Skip to content

Commit 8bb2a22

Browse files
thehappydinoaEkultek
authored andcommitted
Added Install script (#85)
* Added a helpful link directory * Update README.md * Update README.md * Update README.md * Added install script * Check PATH * Fixed msfconsole PATH * Fixed ubuntu error * Added installation instructions * Use pip2
1 parent 05995a3 commit 8bb2a22

5 files changed

Lines changed: 82 additions & 23 deletions

File tree

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ api.p
44
hosts.txt
55
secret.p
66
uid.p
7-
etc/tokens/*
7+
etc/tokens/*

CONTRIBUTING.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,25 +2,25 @@
22

33
All contributions to AutoSploit are not only welcomed, but highly appreciated, please keep in mind the following while making a pull request:
44

5-
- Each request should make at least one logical change
6-
- All contributions should be forked from the `dev-beta` branch
7-
- Each request will need to be reviewed before merged, if anything seems weird we will either fix it or ask you to fix it for us
8-
- If you have multiple pushes in one request, please squash them together (or we will before we merge)
9-
- All pull requests that are merged are provided under the same license as the program is, keep the following in mind;
5+
- Each request should make at least one logical change
6+
- All contributions should be forked from the `dev-beta` branch
7+
- Each request will need to be reviewed before merged, if anything seems weird we will either fix it or ask you to fix it for us
8+
- If you have multiple pushes in one request, please squash them together (or we will before we merge)
9+
- All pull requests that are merged are provided under the same license as the program is, keep the following in mind;
1010

1111
> By submitting code contributions to AutoSploit via Git pull request or other, checking them into the AutoSploit's source code repository, it is understood (unless you specify otherwise) that you are offering the AutoSploit copyright holders the unlimited, non-exclusive right to reuse, modify, and re-license the code. This is important because the inability to re-license code has caused devastating problems for other software projects (such as KDE and NASM). If you wish to specify special license conditions of your contributions, just say so when you send them.
1212
1313
## Getting started
1414

1515
To get started making a contribution please do the following:
1616

17-
- Fork the repository using the fork button
18-
- `git clone https://github.com/<YOUR-NAME>/AutoSploit.git -b dev-beta`
19-
- Edit the code to your liking
20-
- After editing `git branch <YOUR-BRANCH-NAME> && git checkout <YOUR-BRANCH-NAME>`
21-
- Add your commits and comment them
22-
- `git push --set-upstream origin <YOUR-BRANCH>`
23-
- Open a [pull request](https://github.com/NullArray/AutoSploit/pulls)
24-
- Wait for us to check it out
25-
26-
Thank you.
17+
- Fork the repository using the fork button
18+
- `git clone https://github.com/<YOUR-NAME>/AutoSploit.git -b dev-beta`
19+
- Edit the code to your liking
20+
- After editing `git branch <YOUR-BRANCH-NAME> && git checkout <YOUR-BRANCH-NAME>`
21+
- Add your commits and comment them
22+
- `git push --set-upstream origin <YOUR-BRANCH>`
23+
- Open a [pull request](https://github.com/NullArray/AutoSploit/pulls)
24+
- Wait for us to check it out
25+
26+
Thank you.

README.md

Lines changed: 15 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
# AutoSploit
22

3-
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well.
4-
The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started
3+
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started
54

65
**Operational Security Consideration**
76

@@ -68,8 +67,7 @@ Starting the program with `python autosploit.py` will open an AutoSploit termina
6867

6968
Choosing option `2` will prompt you for a platform specific search query. Enter `IIS` or `Apache` in example and choose a search engine. After doing so the collected hosts will be saved to be used in the `Exploit` component.
7069

71-
As of version 2.0 AutoSploit can be started with a number of command line arguments/flags as well. Type `python autosploit.py -h`
72-
to display all the options available to you. I've posted the options below as well for reference.
70+
As of version 2.0 AutoSploit can be started with a number of command line arguments/flags as well. Type `python autosploit.py -h` to display all the options available to you. I've posted the options below as well for reference.
7371

7472
```
7573
usage: python autosploit.py -[c|z|s|a] -[q] QUERY
@@ -119,6 +117,14 @@ misc arguments:
119117
ENV PATH
120118
```
121119

120+
## Installation
121+
122+
```bash
123+
git clone https://github.com/NullArray/AutoSploit
124+
cd AutoSploit
125+
chmod +x install.sh
126+
./install.sh
127+
```
122128

123129
## Dependencies
124130

@@ -149,12 +155,15 @@ Special thanks to [Ekultek](https://github.com/Ekultek) without whoms contributi
149155

150156
And thanks to [Khast3x](https://github.com/khast3x) for setting up Docker support.
151157

158+
### Active Development
159+
160+
While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future.
152161

153162
### Active Development
154163

155-
While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future.
164+
While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future.
156165

157-
I've been working on the new version of the tool in an open source capacity with the help of a number of developers
166+
I've been working on the new version of the tool in an open source capacity with the help of a number of developers
158167
that have expressed an interest in doing so. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta).
159168

160169
If you would like to contribute to the development of this project please be sure to read [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md) as it contains our contribution guidelines.

autosploit.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@
22

33

44
if __name__ == "__main__":
5-
main()
5+
main()

install.sh

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
#!/bin/bash
2+
3+
echo " ____ __ __ ______ ___ _____ ____ _ ___ ____ ______ ";
4+
echo " / || | || | / \ / ___/| \| | / \| || |";
5+
echo "| o || | || || ( \_ | o ) | | || | | |";
6+
echo "| || | ||_| |_|| O |\__ || _/| |___ | O || | |_| |_|";
7+
echo "| _ || : | | | | |/ \ || | | || || | | | ";
8+
echo "| | || | | | | |\ || | | || || | | | ";
9+
echo "|__|__| \__,_| |__| \___/ \___||__| |_____| \___/|____| |__| ";
10+
echo " ";
11+
12+
function installDebian() {
13+
sudo apt-get update;
14+
sudo apt-get -y install git python2.7 python-pip postgresql apache2;
15+
pip2 install requests psutil;
16+
installMSF;
17+
}
18+
19+
function installFedora() {
20+
sudo yum -y install git python-pip;
21+
pip2 install requests psutil;
22+
installMSF;
23+
}
24+
25+
function installMSF() {
26+
if [[ ! "$(which msfconsole)" = */* ]]; then
27+
curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && \
28+
chmod 755 msfinstall && \
29+
./msfinstall;
30+
rm msfinstall;
31+
fi
32+
}
33+
34+
function install() {
35+
case "$(uname -a)" in
36+
*Debian*|*Ubuntu*)
37+
installDebian;
38+
;;
39+
*Fedora*)
40+
installFedora;
41+
;;
42+
*)
43+
echo "Unable to detect Linux flavor...";
44+
;;
45+
esac
46+
echo "";
47+
echo "Installation Complete";
48+
}
49+
50+
install;

0 commit comments

Comments
 (0)