├── CHANGELOG.md ├── README.md ├── TOOLKIT.md └── install /CHANGELOG.md: -------------------------------------------------------------------------------- 1 | # THE BOX - Changelog 2 | 3 | ## ***0.1*** - 12/01/2022 - Beta Launch 4 | 5 | ## ***0.2*** - 13/01/2022 6 | - Removed Social Network Hacking tools 7 | - Added Dumper 8 | - Added PRET 9 | - Fixed tool counter 10 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # THE BOX 2 | 3 | v0.2.1 4 | 5 | ## SUMMARY 6 | 7 | A simple script that installs 174 useful Linux tools for penetration testing and security audits. 8 | 9 | ## DESCRIPTION 10 | 11 | This script was written in a way that you could install a brand new OS and, by running it, you would be ready to start all your penetration testing without the hassle of installing each tool one by one. 12 | 13 | We have a couple of options: `-m` or `--minimal` only installs the most common tools for each category (nmap, wireshark, dirb, metasploit, etc.) and `-ng` or `--no-gui` only installs tools that don't require a GUI, for an even lighter pentest environment. Without any flags it will install 177 total tools from security utilities such as UFW, Anonsurf, KeePassXC, to (post-)exploitation frameworks like Metasploit, Empire and PowerSploit. 14 | 15 | This program stores the downloaded tools in multiple folders, regarding the type of utility being installed: 16 | 17 | - Reverse Engineering 18 | - Miscellaneous 19 | - Cracking 20 | - Wifi Hacking 21 | - Networking 22 | - OSINT 23 | - Forensics 24 | - Security 25 | - Enumeration 26 | - Fuzzers 27 | - Scanners 28 | - Exploitation 29 | - Post-Exploitation 30 | - Wordlists 31 | 32 | Disclaimer: Some downloads and/or installations might fail. You need to ensure that you have internet connection, enough disk space and admin (root) privileges. Besides that, some packages or links might not be available when trying to download them. 33 | 34 | ## SYSTEM REQUIREMENTS 35 | 36 | - AMD64 37 | - Debian based (Ubuntu, Linux Lite, Xubuntu...) 38 | - x64 39 | 40 | ## EXECUTION 41 | 42 | Terminal execution: 43 | 44 | ```bash 45 | $ git clone https://github.com/cycurity/the-box.git 46 | $ cd the-box 47 | $ chmod +x install 48 | $ ./install -h 49 | ``` 50 | 51 | ## CREDITS 52 | 53 | Development team: 54 | 55 | - [nu11pointer](https://github.com/nu11pointer "nu11pointer's Github Profile") 56 | - [intMa1n](https://github.com/Bernardo15Sousa "intMa1n's Github Profile") 57 | - [Oz0nO](https://github.com/Oz0nO "Oz0nO's Github Profile") 58 | 59 | External Sources: 60 | 61 | - [pollev](https://github.com/pollev "polev's GitHub Profile") - [Bash Progress Bar](https://github.com/pollev/bash_progress_bar) 62 | - [cxw42](https://github.com/cxw42 "cxw42's GitHub Profile") - [Bash Progress Bar](https://github.com/pollev/bash_progress_bar) 63 | 64 | ## LICENSE 65 | 66 | Copyright (C) 2021, Cycurity 67 | 68 | This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. 