Skip to content

Commit cc7ab0c

Browse files
authored
Merge pull request #121 from NullArray/v-2.1
Version 2.1 release branch
2 parents f437573 + 8a1c05a commit cc7ab0c

19 files changed

+866
-392
lines changed

.github/.translations/README-fr.md

Lines changed: 164 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,164 @@
1+
# AutoSploit
2+
3+
Comme vous pouvez l'imaginer au vu du nom de ce projet, AutoSploit automatise l'exploitation d'hôtes distantes connectées à internet. Les adresses des hôtes à attaquer sont collectées automatiquement grâce à l'aide de Shodan, Censys et Zoomeye. Vous pouvez également utiliser vos propres listes de cibles.
4+
Les modules Metasploit disponibles ont été sélectionnés afin de faciliter l'obtention d'exécution de code à distance ( Remote Code Execution, ou RCE ), qui permettent ensuite de créer des sessions terminal inversées ( reverse shell ) ou meterpreter ( via metasploit ).
5+
6+
**Ne soyez pas stupides**
7+
8+
Recevoir les connexions de vos victimes directement sur votre ordinateur n'est pas vraiment une bonne idée. Vous devriez considérer l'option de dépenser quelques euros dans un VPS ( ou VPN ).
9+
10+
La nouvelle version d'AutoSploit permet néanmoins de définir un proxy et un User-Agent personalisé.
11+
12+
# Liens utiles
13+
14+
- [Utilisation](https://github.com/NullArray/AutoSploit/README-fr.md#Utilisation)
15+
- [Installation](https://github.com/NullArray/AutoSploit/README-fr.md#Installation)
16+
- [Dépendances](https://github.com/NullArray/AutoSploit/README-fr.md#Dépendances))
17+
- [Wiki](https://github.com/NullArray/AutoSploit/wiki)
18+
- [Options d'usage extensif](https://github.com/NullArray/AutoSploit/wiki/Usage#usage-options)
19+
- [Captures d'écran](https://github.com/NullArray/AutoSploit/wiki/Examples-and-images)
20+
- [Rapporter un bug, donner une idée](https://github.com/NullArray/AutoSploit/wiki/Bugs-and-ideas#bugs)
21+
- [Lignes directrices du développement](https://github.com/NullArray/AutoSploit/wiki/Development-information#development-of-autosploit)
22+
- [Développement](https://github.com/NullArray/AutoSploit/README-fr.md#Développement)
23+
- [Serveur discord ( en anglais, mais ne vous découragez pas ! )](https://discord.gg/9BeeZQk)
24+
25+
26+
# Installation
27+
28+
Installer AutoSploit est un jeu d'enfant. Vous pouvez trouver la dernière version stable [ici](https://github.com/NullArray/AutoSploit/releases/tag/2.0). Vous pouvez aussi télécharger la branche ``master`` en [zip](https://github.com/NullArray/AutSploit/zipball/master) ou en [tarball](https://github.com/NullArray/AutSploit/tarball/master). Vous pouvez également suivre une des méthodes ci-dessous;
29+
30+
###### Cloner
31+
32+
```bash
33+
sudo -s << EOF
34+
git clone https://github.com/NullArray/Autosploit.git
35+
cd AutoSploit
36+
pip2 install -r requirements.txt
37+
python2 autosploit.py
38+
EOF
39+
```
40+
41+
###### Docker
42+
43+
```bash
44+
sudo -s << EOF
45+
git clone https://github.com/NullArray/AutoSploit.git
46+
cd AutoSploit/Docker
47+
docker network create -d bridge haknet
48+
docker run --network haknet --name msfdb -e POSTGRES_PASSWORD=s3cr3t -d postgres
49+
docker build -t autosploit .
50+
docker run -it --network haknet -p 80:80 -p 443:443 -p 4444:4444 autosploit
51+
EOF
52+
```
53+
54+
Plus d'informations sur la façon d'utiliser Docker [ici](https://github.com/NullArray/AutoSploit/tree/master/Docker)
55+
56+
## Utilisation
57+
58+
L'ouverture du programme avec `python autosploit.py` devrait ouvrir une session terminal AutoSploit. Les options sont les suivantes ( en anglais ).
59+
60+
```
61+
1. Usage And Legal
62+
2. Gather Hosts
63+
3. Custom Hosts
64+
4. Add Single Host
65+
5. View Gathered Hosts
66+
6. Exploit Gathered Hosts
67+
99. Quit
68+
```
69+
70+
Sélectionner l'option `2` vous demandra de choisir quel type d'hôtes rechercher. Vous pouvez par exemple rentrer `IIS` ou `Apache`. Ensuite, on vous demandera quel moteurs de recherches doivent être utilisés lors de la recherche. Si tout fontionne correctement, les hôtes collectées seront sauvegardées et utilisables dans le menu d'exploitation ( `Exploit` )
