.com.InstallationDownload the repo using git, execute the command ./4nonimizer install in the directory, and follow the screen instructions, 4nonimizer will move to the directory /opt/ and installed as a service.This script has full compatibility with Kali Linux, although it has been properly tested and should also work on other distributions like Debian, Ubuntu and Arch (Manjaro). However there could be some bugs, or unexpected performances (please comments if you find any!).OptionsOnce installed 4nonymizer, enter the command 4nonimizer help to get the help, which shows all the available parameters: ___ _ _ / | (_) (_) / /| |_ __ ___ _ __ _ _ __ ___ _ _______ _ __ / /_| | ‘_ \ / _ \| ‘_ \| | ‘_ ` _ | |_ / _ \ ‘__| \___ | | | | (_) | | | | | | | | | | |/ / __/ | |_/_| |_|\___/|_| |_|_|_| |_| |_|_/___\___|_| By Carlos Antonini & Vicente Motos Version: 1.06-betaUsage: 4nonymizer      install: Install the script in run services     uninstall: Disable run service and remove app directory     change_provider: Change VPN Provider     change_ip: Change IP from VPN current     vpn_status: Check IP and provider VPN running     update_vpns: Update all ovpn of VPNs     start: Init the 4nonimizer service     stop: Stop the 4nonimizer service     stop_nonet: Stop the 4nonimizer service and shutdown network interfaces     restart: Restart the 4nonimizer service     update_app: Update this program via git     privoxy: Install and configure privoxy with port 8118 (BETA)     proxychains4: Install and configure proxychains4 for default in the system     browser: Fire up a firefox browser with profile privoxy -> tor     test_availability: Check peers availability and delete ovpn file if the IP/service is unreachable     location: Now you can select a specific country or continent of the vpn peer     enableboot: You can enable service in boot     disableboot: You can disable service in boot     enable_dnscrypt: Enable dnscrypt service     disable_dnscrypt: Disable dnscrypt service     help: Help (this screen)Available VPNsCurrently it supports the following VPN providers:- 7Proxies https://www.7proxies.com/- AirVPN https://airvpn.org/- Cryptostorm https://cryptostorm.is/- Cyberghost https://www.cyberghostvpn.com/en_US/- ExpressVPN https://www.expressvpn.com- FreeVPN https://freevpn.me/- HideMyAss https://www.hidemyass.com/- IpPVanish https://www.ipvanish.com/- NordVPN https://nordvpn.com- PIA https://www.privateinternetaccess.com/- ProntonVPN https://protonvpn.com/- Proxy.sh https://proxy.sh/- SlickVPN https://www.slickvpn.com- StrongVPN https://strongvpn.com/- TorGuard https://torguard.net/- TunnelBear https://www.tunnelbear.com/- VPNBook (por defecto) http://www.vpnbook.com/- VPNGate http://www.vpngate.net/en/- VPNKeys https://www.vpnkeys.com/- VPNMe https://www.vpnme.me/- Vyprvpn https://www.goldenfrog.com/es/vyprvpnInstall a new VPNTo install an additional vpn we have to use the following structure in order to the 4nonimizer be able to integrate and perform operations with it.First, we have to create the following dir structure /vpn/ within 4nonimizer path:In our example we create the folder /vpntest/ and within it placed all .ovpn files we have. If the files ovpn not have the certificate within each of them we put in the same folder as shown in the example certificate.crt.In addition, we must place a file named pass.txt containing 2 lines: the first one with the username and the second one with the password, as shown below:If we have correctly performed all steps when we execute the command 4nonimizer change_provider the menu will show our vpn:As you can see in the picture, option [7] it is the vpn we’ve created.Getting credencials and ovpn files automaticallyIf the VPN provider allows automation of credential and/or .ovpn files getting, 4nonimizer has standardized the following scripts names and locations:- /opt/4nonimizer/vpn/provider/vpn-get-pass.sh- /opt/4nonimizer/vpn/provider/vpn-get-ovpn.sh4nonimizer automatically detect the presence of both scripts and indicate (Auto-pass Login) or (Auto-get OVPN) if it finds in the first line of each file the expression ‘#4uto’ or ‘#m4nual’ depending on the performed actions.Extras- Execute ‘source 4nonimizer’ to activate autocompletation of parameters.- Copy .conkyrc in your home directory to load a 4nonimizer template and execute conky.Videos- Instalar 4nonimizer Kali Linux https://www.youtube.com/watch?v=FQRuRmMkcDg- 4nonimizer Navegando de manera segura VPN (Kali Linux 2016.2) https://www.youtube.com/watch?v=6GApaN7fSn8- devenir anonyme sur kali linux (4nonimizer) https://www.youtube.com/watch?v=Y3puD1Bw3xA- Anonymizer – How To Hide Your IP address on Kali Linux 2016.2 (Change IP) https://www.youtube.com/watch?v=MNdQD0DCG0A- Become Anonymous on kali linux 2016.2 https://www.youtube.com/watch?v=IFnhm-rrnEg- Auto Hide IP with 4nonimizer on KALI Linux 2017 https://www.youtube.com/watch?v=HgqZCm8Wdvw- Kali Linux – 4nonimizer | Surf Anonymously https://www.youtube.com/watch?v=_mOUQBv4sWsVersions Number codename date 1.00-beta .bye-world! 5/10/2016 1.02-beta .evol-time 11/10/2016 1.03-beta .using-latin-i 17/10/2016 1.04-beta .locateit 22/12/2016 1.05-beta .encrypting 03/01/2017 1.06-beta .1st-trial 18/01/2017 1.07-beta .noname 03/05/2017 1.08-beta .falcon 15/08/2017 1.09-beta .rabbit 09/11/2017 1.10 .fresh_air 27/02/2018 1.11 .shhh 17/05/2018 1.12 .sqliting 18/05/2018 ¡4nonimize the world!Download 4Nonimizer