69 | 70 | The software is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. 71 | 72 | Check out the GNU General Public License: [http://www.gnu.org/licenses/](http://www.gnu.org/licenses/ "GNU General Public License") 73 | -------------------------------------------------------------------------------- /TOOLKIT.md: -------------------------------------------------------------------------------- 1 | # TOOLS 2 | 3 | ## Pre-requisites Tools 4 | 5 | - 7zip 6 | - APKTool 7 | - CMake 8 | - Curl 9 | - Dos2Unix 10 | - File 11 | - g++ 12 | - gcc 13 | - Git 14 | - Groff 15 | - Java 16 | - Less 17 | - Make 18 | - NodeJS 19 | - PandoC 20 | - Perl 21 | - Pip2 22 | - Pip3 23 | - PipEnv 24 | - Python2 25 | - Python3 26 | - Python(2/3) Libraries 27 | - Ruby 28 | - Snap 29 | - SQLite3 30 | - StegSnow 31 | - System Libraries 32 | - TCPFlow 33 | - Vim 34 | - Xsel 35 | 36 | ## Installed Tools (174) 37 | 38 | - Abeebus 39 | - aircrack-ng 40 | - Amass 41 | - Angry IP Scanner 42 | - AngularJS CSTI Scanner 43 | - Anonsurf 44 | - Apache2 45 | - arping 46 | - Async DNS Brute 47 | - AudioStego 48 | - Autopsy 49 | - BeEF 50 | - Bettercap 51 | - binwalk 52 | - bless 53 | - BloodHound 54 | - BPython 55 | - Bulk Downloader for Reddit 56 | - Burpsuite 57 | - CATPHISH 58 | - Cewl 59 | - CME: CrackMapExec 60 | - crackstation-human-only 61 | - Crowbar 62 | - Crunch 63 | - Dirb 64 | - Dirbuster 65 | - dns2proxy 66 | - DNSEnum 67 | - DNSMap 68 | - DNSRecon 69 | - Docker 70 | - Droopescan 71 | - dsniff 72 | - Dumper 73 | - Empire 74 | - enum4linux 75 | - Ettercap (CLI) 76 | - Ettercap (GUI) 77 | - exiftool 78 | - Exploitdb 79 | - ffmpeg 80 | - ffuf 81 | - Fierce 82 | - Firefox Decrypt 83 | - Foremost 84 | - freerdp-x11 85 | - Frida 86 | - fuzzdb 87 | - gdb 88 | - GoBuster 89 | - GoClone 90 | - Golismero 91 | - Gophish 92 | - Guake Terminal 93 | - hash-id 94 | - hash-identifier 95 | - hashcat 96 | - hexdump 97 | - hping3 98 | - impacket 99 | - JAWS 100 | - JD-GUI 101 | - Joomscan 102 | - KeePassXC 103 | - Keylogger 104 | - King Phisher 105 | - LES: Linux Privilege Escalation Auditing Tool 106 | - LinEnum 107 | - Linux Exploit Suggester 108 | - Linux Smart Enumeration 109 | - ltrace 110 | - Lynx 111 | - Masscan 112 | - MassDNS 113 | - mat2 114 | - MDB Tools 115 | - Merlin 116 | - Metasploit 117 | - mimikatz 118 | - mimikittenz 119 | - MITMf 120 | - NBTScan 121 | - net-creds 122 | - netcat 123 | - netdiscover 124 | - NexPhisher 125 | - ngrok 126 | - Nikto 127 | - nishang 128 | - Nmap 129 | - objdump 130 | - OneForAll 131 | - OpenVPN 132 | - ophcrack (CLI) 133 | - ophcrack (GUI) 134 | - OWASP ZAP 135 | - Payloads All The Things 136 | - PEASS 137 | - Photon 138 | - Postenum 139 | - PowerSploit 140 | - PRET 141 | - ProxyChains4 142 | - radare2 143 | - reaver 144 | - Recon-NG 145 | - ReconSpider 146 | - Remmina 147 | - rockyou 148 | - roguehostapd 149 | - ROT 150 | - RouterSploit 151 | - Rust Scan 152 | - Scapy 153 | - Scylla 154 | - Search That Hash 155 | - Seatbelt 156 | - SecLists 157 | - Seeker 158 | - Sherlock 159 | - Sherlock 160 | - Shodan 161 | - SILENTTRINITY 162 | - Simple Keylogger 163 | - SMB Client 164 | - SMBMap 165 | - SocialScan 166 | - SPARTA 167 | - Spider Foot 168 | - SQLMap 169 | - SSH & SFTP 170 | - SSH-Backdoor 171 | - sslsplit 172 | - sslstrip2 173 | - StegBrute 174 | - steghide 175 | - StegSeek 176 | - strace 177 | - SubBrute 178 | - SubFinder 179 | - Sublist3r 180 | - tcpdump 181 | - Telnet 182 | - THC Hydra 183 | - The Sleuth Kit 184 | - The Social-Engineer Toolkit (SET) 185 | - TheHarvester 186 | - tshark 187 | - UFW 188 | - Unicorn 189 | - UserRecon 190 | - VirusTotalAPI 191 | - VNC Viewer 192 | - Volatility 3 193 | - W3af 194 | - Watson 195 | - webshells 196 | - Weevely 197 | - wfuzz 198 | - WhatsMyName 199 | - Wifi Jammer 200 | - Wifi-Cracker 201 | - wifiphisher 202 | - Wifite 2 203 | - Windows Exploit Suggester 204 | - Wireshark 205 | - WlCreator 206 | - WPScan 207 | - XanXSS 208 | - Xerxes (C) 209 | - Xerxes (C++) 210 | - xfreerdp 211 | - Zphisher 212 | -------------------------------------------------------------------------------- /install: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # 4 | # System requirements: 5 | # - AMD64 6 | # - Debian based 7 | # - x64 architecture 8 | # - Internet Connection 9 | # 10 | # Total tools: 174 11 | # GUI tools: 25 12 | # Minimal tools: 72 13 | # Size: XGB 14 | # 15 | # Made by Cycurity 16 | # 17 | 18 | ## Variables 19 | WORDLISTS="/usr/share/wordlists" 20 | GUI=true 21 | MINIMAL=false 22 | QUIET=false 23 | REBOOT=false 24 | VERSION="0.1" 25 | TOOLS=174 26 | GUITOOLS=25 27 | NOMINIMALTOOLS=103 28 | GUINOMINIMALTOOLS=19 29 | #PROGRESS=0 30 | 31 | ## Colours 32 | CYAN="\\033[1;36m" 33 | YELLOW="\\033[1;33m" 34 | RED="\\033[1;31m" 35 | GREEN="\\033[1;32m" 36 | BLUE="\\033[1;34m" 37 | PINK="\\033[1;35m" 38 | WHITE="\\033[1;37m" 39 | GRAY="\\033[1;30m" 40 | RESET="\\033[0m" 41 | 42 | 43 | # Check for any given parameters 44 | for arg in "$@"; do 45 | case $1 in 46 | -ng| --no-gui) 47 | shift 48 | GUI=false 49 | ;; 50 | -m| --minimal) 51 | shift 52 | MINIMAL=true 53 | ;; 54 | -h| --help) 55 | echo -e " 56 | Commands: 57 | -h --help Displays this help menu 58 | -v --version Displays current version 59 | -q --quiet Don't display the name of the tools while installing 60 | -ng --no-gui Only installs tools with no GUI required 61 | -m --minimal Only installs the most common tools for each category" 62 | echo 63 | exit 64 | ;; 65 | -v| --version) 66 | echo "Version" $VERSION 67 | echo 68 | exit 69 | ;; 70 | -q| --quiet) 71 | QUIET=true 72 | ;; 73 | esac 74 | done 75 | 76 | ## Source for Progress Bar 77 | #source ./progress_bar.sh 78 | 79 | ## Checks if a URL returns a valid status code (if the website exists) 80 | valid() 81 | { 82 | URL=$1 83 | 84 | if curl --output /dev/null --silent --head --fail "$URL"; then 85 | return 1 86 | else 87 | return 0 88 | fi 89 | } 90 | 91 | ## Print the name of the tool 92 | p() 93 | { 94 | if [ $QUIET == false ]; then 95 | TOOL=$1 96 | ERROR=$2 97 | WARNING=$3 98 | if [ $WARNING ]; then 99 | echo -e "$YELLOW[*]$RESET $TOOL" 100 | elif [ $ERROR ]; then 101 | echo -e "$RED[!]$RESET $TOOL" 102 | else 103 | echo -e "$GREEN[+]$RESET $TOOL" 104 | fi 105 | #PROGRESS=`expr $PROGRESS + 1;` 106 | #ans=$( bc <<<"100*$PROGRESS/177" ) 107 | #draw_progress_bar $ans 108 | fi 109 | } 110 | 111 | ## Automatically checks if the package or link is up or down, before attempting to install 112 | download() 113 | { 114 | NAME=$1 115 | METHOD=$2 116 | PACKAGE=$3 117 | 118 | if [ ! $PACKAGE ]; then 119 | PACKAGE=$NAME 120 | fi 121 | 122 | if [[ "$METHOD" == "apt" && "$(apt info $PACKAGE 2>tmp && grep "No packages found" tmp)" != "" ]]; then 123 | rm tmp 124 | p "$NAME" 125 | apt-get -qq install -y $PACKAGE >> $DIR/.install.log 2>>$DIR/.error.log 126 | return 0 127 | elif [[ "$METHOD" == "snap" ]]; then 128 | p "$NAME" 129 | snap install $PACKAGE >> $DIR/.install.log 2>>$DIR/.error.log 130 | return 0 131 | elif [[ "$METHOD" == "pip" ]]; then 132 | p "$NAME" 133 | pip install -q $PACKAGE >> $DIR/.install.log 2>>$DIR/.error.log 134 | return 0 135 | elif [[ "$METHOD" == "pip3" ]]; then 136 | p "$NAME" 137 | python3 -m pip install -q $PACKAGE >> $DIR/.install.log 2>>$DIR/.error.log 138 | return 0 139 | elif [[ "$METHOD" == "wget" ]]; then 140 | if curl --output /dev/null --silent --head --fail "$PACKAGE"; then 141 | p "$NAME" 142 | wget -q $PACKAGE 143 | return 0 144 | else 145 | p "$NAME" e 146 | return 1 147 | fi 148 | elif [[ "$METHOD" == "docker" ]]; then 149 | p "$NAME" 150 | docker pull -q $PACKAGE >> $DIR/.install.log 2>> $DIR/.error.log 151 | return 0 152 | elif [[ "$METHOD" == "git" ]]; then 153 | res=$(wget --spider -S "$PACKAGE" 2>tmp && grep ^.*HTTP.*200.*\$ tmp | awk '{print $2}') 154 | if [[ "$res" == "200" ]]; then 155 | p "$NAME"; 156 | git clone -q $PACKAGE 157 | rm tmp 158 | return 0 159 | else 160 | p "$NAME" e 161 | return 1 162 | fi 163 | elif [[ "$METHOD" == "npm" && "$(npm s $PACKAGE | grep "^$PACKAGE[\ ].