71+
72+
Depuis la version 2.0, AutoSploit peut être lancé avec des arguments/drapeaux. Pour en savoir plus, exécutez `python autosploit.py -h`.
73+
Pour référence, voici les options ( en anglais ).
74+
75+
```
76+
usage: python autosploit.py -[c|z|s|a] -[q] QUERY
77+
[-C] WORKSPACE LHOST LPORT [-e]
78+
[--ruby-exec] [--msf-path] PATH [-E] EXPLOIT-FILE-PATH
79+
[--rand-agent] [--proxy] PROTO://IP:PORT [-P] AGENT
80+
81+
optional arguments:
82+
-h, --help show this help message and exit
83+
84+
search engines:
85+
possible search engines to use
86+
87+
-c, --censys use censys.io as the search engine to gather hosts
88+
-z, --zoomeye use zoomeye.org as the search engine to gather hosts
89+
-s, --shodan use shodan.io as the search engine to gather hosts
90+
-a, --all search all available search engines to gather hosts
91+
92+
requests:
93+
arguments to edit your requests
94+
95+
--proxy PROTO://IP:PORT
96+
run behind a proxy while performing the searches
97+
--random-agent use a random HTTP User-Agent header
98+
-P USER-AGENT, --personal-agent USER-AGENT
99+
pass a personal User-Agent to use for HTTP requests
100+
-q QUERY, --query QUERY
101+
pass your search query
102+
103+
exploits:
104+
arguments to edit your exploits
105+
106+
-E PATH, --exploit-file PATH
107+
provide a text file to convert into JSON and save for
108+
later use
109+
-C WORKSPACE LHOST LPORT, --config WORKSPACE LHOST LPORT
110+
set the configuration for MSF (IE -C default 127.0.0.1
111+
8080)
112+
-e, --exploit start exploiting the already gathered hosts
113+
114+
misc arguments:
115+
arguments that don't fit anywhere else
116+
117+
--ruby-exec if you need to run the Ruby executable with MSF use
118+
this
119+
--msf-path MSF-PATH pass the path to your framework if it is not in your
120+
ENV PATH
121+
```
122+
123+
# Dépendances
124+
125+
AutoSploit exige la présence des modules Python2.7 suivants.
126+
127+
```
128+
requests
129+
psutil
130+
```
131+
132+
Si vous ne les avez pas, vous pouvez les installer avec les commandes ci-dessous ( dans le dossier d'AutoSploit ):
133+
134+
```bash
135+
pip install requests psutil
136+
```
137+
138+
ou
139+
140+
```bash
141+
pip install -r requirements.txt
142+
```
143+
144+
Comme le programme invoque des fonctionalités du Metasploit, vous devez l'avoir installé au préalable. Vous pouvez en obtenir une copie depuis le site de Rapid7 en cliquant [ici](https://www.rapid7.com/products/metasploit/).
145+
146+
### Développement
147+
148+
Même si AutoSploit n'est pas vraiment en Béta, il est sujet à des changements dans le futur.
149+
150+
Si vous souhaitez rester à jour au niveau du développement et obtenir avant tout le monde toutes les super nouvelles fonctionalités, utilisez la [branche de développement](https://github.com/NullArray/AutoSploit/tree/dev-beta).
151+
152+
Si vous voulez contribuer au développement de ce projet, lisez [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md). Ce fichier contient nos lignes directrices de contribution.
153+
154+
Aussi, lisez nos [standards de contribution](https://github.com/NullArray/AutoSploit/wiki/Development-information#contribution-standards) avant d'envoyer une pull request.
155+
156+
Si vous souhaitez obtenir de l'aide avec le code, ou juste partager avec les autres membres de la communauté d'AutoSploit, rejoignez-nous sur notre [serveur Discord](https://discord.gg/9BeeZQk). ( Nous ne mordons pas )
157+
158+
## Note
159+
160+
Si vous rencontrez un bug et que vous souhaitez le signaler, [ouvrez un ticket](https://github.com/NullArray/AutoSploit/issues).
161+
162+
Merci d'avance.
163+
164+
Traduction par [jesuiscamille](https://github.com/jesuiscamille). J'ai probablement fait des erreurs de conjugaison/orthographe/traduction. N'hésitez pas à juste [ouvrir un ticket](https://github.com/NullArray/AutoSploit/issues), c'est rapide et ça nous encourage :) !
File renamed without changes.

