PentestAgent is a tool that performs nmap scan on a given IP and looks for known exploits and CVEs.
-
Install Miniconda for Windows:
- Download Miniconda
- During installation, make sure to:
- Select "Add Miniconda3 to PATH"
- Choose "Install for all users"
-
Open a new Command Prompt or PowerShell as Administrator
- Clone the repository:
git clone https://github.com/sam8k/PentestAgent.git
cd PentestAgent
- Create and activate conda environment:
conda create -n pentestagent python=3.9 -y
conda activate pentestagent
- Install required packages:
python -m pip install -r requirements.txt
If you prefer using pip:
git clone https://github.com/sam8k/PentestAgent.git
cd PentestAgent
python -m pip install -r requirements.txt
- Create a
.env
file in the root directory - Add your DeepSeek API key:
DEEPSEEK_API_KEY=your_api_key_here
Make sure to never commit your .env
file to version control. The repository includes a .gitignore
file that excludes it.
Basic usage:
python main.py -t TARGET_IP
-t, --target
: Target IP address or hostname (required)-o, --output
: Output file for the report (default: report.txt)
Examples:
# Basic scan of a target
python main.py -t 192.168.1.1
# Scan with custom output file
python main.py -t example.com -o web_scan.txt
Note: The scan will automatically include:
- Service version detection (-sV)
- Timing template T4 for faster scans
- Default script scanning when appropriate
- Comprehensive port scanning as needed
To deactivate the environment:
conda deactivate
To remove the environment:
conda remove --name pentestagent --all -y