
Welcome to Inguma
Inguma is an open source penetration testing and vulnerability research
toolkit written completely in Python. The environment is mainly
oriented to attack Oracle related systems but it also has many other uses. While the current exploitation
capabilities in Inguma may be limited, this program provides
numerous
tools
for information gathering and target auditing. Inguma is still being heavily developed so be sure to stay current and check back for news and updates.
Inguma
can be subdivided into 4 main components:
- Core and modules
- The text command line interface and the modules to
gather information about a target or targets, exploits, etc...
- PyQT based GUI - A simple graphical gui. It is currently more of
a proof of
concept than something usable.
- Krash fuzzer - A general purpose fuzzer with various sample
packets.
- OpenDis - A tool to simplify and clarify assembly. (Note that information on both Krash fuzzer and OpenDis can be
found in their proper directories in the Inguma package.)
As Inguma is an open source project, it can only be as good as the
community allows. Please feel free to assist not only the
developers but also the community and lend your expertise by reporting bugs and contributing to the community discussion and mailing list.
For more information regarding matters not covered in this section, please visit the homepage on SourceForge.com or check out the Inguma FAQs.
If programs like Inguma are new to you, be sure to check out the beginner's tutorial for example sytax and usage.
For examples and additional information on Inguma commands, please click here.
Questions
and comments regarding application development and collaboration should
be directed to joxeankoret[AT]yahoo[DOT]es
Comments and input regarding documentation should be directed to Andrew.Brooks85[AT]gmail[DOT]com