.gitignore

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@ api.p
44
hosts.txt
55
secret.p
66
uid.p
7-
etc/tokens/*
7+
etc/tokens/*

CONTRIBUTING.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -2,25 +2,25 @@
22

33
All contributions to AutoSploit are not only welcomed, but highly appreciated, please keep in mind the following while making a pull request:
44

5-
- Each request should make at least one logical change
6-
- All contributions should be forked from the `dev-beta` branch
7-
- Each request will need to be reviewed before merged, if anything seems weird we will either fix it or ask you to fix it for us
8-
- If you have multiple pushes in one request, please squash them together (or we will before we merge)
9-
- All pull requests that are merged are provided under the same license as the program is, keep the following in mind;
5+
- Each request should make at least one logical change
6+
- All contributions should be forked from the `dev-beta` branch
7+
- Each request will need to be reviewed before merged, if anything seems weird we will either fix it or ask you to fix it for us
8+
- If you have multiple pushes in one request, please squash them together (or we will before we merge)
9+
- All pull requests that are merged are provided under the same license as the program is, keep the following in mind;
1010

1111
> By submitting code contributions to AutoSploit via Git pull request or other, checking them into the AutoSploit's source code repository, it is understood (unless you specify otherwise) that you are offering the AutoSploit copyright holders the unlimited, non-exclusive right to reuse, modify, and re-license the code. This is important because the inability to re-license code has caused devastating problems for other software projects (such as KDE and NASM). If you wish to specify special license conditions of your contributions, just say so when you send them.
1212
1313
## Getting started
1414

1515
To get started making a contribution please do the following:
1616

17-
- Fork the repository using the fork button
18-
- `git clone https://github.com/<YOUR-NAME>/AutoSploit.git -b dev-beta`
19-
- Edit the code to your liking
20-
- After editing `git branch <YOUR-BRANCH-NAME> && git checkout <YOUR-BRANCH-NAME>`
21-
- Add your commits and comment them
22-
- `git push --set-upstream origin <YOUR-BRANCH>`
23-
- Open a [pull request](https://github.com/NullArray/AutoSploit/pulls)
24-
- Wait for us to check it out
25-
26-
Thank you.
17+
- Fork the repository using the fork button
18+
- `git clone https://github.com/<YOUR-NAME>/AutoSploit.git -b dev-beta`
19+
- Edit the code to your liking
20+
- After editing `git branch <YOUR-BRANCH-NAME> && git checkout <YOUR-BRANCH-NAME>`
21+
- Add your commits and comment them
22+
- `git push --set-upstream origin <YOUR-BRANCH>`
23+
- Open a [pull request](https://github.com/NullArray/AutoSploit/pulls)
24+
- Wait for us to check it out
25+
26+
Thank you.

