Spry LogoOpsfolio
Fleetfolio Pentest

Download Operational Truth™ - Fleetfolio Pentest Module

Fleetfolio Pentest Module - powered by Fleetfolio

Operational Truth™ is a downloadable software platform for continuous compliance. The Fleetfolio Pentest module (powered by Fleetfolio) must be installed on a local workstation or server environment. The software is not web-based and requires local installation to operate. To install Fleetfolio Pentest, users must first set up the required software dependencies and then download and install the primary Fleetfolio Pentest module package by following the provided installation instructions.

Overview

The Fleetfolio Pentest module is a comprehensive endpoint detection and response platform powered by Fleetfolio. It delivers real-time threat analysis, vulnerability scanning, and malware detection with integrated tools for continuous monitoring and threat intelligence. Deploy to your infrastructure for complete data privacy and control.

System Requirements

  • Operating System: Kali Linux (recommended), macOS 10.15+, Ubuntu 20.04+, Windows 10+ (via WSL)
  • Runtime Requirements: Deno 2.x+, Go 1.16+, Node.js 16+
  • Virtualization (Optional): VirtualBox 6.0+ for VM deployment

Installation commands

Workspace Setup

Choose your preferred method to get the Fleetfolio Pentest module running on your machine.

Option A: Windows WSL (Kali Linux)

To spin up Kali Linux via Windows Subsystem for Linux, run the following command in PowerShell:

wsl --install -d kali-linux

Option B: Virtual Machine (VirtualBox)

Follow these steps to set up a dedicated virtual environment.

Prerequisites

Download Kali Linux

Select Virtual Machine and then VirtualBox. The file will be in .7z format.

Install VirtualBox

Open the installer and follow the default prompts.

Extract and Import

  • Extract the .7z file.
  • Inside, find the .vdi file (orange icon) and a .vbox file (blue icon).
  • Double-click the .vbox file to automatically import the VM into VirtualBox.

Configure the VM

  • Base Memory: Set to 4096 MB (recommended).
  • Processor Cores: Set to 2–3 (recommended).
  • Start the virtual machine.

Login Credentials

  • Username: kali
  • Password: kali

Switch to Root User

Open the terminal and type:

sudo su

Update the System

sudo apt update && sudo apt upgrade -y && sudo apt full-upgrade -y

Fixing Update Errors: If updates fail, run these fix commands:

# Force HTTPS
sudo sed -i 's|http://http.kali.org|https://http.kali.org|' /etc/apt/sources.list
# Fix missing
sudo apt-get clean && sudo apt-get update --fix-missing
# Re-run
sudo apt update && sudo apt upgrade -y && sudo apt full-upgrade -y

Prerequisite API Keys & Tokens

Store your keys in a .env file for security. These credentials are required for advanced compliance and threat detection features.

WPScan

WPScan CLI tool uses the WordPress Vulnerability Database API to retrieve WordPress vulnerability data in real time.

  1. Visit WPScan Registration.
  2. Generate your API key.
  3. Add to .env:
    OPSFOLIO_EAA_WP_TOKEN=your_key_here

VirusTotal

VirusTotal Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.

  1. Visit VirusTotal Signup.
  2. Copy your API key from the dashboard.
  3. Add to .env:
    OPSFOLIO_EAA_VIRUSTOTAL_API_KEY=your_key_here

How is this guide?

Last updated on

On this page