Open In App

Kaboom – Automatic Pentest Bash Script

Last Updated : 28 Mar, 2022
Like Article

Kaboom is an automated cyber-security tool developed in the Bash Script which can perform the task of Information Gathering on the target host and also can perform Vulnerability Assessment. Kaboom tool has support to multiple target scanning simultaneously, we can pass the range to target IP addresses as an input, Kaboom tool will scan each IP address and create a  report of results in the output directory. Kaboom tool is available on the Github platform for free and is open-source to use. So in this article, we will be going through the installation and usage of the Kaboom tool on the Linux Operating System.

Installation of Kaboom Tool on Kali Linux OS

Step 1: In this step, we will get the Longtongue tool repository from GitHub.

git clone


Step 2: Use the below cd command to navigate to the Longtongue tool directory.

cd kaboom/kaboom


Step 3: Change the permissions of the file by using the following command.

sudo chmod 777


Step 4: Run the below command to verify the installation.

sudo ./


Working with Kaboom Tool on Kali Linux OS

Example 1: Scanning Multiple Target

sudo ./

In this example, we have given a range of target IP addresses that the Kaboom tool will scan. We have passed the IP address range, Output location, Phases to perform, and some more details. 


In the below screenshot, you can see that a separate folder is been created for each singular IP address and all the information collected is been saved into the folder.


Example 2: Scanning Specific Single Target

sudo ./

In this example, we have only given the single target IP address which is a metasploitable machine running on a VMware workstation.


The tool has generated the Nmap report for the TCP scan.


We have displayed the contents of the XML file which holds all the scanning details and the response information.


After completion of Information Gathering, the Kaboom tool is finding some Vulnerability Assessment checks on the target IP address.


We have displayed the HTML formatted output which shows the result of Nikto Vulnerability scanner.


Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads