# Pentest tools

### Exegol

**Exegol** is installed by default on Monarch. As a powerful and comprehensive pentesting framework, it provides cybersecurity professionals with a **fully featured, isolated, and rapidly deployable** penetration-testing environment.

<figure><img src="/files/LKJUdBhxb4c8S7TZsPxX" alt=""><figcaption></figcaption></figure>

Monarch includes several custom integrations to streamline its usage:

* You can **create or start an Exegol environment** using the shortcut **`CTRL + ALT + E`**, allowing fast deployment during assessments.
* A default configuration is provided in **`$HOME/.exegol/`**, which includes:
  * **Environment logging enabled by default** — useful for audits and mission reports.
  * A **Kitty terminal configuration** aligned with the system’s own visual style.
  * Additional integrated tools such as **leakscheck**, **inteleaks**, and **leviathan**.

These enhancements make Exegol even more convenient and mission-ready on Monarch.

### Caido & BurpSuite Integration

**Caido** is installed and ready to use from the very first system boot, providing an immediate solution for web application analysis.

For **BurpSuite**, Monarch allows you to choose which edition to deploy.\
You can install either the **Professional** or **Community** version directly through the **Monarch Menu** *(Install > Cyber > Burpsuite)* .\
This ensures that each user can select the version that best fits their workflow and licensing requirements.

<figure><img src="/files/brZywp66sNYyS1j8Stei" alt=""><figcaption></figcaption></figure>

### Wordlists

To keep the Monarch ISO lightweight, **wordlists are not included by default**.\
They can be installed at any time through the **Monarch Menu** *(Install > Cyber > Wordlists)*

Once installed, all wordlists are available in **`/usr/share/seclists`.**

This approach ensures fast installation while still providing access to the full SecLists collection when needed.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.monarchlinux.com/basics/pentest-tools.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