Link: http://feedproxy.google.com/~r/PentestTools/~3/Pl4_YR4KP9Q/4nonimizer-tol-for-anonymizing-public.html

Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail

This is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated our keylogger in our kali linux we would have to pass the .py file to a windows machine to convert it to an .exe. The tool is under development.Install module in linux and windows:pip install keyboardCompile to .exeDownload Spykeyboard

Link: http://feedproxy.google.com/~r/PentestTools/~3/Tx81M3bygOo/spykeyboard-keylogger-which-sends-us.html

UPDATE: Kali Linux 2018.3 Release!

PenTestIT RSS Feed
Kali Linux 2018.3 is the latest Kali Linux release. This is the third release which comes after the last release, that was made available in the month of April. This new release includes all patches, fixes, updates, and improvements since the last release – Kali Linux 2018.2, including a shiny new Linux kernel version 4.17.0 and upgrades toRead more about UPDATE: Kali Linux 2018.3 Release!
The post UPDATE: Kali Linux 2018.3 Release! appeared first on PenTestIT.

Link: http://pentestit.com/update-kali-linux-2018-3-release/

Kali Linux 2018.3 Release – Penetration Testing and Ethical Hacking Linux Distribution

Kali 2018.3 brings the kernel up to version 4.17.0 and while 4.17.0 did not introduce many changes, 4.16.0 had a huge number of additions and improvements including more Spectre and Meltdown fixes, improved power management, and better GPU support.New Tools and Tool UpgradesSince our last release, we have added a number of new tools to the repositories, including:idb – An iOS research / penetration testing toolgdb-peda – Python Exploit Development Assistance for GDBdatasploit – OSINT Framework to perform various recon techniqueskerberoast – Kerberos assessment toolsIn addition to these new packages, we have also upgraded a number of tools in our repos including aircrack-ng, burpsuite, openvas,wifite, and wpscan.For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog.Download Kali Linux 2018.3If you would like to check out this latest and greatest Kali release, you can find download links for ISOs and Torrents on the Kali Downloads page along with links to the Offensive Security virtual machine and ARM images, which have also been updated to 2018.3. If you already have a Kali installation you’re happy with, you can easily upgrade in place as follows.root@kali:~# apt update && apt -y full-upgradeIf you come across any bugs in Kali, please open a report on our bug tracker. It’s more than a little challenging to fix what we don’t know about.Making sure you are up-to-dateTo double check your version, first make sure your network repositories is enabled.root@kali:~# cat

Link: http://feedproxy.google.com/~r/PentestTools/~3/dF6YCwcpz4s/kali-linux-20183-release-penetration.html

DorkMe – Tool Designed With The Purpose Of Making Easier The Searching Of Vulnerabilities With Google Dorks

DorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.DorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.Dependencies pip install -r requirements.txtIt is highly recommended to add more dorks for an effective search, keep reading to see howUsagepython DorkMe.py –helpExamples:python DorkMe.py –url target.com –dorks vulns -v (recommended for test)python DorkMe.py –url target.com –dorks Deprecated,Info -v (multiple dorks)python DorkMe.py –url target.com –dorks all -v (test all)AboutDorkMe is a tool designed with the purpose of making easier the searching of vulnerabilities with Google Dorks, such as SQL Injection vulnerabilities.Any idea, failure etc please report to telegram: blueudpdork folder contains -> dorks to search, result folder contains -> results of DorkMe executionTested in ParrotOS and Kali Linux 2.0Beta VersionRemember DorkMe is beta, to avoid bans DorkMe wait about 1 minute on each request and 3 minutes every 100 requestsAdd DorksIf you want to add new dorks put it in one of the files in the dorks folder (preferable in its category), if it is not, you can add it to mydorks.txt. to add it: in the first line add the dork, in the second the severity: high , medium or low, and finally its description, look at the other files to do it correctlyEXAMPLE:inurl:php?id= [enter]high [enter]SQLi [enter](space)another dorkContact:Telegram: blueudpTwitter: https://twitter.com/blueudpDownload DorkMe

Link: http://feedproxy.google.com/~r/PentestTools/~3/sfavhb6w1YA/dorkme-tool-designed-with-purpose-of.html

Fluxion – WPA/WPA2 Security Hacked Without Brute Force

Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It’s compatible with the latest release of Kali (rolling). Fluxion’s attacks’ setup is mostly manual, but experimental auto-mode handles some of the attacks’ setup parameters. Read the FAQ before requesting issues.If you need quick help, fluxion is also avaible on gitter. You can talk with us on Gitter or on Discord.InstallationRead here before you do the following steps.Download the latest revisiongit clone –recursive git@github.com:FluxionNetwork/fluxion.git Switch to tool’s directorycd fluxion Run fluxion (missing dependencies will be auto-installed)./fluxion.shFluxion is also available in archcd bin/archmakepkgor using the blackarch repopacman -S fluxionChangelogFluxion gets weekly updates with new features, improvements, and bugfixes. Be sure to check out the changelog here.How it worksScan for a target wireless network. Launch the Handshake Snooper attack. Capture a handshake (necessary for password verification). Launch Captive Portal attack. Spawns a rogue (fake) AP, imitating the original access point. Spawns a DNS server, redirecting all requests to the attacker’s host running the captive portal. Spawns a web server, serving the captive portal which prompts users for their WPA/WPA2 key. Spawns a jammer, deauthenticating all clients from original AP and lureing them to the rogue AP. All authentication attempts at the captive portal are checked against the handshake file captured earlier. The attack will automatically terminate once a correct key has been submitted. The key will be logged and clients will be allowed to reconnect to the target access point. For a guide to the Captive Portal attack, read the Captive Portal attack guide RequirementsA Linux-based operating system. We recommend Kali Linux 2 or Kali rolling. Kali 2 & rolling support the latest aircrack-ng versions. An external wifi card is recommended.Related workFor development I use vim and tmux. Here are my dotfilesCreditsl3op – contributordlinkproto – contributorvk496 – developer of linsetDerv82 – @Wifite/2Princeofguilty – @webpages and @buteforcePhotos for wiki @http://www.kalitutorials.netOns Ali @wallpaperPappleTec @sitesMPX4132 – Fluxion V3DisclaimerAuthors do not own the logos under the /attacks/Captive Portal/sites/ directory. Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. The usage of Fluxion for attacking infrastructures without prior mutual consent could be considered an illegal activity, and is highly discouraged by its authors/developers. It is the end user’s responsibility to obey all applicable local, state and federal laws. Authors assume no liability and are not responsible for any misuse or damage caused by this program. NoteBeware of sites pretending to be related with the Fluxion Project. These may be delivering malware. Fluxion DOES NOT WORK on Linux Subsystem For Windows 10, because the subsystem doesn’t allow access to network interfaces. Any Issue regarding the same would be Closed Immediately LinksFluxion website: https://fluxionnetwork.github.io/fluxion/ Discord: https://discordapp.com/invite/G43gptk Gitter: https://gitter.im/FluxionNetwork/Lobby Download Fluxion