*\$")" != "" ]]; then 164 | p "$NAME" 165 | npm install $PACKAGE >> $DIR/.install.log 2>>$DIR/.error.log 166 | return 0 167 | elif [[ "$METHOD" == "gem" && "$(gem list -r ^$PACKAGE\$ | grep $PACKAGE)" != "" ]]; then 168 | p "$NAME" 169 | gem install --quiet --silent $PACKAGE 2>>$DIR/.error.log 170 | return 0 171 | else 172 | p "$NAME" e 173 | return 1 174 | fi 175 | } 176 | 177 | ## (Y/N) 178 | prompt() 179 | { 180 | MESSAGE=$1 181 | while [ true ] 182 | do 183 | echo -e -n "$CYAN$MESSAGE (y/n): $RESET" 184 | read ans 185 | if [ "y" == $ans -o "Y" == $ans ] 186 | then 187 | return 1 188 | elif [ "n" == $ans -o "N" == $ans ] 189 | then 190 | return 0 191 | fi 192 | done 193 | } 194 | 195 | ## Welcome 196 | clear 197 | echo -e "$BLUE\r ______ __ ____ 198 | /_ __// /_ ___ / __ ) ____ _ __ 199 | / / / __ \ / _ \ / __ |/ __ \ | |/_/ 200 | / / / / / // __/ / /_/ // /_/ /_> < 201 | /_/ /_/ /_/ \___/ /_____/ \____//_/|_| 202 | " 203 | echo -e "\e[3m by Cycurity\e[0m" 204 | echo 205 | echo -e "$CYAN\rWelcome!$RESET" 206 | echo "" 207 | 208 | # Check if user has privileges 209 | if [ $(whoami) != "root" ]; then 210 | echo -e "$RED\rPlease run this script as root or using sudo!$RESET" 211 | exit 212 | fi 213 | 214 | # Check if user has internet connection 215 | if ! nc -zw1 google.com 443 >/dev/null 2>/dev/null; then 216 | echo -e "$RED\rNo connection. Please ensure that you have internet connection!$RESET" 217 | exit 218 | fi 219 | 220 | ## Set installation folder 221 | echo -e -n "$CYAN\rInstallation Folder:$RESET " 222 | read DIR 223 | echo "" 224 | while [ ! -d "$DIR" ] 225 | do 226 | echo -e "$RED\rThe selected folder does not exist" 227 | echo "" 228 | echo -e -n "$CYAN\rInstallation Folder:$RESET " 229 | read DIR 230 | echo 231 | done 232 | 233 | cd $DIR 234 | DIR=$(pwd) 235 | 236 | if [ ! -d "/home/$SUDO_USER/.local/bin" ]; then 237 | mkdir -p /home/$SUDO_USER/.local/bin 238 | fi 239 | 240 | 241 | ## Verify if apt or python-upgrade are running before the script 242 | if pgrep -x "apt" >> $DIR/.install.log 2>>$DIR/.error.log 243 | then 244 | echo -e "$YELLOW\rCannot proceed: apt is running!" 245 | prompt "Kill the process?" 246 | if [ $? == 1 ]; then 247 | pkill -9 -x "apt" 248 | echo "$CYAN\rProcess killed.$RESET" 249 | echo 250 | else 251 | echo -e "$RED\rExiting...$RESET" 252 | exit 253 | fi 254 | fi 255 | lines=`ps aux | grep -i "unattended-upgrade" | wc -l` 256 | if [ $lines -gt 1 ] 257 | then 258 | echo -e "$YELLOW\rCannot proceed: python unattended-upgrade is running!" 259 | prompt "Kill the process?" 260 | if [ $? == 1 ]; then 261 | pids=($(ps aux | grep -i "unattended-upgrade" | awk '{print $2}')) 262 | i="`expr $lines - 1`" 263 | j="0" 264 | while [[ $j -lt $i ]] 265 | do 266 | kill -9 ${pids[$j]} 267 | j=$j+1 268 | done 269 | echo -e "$CYAN\rProcess killed.$RESET" 270 | echo 271 | else 272 | echo -e "$RED\rExiting...