How to Fix “ModuleNotFoundError: No module named ‘pdfkit’” in Mr. Holmes (Kali Linux)

Image
How to Fix “ModuleNotFoundError: No module named ‘pdfkit’” in Mr. Holmes (Kali Linux) Introduction Mr. Holmes is a popular OSINT (Open-Source Intelligence) tool used in ethical hacking and cybersecurity learning. However, many beginners face an error while running the tool on Kali Linux: ModuleNotFoundError: No module named 'pdfkit' This error can be confusing, especially for new users. In this article, you will learn why this error occurs and how to fix it step by step in a clean and safe way . Error Description When trying to run Mr. Holmes using the command: sudo python3 MrHolmes.py You may see the following traceback ending with: ModuleNotFoundError: No module named 'pdfkit' Some users also try to activate a virtual environment and get: source .lib_venv/bin/activate source: no such file or directory Why This Error Happens This issue usually occurs due to one or more of the following reasons: 1. Virtual Environment Was Not Created You attempted to activate a virtual...

Unicornscan – Penetration Testing Tool in Kali Linux

 

Unicornscan – Penetration Testing Tool in Kali Linux




Unicornscan is a free and open-source Automated Penetration Testing tool available on GitHub which is very useful for security researchers for information gathering and testing of the security of websites and web servers.Unicornscan provides many integrated tools to perform penetration testing on the target system. This tool is also known as an active web application security reconnaissance tool. This tool was designed as it should be accurate, scalable, flexible for the users who are using it. This tool is released under GPL General Public License. This tool offers and performs scanning of TCP and UDP network protocols. This tool is very useful for finding network discovery patterns. This tool is used to find remote hosts. Unicornscan can also give you information about the target operating system.

Features and Uses of Unicornscan tool :

  • Unicornscan can detect asynchronous TCP banner.
  • Unicornscan can tell you information about OS, application and system service detection on the host.
  • Unicornscan tool has ability to use custom data sets to perform reconnaissance.
  • Unicornscan tool supports  SQL relational output from networks.
  • Unicornscan can perform TCP asynchronous scan on hosts
  • Unicornscan can perform asynchronous UDP scan on hosts.

Installation 

Step 1: Use the following command to install the tool on your kali linux machine.

sudo apt install unicorn

Step 2: The tool has been downloaded into your kali linux machine. Now to open the flags and help menu of the tool use the following command.

unicorn -h

 Now you can see that the tool is finally installed into your machine as the tool is opening its help menu. Now lets see some examples of how to use the tool.

Usage:

Example 1: 

Use the unicorn tool to scan a ip address to get details of open and closed ports of a website called adaptercart.

sudo unicornscan -r30 -mT adaptercart.com

You can see that it showing all the open ports this is how you can also use unicorn scan tool for your ip address or on your target host.

Example 2:

 Use the unicorn tool to scan an ip address to get details of open and closed ports of a website called geeksforgeeks.

sudo unicornscan -r30 -mT geeksforgeeks.org

Two ports are opened on the site geeksforgeeks.org.  This is how you can also perform 

Example 3 : 

Use the unicorn tool to scan a ip address to get details of open and closed ports of a website called google.com

sudo unicornscan -r30 -mT google.com

You can refer to above example to perform scanning on your target.

Example 4:

 Use the Unicornscan tool to perform a UDP scan on the whole network

sudo unicornscan –mU –v –I 192.168.1.1/24

Example 5: 

Use the Unicornscan tool to perform a TCP SYN Scan on a whole network.

 unicornscan -msf -v 192.168.1.1/24

Comments

Popular posts from this blog

Hacking Tools for Penetration Testing – Fsociety in Kali Linux

Fluxion – The Future of MITM WPA Security Research

TOP 20 PYTHON MODULES