Link: http://feedproxy.google.com/~r/PentestTools/~3/3tS5FCN0p6Q/fluxion-wpawpa2-security-hacked-without.html

StegCracker – Steganography Brute-Force Utility To Uncover Hidden Data Inside Files

Steganography brute-force utility to uncover hidden data inside files.UsageUsing stegcracker is simple, pass a file to it as it’s first parameter and optionally pass the path to a wordlist of passwords to try as it’s second parameter. If this is not set it will default to the rockyou.txt password file which ships with Kali Linux or can be downloaded here.$ stegcracker [<wordlist>]InstallationTo install the program, follow these steps:$ sudo apt-get install steghide -y$ sudo curl https://raw.githubusercontent.com/Paradoxis/StegCracker/master/stegcracker > /bin/stegcracker$ sudo chmod +x /bin/stegcrackerDownload StegCracker

Link: http://feedproxy.google.com/~r/PentestTools/~3/53UjPDtT0NY/stegcracker-steganography-brute-force.html

OWTF v2.4 – Offensive Web Testing Framework

OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST so that pentesters will have more time toSee the big picture and think out of the boxMore efficiently find, verify and combine vulnerabilitiesHave time to investigate complex vulnerabilities like business logic/architectural flaws or virtual hosting sessionsPerform more tactical/targeted fuzzing on seemingly risky areasDemonstrate true impact despite the short timeframes we are typically given to test.The tool is highly configurable and anybody can trivially create simple plugins or add new tests in the configuration files without having any development experience.Note: This tool is however not a silverbullet and will only be as good as the person using it: Understanding and experience will be required to correctly interpret tool output and decide what to investigate further in order to demonstrate impact.RequirementsOWTF is developed on KaliLinux and macOS but it is made for Kali Linux (or other Debian derivatives)OWTF supports both Python2 and Python3.InstallationRecommended:Using a virtualenv is highly recommended!pip install git+https://github.com/owtf/owtf#egg=owtfor clone the repo andpython setup.py installIf you want to change the database password in the Docker Compose setup, edit the environment variables in the docker-compose.yml file. If you prefer to override the environment variables in a .env file, use the file name owtf.env so that Docker Compose knows to include it.To run OWTF on Windows or MacOS, OWTF uses Docker Compose. You need to have Docker Compose installed (check by docker-compose -v). After installing Docker Compose, simply run docker-compose up and open localhost:8009 for the OWTF web interface.Install on OSXDependencies: Install Homebrew (https://brew.sh/) and follow the steps given below:$ virtualenv $ source <venv name>/bin/activate $ brew install coreutils gnu-sed openssl # We need to install ‘cryptography’ first to avoid issues $ pip install cryptography –global-option=build_ext –global-option=”-L/usr/local/opt/openssl/lib" –global-option="-I/usr/local/opt/openssl/include" $ git clone <this repo> $ cd owtf $ python setup.py install # Run OWTF! $ owtf FeaturesResilience: If one tool crashes OWTF, will move on to the next tool/test, saving the partial output of the tool until it crashed.Flexible: Pause and resume your work.Tests Separation: OWTF separates its traffic to the target into mainly 3 types of plugins:Passive : No traffic goes to the targetSemi Passive : Normal traffic to targetActive: Direct vulnerability probingExtensive REST API.Has almost complete OWASP Testing Guide(v3, v4), Top 10, NIST, CWE coverage.Web interface: Easily manage large penetration engagements easily.Interactive report:Automated plugin rankings from the tool output, fully configurable by the user.Configurable risk rankingsIn-line notes editor for each plugin.LinksProject homepageIRCWikiSlack and join channel #project-owtfUser DocumentationYoutube channelSlideshareBlogScreenshotsDownload OWTF

