Authorized penetration testing toolkit — vulnerability scanning, connection stress testing, and exploit chain simulation. Built for red teams by CyberViser.
Automated nmap-based scanning across ports 1–1024 with service detection and CVE correlation. Outputs structured reports.
scan <target>Multi-threaded connection load testing for authorized resilience assessments. Configurable thread count and duration.
stress <target> <port>Simulate multi-stage exploit chains for authorized red team exercises. Documents attack paths without executing payloads.
exploit <cve-id>Auto-generates timestamped plaintext reports after each scan or test run. Ready to drop into your pentest report.
output: report_YYYYMMDD.txtPair with Hancock AI to get instant triage, CVE analysis, and PICERL playbooks for every finding TerminalPressure uncovers.
cyberviser.netlify.appCyberViser Proprietary License — permitted for authorized research and testing. Commercial use requires a license agreement.
cyberviser@proton.me# Clone the repo git clone https://github.com/cyberviser/TerminalPressure.git cd TerminalPressure # Install dependencies pip install -r requirements.txt # Run (requires nmap installed) # Linux: sudo apt install nmap # macOS: brew install nmap python terminal_pressure.py # Commands inside the tool scan <target_ip> # vuln scan stress <target_ip> <port> # load test exploit <cve-id> # exploit sim exit # quit
TerminalPressure handles the exploitation. Hancock handles the analysis — triage findings, generate CVE reports, write executive summaries, and build IR playbooks using AI.
Explore Hancock AI →