README.md

Lines changed: 63 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
# AutoSploit
22

3-
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well.
4-
The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started
3+
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started
54

65
**Operational Security Consideration**
76

@@ -10,21 +9,57 @@ Receiving back connections on your local machine might not be the best idea from
109
The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent.
1110

1211
# Helpful links
12+
1313
- [Usage](https://github.com/NullArray/AutoSploit#usage)
14+
- [Installing](https://github.com/NullArray/AutoSploit#Installation)
1415
- [Dependencies](https://github.com/NullArray/AutoSploit#dependencies)
1516
- [User Manual](https://github.com/NullArray/AutoSploit/wiki)
17+
- [Extensive usage breakdown](https://github.com/NullArray/AutoSploit/wiki/Usage#usage-options)
18+
- [Screenshots](https://github.com/NullArray/AutoSploit/wiki/Examples-and-images)
19+
- [Reporting bugs/ideas](https://github.com/NullArray/AutoSploit/wiki/Bugs-and-ideas#bugs)
20+
- [Development guidelines](https://github.com/NullArray/AutoSploit/wiki/Development-information#development-of-autosploit)
1621
- [Shoutouts](https://github.com/NullArray/AutoSploit#acknowledgements)
1722
- [Development](https://github.com/NullArray/AutoSploit#active-development)
1823
- [Discord server](https://discord.gg/9BeeZQk)
24+
- [README translations](https://github.com/NullArray/AutoSploit#translations)
1925

20-
## Usage
26+
# Installation
2127

22-
Clone the repo. Or deploy via Docker. Details for which can be found [here](https://github.com/NullArray/AutoSploit/tree/master/Docker)
28+
Installing AutoSploit is very simple, you can find the latest stable release [here](https://github.com/NullArray/AutoSploit/releases/tag/2.0). You can also download the master branch as a [zip](https://github.com/NullArray/AutSploit/zipball/master) or [tarball](https://github.com/NullArray/AutSploit/tarball/master) or follow one of the below methods;
2329

24-
`git clone https://github.com/NullArray/AutoSploit.git`
30+
###### Cloning
2531

26-
Starting the program with `python autosploit.py` will open an AutoSploit terminal session. The options for which are as follows.
32+
```bash
33+
sudo -s << EOF
34+
git clone https://github.com/NullArray/Autosploit.git
35+
cd AutoSploit
36+
chmod +x install.sh
37+
./install.sh
38+
python2 autosploit.py
39+
EOF
40+
```
41+
42+
###### Docker
2743