Link: http://feedproxy.google.com/~r/PentestTools/~3/QhjPP8mfh-A/owtf-v24-offensive-web-testing-framework.html

Kali Linux commands – A to Z Commands

Kali Linux is a known operating system for digital forensics and penetration testing people. It is Debian-derived Linux distribution maintained and funded by Offensive Security Ltd. This OS comes with over 600 penetration-testing programs including Wireshark, Aircrack-ng, John the Ripper, nmap and more. So, it is good for beginners as well. If you are starting, […]
The post Kali Linux commands – A to Z Commands appeared first on UseThisTip.

Link: http://feedproxy.google.com/~r/blogspot/csAFg/~3/Nqyv9RKbS4k/kali-linux-commands-a-to-z-commands.html

Sn1per v5.0 – Automated Pentest Recon Scanner

Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security’s premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to manage large environments and pentest scopes.SN1PER PROFESSIONAL FEATURES:Professional reporting interfaceSlideshow for all gathered screenshotsSearchable and sortable DNS, IP and open port databaseCategorized host reportsQuick links to online recon tools and Google hacking queriesPersonalized notes field for each hostDEMO VIDEO:SN1PER COMMUNITY FEATURES: Automatically collects basic recon (ie. whois, ping, DNS, etc.) Automatically launches Google hacking queries against a target domain Automatically enumerates open ports via NMap port scanning Automatically brute forces sub-domains, gathers DNS info and checks for zone transfers Automatically checks for sub-domain hijacking Automatically runs targeted NMap scripts against open ports Automatically runs targeted Metasploit scan and exploit modules Automatically scans all web applications for common vulnerabilities Automatically brute forces ALL open services Automatically test for anonymous FTP access Automatically runs WPScan, Arachni and Nikto for all web services Automatically enumerates NFS shares Automatically test for anonymous LDAP access Automatically enumerate SSL/TLS ciphers, protocols and vulnerabilities Automatically enumerate SNMP community strings, services and users Automatically list SMB users and shares, check for NULL sessions and exploit MS08-067 Automatically exploit vulnerable JBoss, Java RMI and Tomcat servers Automatically tests for open X11 servers Auto-pwn added for Metasploitable, ShellShock, MS08-067, Default Tomcat Creds Performs high level enumeration of multiple hosts and subnets Automatically integrates with Metasploit Pro, MSFConsole and Zenmap for reporting Automatically gathers screenshots of all web sites Create individual workspaces to store all scan outputAUTO-PWN:Drupal Drupalgedon2 RCE CVE-2018-7600GPON Router RCE CVE-2018-10561Apache Struts 2 RCE CVE-2017-5638Apache Struts 2 RCE CVE-2017-9805Apache Jakarta RCE CVE-2017-5638Shellshock GNU Bash RCE CVE-2014-6271HeartBleed OpenSSL Detection CVE-2014-0160Default Apache Tomcat Creds CVE-2009-3843MS Windows SMB RCE MS08-067Webmin File Disclosure CVE-2006-3392Anonymous FTP AccessPHPMyAdmin Backdoor RCEPHPMyAdmin Auth BypassJBoss Java De-Serialization RCE’sKALI LINUX INSTALL:./install.shDOCKER INSTALL:Credits: @menzowDocker Install: https://github.com/menzow/sn1per-dockerDocker Build: https://hub.docker.com/r/menzo/sn1per-docker/builds/bqez3h7hwfun4odgd2axvn4/Example usage:$ docker pull menzo/sn1per-docker$ docker run –rm -ti menzo/sn1per-docker sniper menzo.ioUSAGE:[*] NORMAL MODEsniper -t|–target [*] NORMAL MODE + OSINT + RECONsniper -t|–target <TARGET> -o|–osint -re|–recon[*] STEALTH MODE + OSINT + RECONsniper -t|–target <TARGET> -m|–mode stealth -o|–osint -re|–recon[*] DISCOVER MODEsniper -t|–target <CIDR> -m|–mode discover -w|–workspace <WORSPACE_ALIAS>[*] SCAN ONLY SPECIFIC PORTsniper -t|–target <TARGET> -m port -p|–port <portnum>[*] FULLPORTONLY SCAN MODEsniper -t|–target <TARGET> -fp|–fullportonly[*] PORT SCAN MODEsniper -t|–target <TARGET> -m|–mode port -p|–port <PORT_NUM>[*] WEB MODE – PORT 80 + 443 ONLY!sniper -t|–target <TARGET> -m|–mode web[*] HTTP WEB PORT MODEsniper -t|–target <TARGET> -m|–mode webporthttp -p|–port <port>[*] HTTPS WEB PORT MODEsniper -t|–target <TARGET> -m|–mode webporthttps -p|–port <port>[*] ENABLE BRUTEFORCEsniper -t|–target <TARGET> -b|–bruteforce[*] AIRSTRIKE MODEsniper -f|–file /full/path/to/targets.txt -m|–mode airstrike[*] NUKE MODE WITH TARGET LIST, BRUTEFORCE ENABLED, FULLPORTSCAN ENABLED, OSINT ENABLED, RECON ENABLED, WORKSPACE & LOOT ENABLEDsniper -f–file /full/path/to/targets.txt -m|–mode nuke -w|–workspace <WORKSPACE_ALIAS>[*] ENABLE LOOT IMPORTING INTO METASPLOITsniper -t|–target <TARGET>[*] LOOT REIMPORT FUNCTIONsniper -w <WORKSPACE_ALIAS> –reimport[*] UPDATE SNIPERsniper -u|–updateMODES:NORMAL: Performs basic scan of targets and open ports using both active and passive checks for optimal performance.STEALTH: Quickly enumerate single targets using mostly non-intrusive scans to avoid WAF/IPS blocking.AIRSTRIKE: Quickly enumerates open ports/services on multiple hosts and performs basic fingerprinting. To use, specify the full location of the file which contains all hosts, IPs that need to be scanned and run ./sn1per /full/path/to/targets.txt airstrike to begin scanning.NUKE: Launch full audit of multiple hosts specified in text file of choice. Usage example: ./sniper /pentest/loot/targets.txt nuke.DISCOVER: Parses all hosts on a subnet/CIDR (ie. 192.168.0.0/16) and initiates a sniper scan against each host. Useful for internal network scans.PORT: Scans a specific port for vulnerabilities. Reporting is not currently available in this mode.FULLPORTONLY: Performs a full detailed port scan and saves results to XML.WEB: Adds full automatic web application scans to the results (port 80/tcp & 443/tcp only). Ideal for web applications but may increase scan time significantly.WEBPORTHTTP: Launches a full HTTP web application scan against a specific host and port.WEBPORTHTTPS: Launches a full HTTPS web application scan against a specific host and port.UPDATE: Checks for updates and upgrades all components used by sniper.REIMPORT: Reimport all workspace files into Metasploit and reproduce all reports.RELOAD: Reload the master workspace report.SAMPLE REPORT:https://gist.github.com/1N3/8214ec2da2c91691bcbcDownload Sn1per v5.0

Link: http://feedproxy.google.com/~r/PentestTools/~3/Z_yHqaJ_y1U/sn1per-v50-automated-pentest-recon.html