-
Notifications
You must be signed in to change notification settings - Fork 40
Offensive Resource_Files | Dependencies
pedro ubuntu edited this page Aug 11, 2019
·
33 revisions
script | dependencies |
---|---|
handler.rc | metasploit |
brute_force.rc | metasploit ; nmap |
manage_db.rc | metasploit ; nmap |
mssql_brute.rc | metasploit ; nmap |
telnet_brute.rc | metasploit ; nmap |
ssh_brute.rc | metasploit ; nmap |
postgres_brute.rc | metasploit ; nmap |
mysql_brute.rc | metaploit ; nmap |
snmp_exploiter.rc | metasploit ; nmap |
ms17_010.rc | metasploit ; nmap |
winrm_brute.rc | metasploit ; nmap |
http_CVE.rc | metasploit ; nmap ; freevulnsearch.nse |
geo_location.rc | metasploit ; nmap ; geoiplookup (OR: curl ipapi.co) |
mass_exploiter.rc | metasploit ; nmap ; geoiplookup |
post_exploitation.rc | metasploit ; nmap ; freevulnsearch.nse ; enum_protections.rb ; SCRNSAVE_T1180_persistence.rb ; linux_hostrecon.rb |
git clone https://github.com/r00t-3xp10it/resource_files.git
cd resource_files/aux
sudo chmod +x install.sh
sudo ./install.sh
-
Check for updates
sudo ./install.sh -u
- The -u (update) script argument will compare the remote repository againts local repository version file (resource_files/bin/version) and download/install any of my metasploit post-exploitation modules or resource scripts if any updates are available.
-
freevulnsearch.nse (nmap)
- Description: Nmap script to check for possible CVE's present in target system.
- Resource scripts that requires it: http_CVE.rc ; post_exploitation.rc
- Download/Install instructions (execute in terminal):
sudo wget https://raw.githubusercontent.com/OCSAF/freevulnsearch/master/freevulnsearch.nse
sudo cp freevulnsearch.nse /usr/share/nmap/scripts/freevulnsearch.nse
sudo nmap --script-updatedb
-
enum_protections.rb (metasploit)
- Description: Metasploit post-exploitation module to enumerate target system protections
- Resource scripts that requires it: post_exploitation.rc
- Download/Install instructions (execute in terminal):
sudo service postgresql start
sudo wget https://raw.githubusercontent.com/r00t-3xp10it/resource_files/master/aux/enum_protections.rb
path=$(locate modules/post/windows/recon | grep -v '\doc' | grep -v '\documentation' | head -n 1)
sudo cp enum_protections.rb $path/enum_protections.rb
sudo msfconsole -q -x 'db_status;reload_all;exit -y'
-
SCRNSAVE_T1180_persistence.rb (metasploit)
- Description: Metasploit post-exploitation module to persiste a payload in target system
- Resource scripts that requires it: post_exploitation.rc
- Download/Install instructions (execute in terminal):
sudo service postgresql start
sudo wget https://raw.githubusercontent.com/r00t-3xp10it/resource_files/master/aux/SCRNSAVE_T1180_persistence.rb
path=$(locate modules/post/windows/escalate | grep -v '\doc' | grep -v '\documentation' | head -n 1)
sudo cp SCRNSAVE_T1180_persistence.rb $path/SCRNSAVE_T1180_persistence.rb
sudo msfconsole -q -x 'db_status;reload_all;exit -y'
-
linux_hostrecon.rb (metasploit)
- Description: Metasploit post-exploitation module to enumerate target system information
- Resource scripts that requires it: post_exploitation.rc
- Download/Install instructions (execute in terminal):
sudo service postgresql start
sudo wget https://raw.githubusercontent.com/r00t-3xp10it/resource_files/master/aux/linux_hostrecon.rb
path=$(locate modules/post/linux/gather | grep -v '\doc' | grep -v '\documentation' | head -n 1)
sudo cp linux_hostrecon.rb $path/linux_hostrecon.rb
sudo msfconsole -q -x 'db_status;reload_all;exit -y'
-
install geoiplookup (geo_location.rc)
- Description: geoiplookup package its used to find the geolocation of IP address(s) (WAN)
- Resource scripts that requires it: geo_location.rc
- Download/Install instructions (execute in terminal):
sudo apt-get update && apt-get install geoip-bin