$RESET" 273 | exit 274 | fi 275 | fi 276 | 277 | ## Verify if there is a GUI 278 | touch tmp 279 | touch tmp2 280 | session=`ls /usr/bin/*session | grep -i 'gnome\ |\ xfce\ |\ mate\ |\ cinnamon '` 281 | ls /usr/share/xsessions/ >tmp 2>>$DIR/.error.log 282 | type Xorg >tmp2 2>>$DIR/.error.log 283 | xsessions="`grep '/usr/share/xsessions' tmp`" 284 | xorg="`grep 'type' tmp2`" 285 | rm tmp 286 | rm tmp2 287 | if [ "$session" == "" ]; then 288 | if [ ! "$xsessions" == "" ]; then 289 | if [ ! "$xorg" == "" ]; then 290 | echo -e "$YELLOW\rGUI not found$RESET" 291 | prompt "Do you want to proceed with no GUI mode?" 292 | if [ $? == 1 ]; then 293 | GUI=false 294 | fi 295 | fi 296 | fi 297 | fi 298 | 299 | ## Pre-Info 300 | if [ $MINIMAL == true ]; then 301 | echo -e "$CYAN\rInstalling minimal tools.$RESET" 302 | TOOLS=`expr $TOOLS - $NOMINIMALTOOLS` 303 | 304 | fi 305 | if [ $GUI == false ]; then 306 | echo -e "$CYAN\rSkipping GUI tools.$RESET" 307 | TOOLS=`expr $TOOLS - $GUITOOLS` 308 | fi 309 | if [ $MINIMAL == true -o $GUI == false ]; then 310 | echo 311 | fi 312 | if [ $MINIMAL == true -a $GUI == false ]; then 313 | TOOLS=`expr $TOOLS + $GUINOMINIMALTOOLS` 314 | fi 315 | 316 | ## Fixing Linux Mint snapd installation 317 | if [ grep -i Mint "/etc/*-release" >> $DIR/.install.log 2>>$DIR/.error.log ]; then 318 | rm /etc/apt/preferences.d/nosnap.pref 319 | fi 320 | 321 | echo -e "$CYAN\r$TOOLS tools will be installed." 322 | echo 323 | 324 | ## Update system 325 | echo -e "$CYAN\rUpdating system..." 326 | apt-get -qq update >> $DIR/.install.log 2>>$DIR/.error.log 327 | apt-get -qq upgrade -y >> $DIR/.install.log 2>>$DIR/.error.log 328 | apt-get -qq dist-upgrade -y >> $DIR/.install.log 2>>$DIR/.error.log 329 | apt-get -qq autoremove -y >> $DIR/.install.log 2>>$DIR/.error.log 330 | 331 | ##Installing pre-requisites 332 | echo -e "$CYAN\rInstalling pre-requisites..." 333 | apt-get -qq purge -y apport >> $DIR/.install.log 2>>$DIR/.error.log 334 | apt-get -qq autoremove -y popularity-contest >> $DIR/.install.log 2>>$DIR/.error.log 335 | apt-get -qq install -y git >> $DIR/.install.log 2>>$DIR/.error.log 336 | apt-get -qq install -y net-tools >> $DIR/.install.log 2>>$DIR/.error.log 337 | apt-get -qq install -y curl >> $DIR/.install.log 2>>$DIR/.error.log 338 | apt-get -qq install -y build-essential >> $DIR/.install.log 2>>$DIR/.error.log 339 | apt-get -qq install -y systemd >> $DIR/.install.log 2>>$DIR/.error.log 340 | apt-get -qq install -y libpam-systemd >> $DIR/.install.log 2>>$DIR/.error.log 341 | apt-get -qq install -y make >> $DIR/.install.log 2>>$DIR/.error.log 342 | apt-get -qq install -y cmake >> $DIR/.install.log 2>>$DIR/.error.log 343 | apt-get -qq install -y snapd >> $DIR/.install.log 2>>$DIR/.error.log 344 | apt-get -qq install -y vim >> $DIR/.install.log 2>>$DIR/.error.log 345 | apt-get -qq install -y dkms >> $DIR/.install.log 2>>$DIR/.error.log 346 | apt-get -qq install -y gcc >> $DIR/.install.log 2>>$DIR/.error.log 347 | apt-get -qq install -y libcurl4 >> $DIR/.install.log 2>>$DIR/.error.log 348 | apt-get -qq install -y default-jre >> $DIR/.install.log 2>>$DIR/.error.log 349 | apt-get -qq