Site hosted by Angelfire.com: Build your free website today!
logo
Inguma Project

1. Getting Started

Inguma is reliant on the following libraries for full functionality:

    -Impacket
    -Scapy
    -Paramiko
    -cx_Oracle
    -pysnmp

    -Python Cryptography Toolkit

    While certain portions of Inguma may function without these libraries, it is recommended to have them in order to maximize the potential of Inguma. It should also be noted that not all modules will execute successfully without these libraries.  To familiarize yourself with Inguma usage, you may want to take a look at some example syntax and usage.


    As Scapy provides a great deal of flexibility with Inguma, it is recommended that you familiarize yourself with its functions and options to maximize this program's full potential.  Unfortunately, Scapy's functionality is beyond the scope of this documentation.  Please consult the man page and the Scapy demo for additional information

   1.1 Modules - Types of

        Inguma is divided in 4/5 module groups:

            -»Discover - Used to discover hosts and networks

            -»Gather - Used to gather data about the target host or network

            -»Brute - Brute forcers for many services

            -»Fuzz - Fuzzers for various protocols

            -»Exploits - Exploits for various products (mainly, at the moment, Oracle software)

Below is a list of the modules which correspond to their appropriate group(s).

    1.2 Discovery   

    1.3 Gather

    1.4 Brute

    1.5 Fuzz

    1.6 Exploits


~Wiki Quick Links
Discovery Modules - Gather Modules - Fuzzing Modules - Brute Force Modules - Exploits
Inguma Documentation Home

Questions and comments regarding application development and collaboration should be directed to joxeankoret[AT]yahoo[DOT]es
Comments and input regarding documentation should be directed to Andrew.Brooks85[AT]gmail[DOT]com