Skip to content

Commit 11d2888

Browse files
authored
Merge branch 'master' into dev-beta
2 parents 72ad39c + 22b5dcc commit 11d2888

File tree

2 files changed

+66
-2
lines changed

2 files changed

+66
-2
lines changed

README-zh.md

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
# AutoSploit
2+
AutoSploit尝试自动化利用远程主机,通过使用Shodan.io API自动收集目标。该程序允许用户输入他们的平台特定的搜索查询,如: Apache、IIS等等,候选者列表将被检索。
3+
4+
完成这个操作后,程序的“Exploit”组件就会通过运行一系列的Metasploit模块来尝试利用这些目标。通过以编程方式将模块的名称与初始搜索查询进行比较来确定将采用哪些Metasploit模块。然而,我已经增加了在“Hail Mary”类型的攻击中针对目标运行所有可用模块的功能。
5+
6+
已经选择了可用的Metasploit模块来促进远程代码执行并尝试获得反向TCP Shell和/或Meterpreter会话。通过“Exploit”组件启动之前出现的对话框配置工作区,本地主机和本地端口(用于MSF便利的后端连接)。
7+
8+
#### 操作安全考虑
9+
从OPSEC的角度来看,在本地机器上接收连接可能不是最好的想法。 请考虑从具有所需的所有依赖性的VPS运行此工具。
10+
11+
# 用法
12+
克隆 repo, 或者通过Docker进行部署。 详细信息可以在这里找到特别感谢Khast3x在这方面的贡献。
13+
14+
>git clone https://github.com/NullArray/AutoSploit.git
15+
16+
您可以从终端用python autosploit.py启动。 启动后,您可以选择五个操作之一。 请参阅下面的选项摘要。
17+
18+
```bash
19+
+------------------+----------------------------------------------------+
20+
| Option | Summary |
21+
+------------------+----------------------------------------------------+
22+
|1. Usage | Display this informational message. |
23+
|2. Gather Hosts | Query Shodan for a list of platform specific IPs. |
24+
|3. View Hosts | Print gathered IPs/RHOSTS. |
25+
|4. Exploit | Configure MSF and Start exploiting gathered targets|
26+
|5. Quit | Exits AutoSploit. |
27+
+------------------+----------------------------------------------------+
28+
```
29+
# 可选模块
30+
31+
RCE选择了该工具提供的Metasploit模块。 您可以在本仓库的modules.txt文件中找到它们。 如果您希望添加更多或其他模块,请按以下格式进行。
32+
33+
>use exploit/linux/http/netgear_wnr2000_rce;exploit -j;
34+
35+
每个新的模块都有自己的所属
36+
37+
# 依赖
38+
39+
AutoSploit依赖于以下Python2.7模块。
40+
41+
```bash
42+
shodan
43+
blessings
44+
```
45+
46+
如果你发现你没有安装这些软件,就像这样用pip来获取它们。
47+
48+
```bash
49+
pip install shodan
50+
pip install blessings
51+
```
52+
由于程序调用了Metasploit框架的功能,所以你也需要安装它。 通过点击[这里](https://www.rapid7.com/products/metasploit/)从Rapid7获取它。
53+
54+
# 注意
55+
56+
虽然这不完全是一个Beta版本,但它是一个早期版本,因为这样的工具可能会在未来发生变化。如果您碰巧遇到了错误,或者希望为工具的改进做出贡献,请随时[打开工单](https://github.com/NullArray/AutoSploit/issues)[提交合并请求](https://github.com/NullArray/AutoSploit/pulls)
57+
58+
感谢!
59+

README.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -111,10 +111,15 @@ Special thanks to [Ekultek](https://github.com/Ekultek) without whoms contributi
111111
And thanks to [Khast3x](https://github.com/khast3x) for setting up Docker support.
112112

113113

114+
115+
### Active Development
116+
While this isn't exactly a Beta release it is an early release nonetheless as such the tool might be subject to changes in the future.
117+
118+
I've been working on the new version of the tool in an open source capacity with the help of a number of developers
119+
that have expressed an interest in doing so. The new version will include extra features such as the ability to load in a custom target and exploit list among many more enhancements. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta)
120+
114121
### Note
115122

116123
If you happen to encounter a bug please feel free to [Open a Ticket](https://github.com/NullArray/AutoSploit/issues).
117124

118-
If you wish to contribute to the development of this project please be sure to read [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md) before you get started as it contains our contribution guidelines.
119-
120125
Thanks in advance.

0 commit comments

Comments
 (0)