@@ -25,10 +25,10 @@ def optparser():
2525 """
2626
2727 parser = argparse .ArgumentParser (
28- usage = "python autosploit.py -[c| z|s|a] -[q] QUERY\n "
29- "{spacer}[-C] WORKSPACE LHOST LPORT [-e] [--whitewash] PATH\n "
30- "{spacer}[--ruby-exec] [--msf-path] PATH [-E] EXPLOIT-FILE-PATH\n "
31- "{spacer}[--rand-agent] [--proxy] PROTO://IP:PORT [-P] AGENT" .format (
28+ usage = "python autosploit.py -c[ z|s|a] -q QUERY [-O|A] \n "
29+ "{spacer}[-C WORKSPACE LHOST LPORT] [-e] [--whitewash PATH] [-H] \n "
30+ "{spacer}[--ruby-exec] [--msf-path] PATH [-E EXPLOIT-FILE-PATH] \n "
31+ "{spacer}[--rand-agent] [--proxy PROTO://IP:PORT] [-P AGENT] [-D QUERY,QUERY,..] " .format (
3232 spacer = " " * 28
3333 )
3434 )
@@ -42,8 +42,10 @@ def optparser():
4242 se .add_argument ("-a" , "--all" , action = "store_true" , dest = "searchAll" ,
4343 help = "search all available search engines to gather hosts" )
4444 save_results_args = se .add_mutually_exclusive_group (required = False )
45- save_results_args .add_argument ("-O" , "--overwrite" , action = "store_true" , dest = "overwriteHosts" ,
46- help = "When specified, start from scratch by overwriting the host file with new search results." )
45+ save_results_args .add_argument (
46+ "-O" , "--overwrite" , action = "store_true" , dest = "overwriteHosts" ,
47+ help = "When specified, start from scratch by overwriting the host file with new search results."
48+ )
4749 save_results_args .add_argument ("-A" , "--append" , action = "store_true" , dest = "appendHosts" ,
4850 help = "When specified, append discovered hosts to the host file." )
4951
@@ -65,7 +67,7 @@ def optparser():
6567 exploit .add_argument ("-e" , "--exploit" , action = "store_true" , dest = "startExploit" ,
6668 help = "start exploiting the already gathered hosts" )
6769 exploit .add_argument ("-d" , "--dry-run" , action = "store_true" , dest = "dryRun" ,
68- help = "Do not launch metasploit's exploits. Do everything else. msfconsole is never called. " )
70+ help = "msfconsole will never be called when this flag is passed " )
6971 exploit .add_argument ("-f" , "--exploit-file-to-use" , metavar = "PATH" , dest = "exploitFile" ,
7072 help = "Run AutoSploit with provided exploit JSON file." )
7173 exploit .add_argument ("-H" , "--is-honeypot" , type = float , default = 1000 , dest = "checkIfHoneypot" , metavar = "HONEY-SCORE" ,
0 commit comments