How to Download gxc-BloodPengu.py on Kali Linux 2025.4 with pipx
Tools Overviews
Ever since creating BloodPengu, my only attack-paths collector are PyPengu, which very different from SharpHound, BloodPengu collectors map attack-paths based of relation-ships on file/access ownerships and kernel mechanism.
But then PyPengu gain several concern.
I believe as Pentester my-self bunch of you guys hate Tools that requires custom binary each deploy, etc, making PyPengu is not very flexible as swiss-army knife, FKA "I'm to lazy for it".
That's why I develop gxc-BloodPengu.py, it's a based logon SSH collectors, enabling faster interaction on collecting data accross Linux system (as long the target have bash/shell).
It's logon sessions over paramiko, optionally chaining through a jump host, and systematically enumerates the target through a modular collector architecture covering SUID binaries, writable services, cron misconfigurations, sudo policy weaknesses, Docker group membership, kernel version fingerprinting against a curated CVE registry spanning 2.4.x through 6.x and loaded kernel module inspection, enabling potential escalation much easier!!
How to Install gxc-BloodPengu.py with pipx
pipx is the most easiest method for the installation, further more look at this page if you want the more details.
Open-up your CLI and make sure you have pipx ready:
pipx install bloodpengu-python
Post-installation:
┌──(byt3n33dl3㉿kali)-[~]
└─$ bloodpengu-python -h
_ __ ___ __ _____
___ _| |/_/_______/ _ )/ /__ ___ ___/ / _ \___ ___ ___ ___ __ ___ __ __
/ _ `/\ // __/___/ _ / / _ \/ _ \/ _ / ___/ -_) _ \/ _ `/ // / / _ \/ // /
\_, /_/|_|\__/ /____/_/\___/\___/\_,_/_/ \__/_//_/\_, /\_,_(_) .__/\_, /
/___/ /___/ /_/ /___/
v1.5.3 [SuSHi Rav3n]
gxc-BloodPengu.py v1.5.3 | by <@byt3n33dl3>
Data collector in Python for BloodPengu APM
Usage:
bloodpengu-python [options]
----------------------------------------------------------------------
Authentication: (required one of -p or -k)
-u USERNAME SSH username
-p PASSWORD Authenticate with password
-k KEY_FILE Authenticate with RSA/PEM private key (e.g. id_rsa, key.pem)
Target Options:
-d DOMAIN Domain or hostname (stored in output for BloodPengu context)
--port PORT SSH port (default: 22)
--old-ssh Enable legacy SSH algorithms (for old OpenSSH targets)
--jumphost HOST Pivot via jump host (format: user:pass@host:port)
--jumphost-key FILE Key file for jump host auth
Modules: (all collectors run by default, use -M to run one only)
-M MODULE Run a specific module only
Available modules:
sacspengu Compiler and Binary Analysis suggestor
avrisk Anti-Virus Discovery!!
brace Container and Cloud Assessor
kernel Kernel and LPE CVE's checklists!!
Output:
-o OUTPUT_FILE Write JSON to file (default: pypengu-output.json)
-v Verbosity as each collector result as it arrives
--no-color Disable color output
----------------------------------------------------------------------
Examples:
bloodpengu-python -u kraken -p kr@ken
bloodpengu-python -u kraken -k ~/.ssh/id_rsa
bloodpengu-python -u kraken -k ~/.ssh/id_rsa --port 2222
bloodpengu-python -u kraken -p kr@ken -d kraken.htb -v
bloodpengu-python -u kraken -p kr@ken -M sacspengu
bloodpengu-python -u kraken -p kr@ken -M avrisk
bloodpengu-python -u kraken -p kr@ken -M brace
bloodpengu-python -u kraken -p kr@ken -M kernel
bloodpengu-python -u kraken -k id_rsa -o ./results/kraken.json
----------------------------------------------------------------------
Collectors: (all run by default unless -M is specified)
Collector Role Description
------------- --------- ----------------------------------------------------
users COLLECT Local users, UID 0 accounts, /etc/passwd, /etc/group
sudo COLLECT NOPASSWD rules, dangerous sudo binaries, misconfigs
suid COLLECT SUID and SGID binaries with GTFOBins cross-reference
groups COLLECT Privileged groups - docker, lxd, disk, shadow, adm
services COLLECT Writable systemd units, hijackable service scripts
cron COLLECT Writable cron scripts, scheduled task privilege paths
kernel COLLECT Kernel version matched against known CVE list
containers ESCAPE Docker socket, LXD membership, cloud credentials, K8s
network RECON Listening ports, interfaces, internal network range
env DISCOVER Env vars, history files, interesting files in home/opt
sacspengu COMPILE Compilers, writable PATH/lib dirs, capabilities, build files
avrisk RECON Anti-Virus Discovery!!
brace ESCAPE Container and Cloud Assessor
kernel RECON Kernel and LPE CVE's checklists!!
----------------------------------------------------------------------
Output lands on attacker machine as pypengu-output.json
Import directly into BloodPengu!!
gxc-BloodPengu.py v1.5.3 by <@byt3n33dl3> github.com/byt3n33dl3/gxc-BloodPengu.py
At the time creating this gxc-BloodPengu.py are in version 1.5.3 The SuSHi Rav3n:
Moreover, Proton me if you have further question and suggestion.