-
Notifications
You must be signed in to change notification settings - Fork 3
/
Copy pathparrot_home.sh
146 lines (100 loc) · 5.46 KB
/
parrot_home.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
#!/bin/bash
name=$(logname)
sudo echo ""
echo "This script needs a bit of user interaction sometimes"
echo "Press enter to start the script"
read
echo "Download List files for gobuster/hashcat/LFI/etc. ? (Y/N)"
read download_lists
# Deleting desktop Icons
cd /home/$name/Desktop
rm anon-gui.desktop codium.desktop encryptpad.desktop libreoffice-startcenter.desktop torbrowser.desktop
rm parrot-zulucrypt.desktop parrot-sirikali.desktop password.txt README.license
mkdir /home/$name/Shells
# apt-get
sudo wget -qO - https://download.sublimetext.com/sublimehq-pub.gpg | sudo apt-key add -
sudo echo "deb https://download.sublimetext.com/ apt/stable/" | sudo tee /etc/apt/sources.list.d/sublime-text.list
arr=("gem" "nmap" "hashcat" "terminator" "wireshark" "gobuster" "dirbuster" "git"
"strace" "ltrace" "radare2" "radare2-cutter" "smbmap" "exploitdb" "mingw-w64" "vim"
"tcpdump" "burpsuite" "python3-pip" "apt-transport-https" "sublime-text" "metasploit-framework"
"smbclient" "nfs-common" "hydra" "hydra-gtk" "wpscan" "freerdp2-x11" "rlwrap" "hexedit"
"sqlitebrowser" "spike" "libssl-dev" "enum4linux" "ftp" "sqlmap" "sshuttle" "socat" "exploitdb-papers"
"passing-the-hash" "davtest" "snmp" "snmpcheck" "ike-scan" "neo4j" "bloodhound" "cifs-utils" "snmp-mibs-downloader"
"crackmapexec")
sudo apt update -y && sudo apt upgrade -y && sudo apt autoremove -y
for i in "${arr[@]}"; do
sudo apt install $i -y 2>>~/error.log
done
sudo gem install evil-winrm
echo Installed evil-winrm
#Pip for python 2.x
curl https://bootstrap.pypa.io/pip/2.7/get-pip.py --output get-pip.py
sudo python2 get-pip.py
rm get-pip.py
# Installing pip modules
p2_modules=("requests" "six" "impacket" "droopescan")
p3_modules=("pyldap" "hashid")
for i in "${p3_modules[q]}"; do
python3 -m pip install $i 2>>~/error.log
done
for i in "${p2_modules[@]}"; do
python2 -m pip install $i 2>>~/error.log
done
# Github and 3rd party software stuff
cd /opt
git clone https://github.com/ropnop/kerbrute.git
cd kerbrute
make linux
git clone https://github.com/danielmiessler/SecLists.git
wget https://gitlab.com/kalilinux/packages/hash-identifier/-/raw/kali/master/hash-id.py
git clone https://github.com/xmendez/wfuzz.git
git clone https://github.com/openwall/john -b bleeding-jumbo john # Better JohnTheRipper Version
cd john/src/
./configure
make -s clean && make -sj4
cd ../..
git clone https://github.com/SecureAuthCorp/impacket.git
pip3 install impacket/ 2>>~/error.log
git clone https://github.com/helviojunior/MS17-010.git
git clone https://github.com/samratashok/nishang.git
git clone https://github.com/rasta-mouse/Sherlock.git # Checking for windows exploits
git clone https://github.com/ropnop/windapsearch.git
mkdir PrintSpoofer && cd PrintSpoofer
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer64.exe -O PrintSpoofer64.exe
wget https://github.com/itm4n/PrintSpoofer/releases/download/v1.0/PrintSpoofer32.exe -O PrintSpoofer32.exe
cd ..
# Lists
if [[ $download_lists == 'Y' || $download_lists == 'y' ]]; then
mkdir /home/$name/Lists
mkdir /home/$name/Lists/LFI
mkdir /home/$name/Lists/web
mkdir /home/$name/Lists/Wordlists
cd /home/$name/Lists/LFI
wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Fuzzing/LFI/LFI-gracefulsecurity-windows.txt -O LFI-Windows.txt
wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Fuzzing/LFI/LFI-gracefulsecurity-linux.txt -O LFI-Linux.txt
wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Fuzzing/LFI/LFI-LFISuite-pathtotest.txt -O LFI-Linux-Paths.txt
wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Fuzzing/LFI/LFI-LFISuite-pathtotest-huge.txt -O LFI-Linux-Paths-Huge.txt
wget https://raw.githubusercontent.com/danielmiessler/SecLists/master/Fuzzing/LFI/LFI-Jhaddix.txt -O LFI-Jhaddix.txt
cd /home/$name/Lists/web
wget https://raw.githubusercontent.com/nop-tech/Pentesting/main/wordlists/gobuster/Gobuster-Dir-Small.txt -O Gobuster-Dir-Small.txt
wget https://raw.githubusercontent.com/nop-tech/Pentesting/main/wordlists/gobuster/Gobuster-Dir-Medium.txt -O Gobuster-Dir-Medium.txt
wget https://raw.githubusercontent.com/nop-tech/Pentesting/main/wordlists/gobuster/Gobuster-Dir-Big.txt -O Gobuster-Dir-Big.txt
wget https://raw.githubusercontent.com/nop-tech/Pentesting/main/wordlists/gobuster/Gobuster-Apache-User-Enum.txt -O Gobuster-Apache-User-Enum.txt
wget https://raw.githubusercontent.com/nop-tech/Pentesting/main/wordlists/gobuster/directory_big_kali_version.txt -O kali_big.txt
wget https://raw.githubusercontent.com/v0re/dirb/master/wordlists/common.txt -O dirb.txt
wget https://raw.githubusercontent.com/v0re/dirb/master/wordlists/big.txt -O dirb_big.txt
cd /home/$name/Lists/Wordlists
wget https://download.weakpass.com/wordlists/90/rockyou.txt.gz
gzip -d rockyou.txt.gz
fi
# Shells
cd /home/$name/Shells
wget https://raw.githubusercontent.com/pentestmonkey/php-reverse-shell/master/php-reverse-shell.php -O php-shell-pentestmonkey.php
# Fixing permissions
sudo chown -R user:user /home/$name/*
# Aliases
echo "alias kerbrute='/opt/kerbrute/dist/kerbrute_linux_amd64'" >> ~/.bash_aliases
echo "alias pattern_create='/usr/share/metasploit-framework/tools/exploit/pattern_create.rb'" >> ~/.bash_aliases
echo "alias pattern_offset='/usr/share/metasploit-framework/tools/exploit/pattern_offset.rb'" >> ~/.bash_aliases
echo "alias web='sudo python3 -m http.server 80'" >> ~/.bash_aliases
source ~/.bashrc