Required Arguments
Target Specification
Target IP address or domain name to perform penetration testing againstFormat: IPv4 address or fully qualified domain name (FQDN)Examples:
Optional Arguments
Tester Name
Name of the penetration tester to include in generated reportsThis value appears in:
- PDF report headers
- Database scan records
- Executive summaries
Report Branding Example
Report Branding Example
With custom tester name:PDF Report Output:
Safe Mode Control
Disable safe mode protections (NOT RECOMMENDED)Default Behavior: Safe mode is ENABLED by defaultSafe Mode Protections:
- Confirmation prompt before scanning
- Rate limiting on aggressive scans
- Prevents accidental destructive operations
- Legal warning displays
Web Scanning Control
Skip web vulnerability scanning modules (Nikto and SQLMap)Skipped Modules:Time Savings: 5-10 minutes per scan
- Nikto web server scanner
- SQLMap SQL injection testing
- Web application fingerprinting
- CMS vulnerability detection
- Target has no web services
- Time-constrained assessments
- Network infrastructure focus
- Web testing handled separately
Exploitation Control
Skip exploitation assessment and Metasploit RC script generationSkipped Functionality:Time Savings: 2-5 minutes per scan
- CVE exploitability analysis
- Metasploit module matching
- RC script generation for manual exploitation
- Risk-based exploit prioritization
- Read-only security assessments
- Compliance scans
- Initial reconnaissance
- Vulnerability enumeration only
Important: Even with
--skip-exploit, AutoPentestX still:- Performs CVE lookups
- Calculates risk scores
- Identifies vulnerabilities
- Generates comprehensive reports
Version Information
Display AutoPentestX version number and exitUsage:Output:
Help Display
Show help message with all available options and exitUsage:
Option Combinations
Speed-Optimized Scanning
Customized Testing Scenarios
- Network Device
- Web Server
- Database Server
- Compliance Scan
- Network devices rarely run web applications
- Exploitation may disrupt network operations
- Focus on configuration and service hardening
Advanced Usage Patterns
Automated Scanning
CI/CD Integration
Wrapper Script with Options
Theautopentestx.sh wrapper script accepts the same options:
- Automatic virtual environment handling
- Enhanced logging to
logs/directory - Legal warning display
- Exit code handling
- Timestamped log files
Option Summary Table
| Flag | Short | Type | Default | Required | Description |
|---|---|---|---|---|---|
--target | -t | string | - | ✅ Yes | Target IP or domain |
--tester-name | -n | string | AutoPentestX Team | ❌ No | Tester name for reports |
--no-safe-mode | - | boolean | false | ❌ No | Disable safety checks |
--skip-web | - | boolean | false | ❌ No | Skip Nikto/SQLMap |
--skip-exploit | - | boolean | false | ❌ No | Skip exploitation |
--version | - | boolean | - | ❌ No | Show version |
--help | -h | boolean | - | ❌ No | Show help message |
Environment Variables
AutoPentestX does not currently support environment variable configuration. All options must be specified via command-line flags.Error Handling
Missing Required Argument
Invalid Option
Conflicting Options
There are no conflicting options in AutoPentestX. All flags can be combined freely.Best Practices
- Always use
-nflag for audit trail documentation - Start with
--skip-exploitin production environments - Use
--skip-webfor non-HTTP services - Keep safe mode enabled unless automating
- Review
--helpoutput before complex scans - Document authorization for each target
Related Topics
Examples
Real-world command examples
Target Specification
How to specify scan targets
Safe Mode
Understand safety mechanisms
Automation
CI/CD and scripting integration