Authorized penetration testing toolkit — vulnerability scanning, connection stress testing, and exploit chain simulation. Built for red teams by CyberViser.
Automated nmap-based scanning across ports 1–1024 with service detection and CVE correlation. Outputs structured reports.
scan <target>Multi-threaded connection load testing for authorized resilience assessments. Configurable thread count and duration.
stress <target> --port 80Simulate multi-stage exploit chains for authorized red team exercises. Documents attack paths without executing payloads.
exploit <target> --payload default_backdoorAuto-generates timestamped plaintext reports after each scan or test run. Ready to drop into your pentest report.
output: report_YYYYMMDD.txtPair with Hancock AI to get instant triage, CVE analysis, and PICERL playbooks for every finding TerminalPressure uncovers.
cyberviser.netlify.appCyberViser Proprietary License — permitted for authorized research and testing. Commercial use requires a license agreement.
cyberviser@proton.me# Clone the repo git clone https://github.com/cyberviser/TerminalPressure.git cd TerminalPressure # Install dependencies pip install -r requirements.txt # Run scans (requires nmap installed) # Linux: sudo apt install nmap # macOS: brew install nmap python terminal_pressure.py scan 192.168.1.1 # Stress test python terminal_pressure.py stress 192.168.1.1 --port 80 --threads 50 --duration 60 # Exploit simulation python terminal_pressure.py exploit 192.168.1.1 --payload default_backdoor
TerminalPressure handles the exploitation. Hancock handles the analysis — triage findings, generate CVE reports, write executive summaries, and build IR playbooks using AI.
Explore Hancock AI →