44+
```bash
45+
sudo -s << EOF
46+
git clone https://github.com/NullArray/AutoSploit.git
47+
cd AutoSploit
48+
chmod +x install.sh
49+
./installsh
50+
cd AutoSploit/Docker
51+
docker network create -d bridge haknet
52+
docker run --network haknet --name msfdb -e POSTGRES_PASSWORD=s3cr3t -d postgres
53+
docker build -t autosploit .
54+
docker run -it --network haknet -p 80:80 -p 443:443 -p 4444:4444 autosploit
55+
EOF
56+
```
57+
58+
More information on running Docker can be found [here](https://github.com/NullArray/AutoSploit/tree/master/Docker)
59+
60+
## Usage
61+
62+
Starting the program with `python autosploit.py` will open an AutoSploit terminal session. The options for which are as follows.
2863
```
2964
1. Usage And Legal
3065
2. Gather Hosts
@@ -37,12 +72,11 @@ Starting the program with `python autosploit.py` will open an AutoSploit termina
3772

3873
Choosing option `2` will prompt you for a platform specific search query. Enter `IIS` or `Apache` in example and choose a search engine. After doing so the collected hosts will be saved to be used in the `Exploit` component.
3974

40-
As of version 2.0 AutoSploit can be started with a number of command line arguments/flags as well. Type `python autosploit.py -h`
41-
to display all the options available to you. I've posted the options below as well for reference.
75+
As of version 2.0 AutoSploit can be started with a number of command line arguments/flags as well. Type `python autosploit.py -h` to display all the options available to you. I've posted the options below as well for reference.
4276

4377
```
4478
usage: python autosploit.py -[c|z|s|a] -[q] QUERY
45-
[-C] WORKSPACE LHOST LPORT [-e]
79+
[-C] WORKSPACE LHOST LPORT [-e] [--whitewash] PATH
4680
[--ruby-exec] [--msf-path] PATH [-E] EXPLOIT-FILE-PATH
4781
[--rand-agent] [--proxy] PROTO://IP:PORT [-P] AGENT
4882
@@ -86,10 +120,20 @@ misc arguments:
86120
this
87121
--msf-path MSF-PATH pass the path to your framework if it is not in your
88122
ENV PATH
123+
--whitelist PATH only exploit hosts listed in the whitelist file
89124
```
90125

126+
## Installation
127+
128+
```bash
129+
git clone https://github.com/NullArray/AutoSploit
130+
cd AutoSploit
131+
chmod +x install.sh
132+
./install.sh
133+
```
91134

92135
## Dependencies
136+
_Note_: All dependencies should be installed using the above installation method, however, if you find they are not:
93137

94138
AutoSploit depends on the following Python2.7 modules.
95139

@@ -118,21 +162,26 @@ Special thanks to [Ekultek](https://github.com/Ekultek) without whoms contributi
118162

119163
And thanks to [Khast3x](https://github.com/khast3x) for setting up Docker support.
120164

121-
122-
123165
### Active Development
124166

125-
While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future.
167+
While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future.
126168

127-
I've been working on the new version of the tool in an open source capacity with the help of a number of developers
169+
I've been working on the new version of the tool in an open source capacity with the help of a number of developers
128170
that have expressed an interest in doing so. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta).
129171

130172
If you would like to contribute to the development of this project please be sure to read [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md) as it contains our contribution guidelines.
131173

132-
If you need some help understanding the code, or want to chat with some other AutoSploit community members, feel free to join our [Discord chat](https://discord.gg/9BeeZQk).
174+
Please, also, be sure to read our [contribution standards](https://github.com/NullArray/AutoSploit/wiki/Development-information#contribution-standards) before sending pull requests
175+
176+
If you need some help understanding the code, or want to chat with some other AutoSploit community members, feel free to join our [Discord server](https://discord.gg/9BeeZQk).
133177

134178
### Note
135179

136180
If you happen to encounter a bug please feel free to [Open a Ticket](https://github.com/NullArray/AutoSploit/issues).
137181

138182
Thanks in advance.
183+
184+
## Translations
185+
186+
- [FR](https://github.com/NullArray/AutoSploit/blob/master/.github/.translations/README-fr.md)
187+
- [ZH](https://github.com/NullArray/AutoSploit/blob/master/.github/.translations/README-zh.md)

api_calls/zoomeye.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ def zoomeye(self):
6767
else:
6868
headers = {
6969
"Authorization": "JWT {}".format(str(token["access_token"])),
70-
"agent": self.user_agent["User-Agent"]
70+
"User-Agent": self.user_agent["User-Agent"] # oops
7171
}
7272
params = {"query": self.query, "page": "1", "facet": "ipv4"}
7373
req = requests.get(

autosploit.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@
22

33

44
if __name__ == "__main__":
5-
main()
5+
main()

0 commit comments

Comments
 (0)