install -y sqlite3 >> $DIR/.install.log 2>>$DIR/.error.log 350 | apt-get -qq install -y libcurl4-openssl-dev >> $DIR/.install.log 2>>$DIR/.error.log 351 | apt-get -qq install -y libssl-dev >> $DIR/.install.log 2>>$DIR/.error.log 352 | apt-get -qq install -y perl >> $DIR/.install.log 2>>$DIR/.error.log 353 | apt-get -qq install -y ruby-dev >> $DIR/.install.log 2>>$DIR/.error.log 354 | apt-get -qq install -y g++ >> $DIR/.install.log 2>>$DIR/.error.log 355 | apt-get -qq install -y libboost-all-dev >> $DIR/.install.log 2>>$DIR/.error.log 356 | apt-get -qq install -y qtbase5-dev >> $DIR/.install.log 2>>$DIR/.error.log 357 | apt-get -qq install -y python3 >> $DIR/.install.log 2>>$DIR/.error.log 358 | apt-get -qq install -y python3-pip >> $DIR/.install.log 2>>$DIR/.error.log 359 | apt-get -qq install -y libssl1.1 >> $DIR/.install.log 2>>$DIR/.error.log 360 | apt-get -qq install -y ruby >> $DIR/.install.log 2>>$DIR/.error.log 361 | apt-get -qq install -y p7zip-full >> $DIR/.install.log 2>>$DIR/.error.log 362 | apt-get -qq install -y p7zip-rar >> $DIR/.install.log 2>>$DIR/.error.log 363 | apt-get -qq install -y libxml2-utils >> $DIR/.install.log 2>>$DIR/.error.log 364 | apt-get -qq install -y libpcap >> $DIR/.install.log 2>>$DIR/.error.log 365 | apt-get -qq install -y libnet >> $DIR/.install.log 2>>$DIR/.error.log 366 | apt-get -qq install -y nodejs >> $DIR/.install.log 2>>$DIR/.error.log 367 | apt-get -qq install -y pipenv >> $DIR/.install.log 2>>$DIR/.error.log 368 | apt-get -qq install -y dh-autoreconf >> $DIR/.install.log 2>>$DIR/.error.log 369 | apt-get -qq install -y dos2unix >> $DIR/.install.log 2>>$DIR/.error.log 370 | apt-get -qq install -y python-dev python-setuptools libpcap0.8-dev libnetfilter-queue-dev libjpeg-dev libxml2-dev libxslt1-dev libcapstone3 libcapstone-dev libffi-dev file >> $DIR/.install.log 2>>$DIR/.error.log 371 | apt-get -qq install -y ldap-utils rwho rsh-client x11-apps finger >> $DIR/.install.log 2>>$DIR/.error.log 372 | apt-get -qq install -y python3-sqlalchemy python3-pyqt5 wkhtmltopdf >> $DIR/.install.log 2>>$DIR/.error.log 373 | apt-get -qq install -y python-tk tk-dev libffi-dev pandoc libgmp3-dev libzbar-dev tesseract-ocr xsel libpoppler-cpp-dev libmpc-dev libdbus-glib-1-dev libenchant-dev apktool groff tcpflow poppler-utils stegsnow bison libgd-dev less >> $DIR/.install.log 2>>$DIR/.error.log 374 | apt-get -qq install -y python3-m2crypto >> $DIR/.install.log 2>>$DIR/.error.log 375 | apt-get -qq install -y python3-venv >> $DIR/.install.log 2>>$DIR/.error.log 376 | apt-get -qq install -y libxml2 libxml2-dev libxslt1-dev libgmp-dev zlib1g-dev >> $DIR/.install.log 2>>$DIR/.error.log 377 | apt-get -qq install -y python-dnspython >> $DIR/.install.log 2>>$DIR/.error.log 378 | snap install --classic go >> $DIR/.install.log 2>>$DIR/.error.log 379 | export PATH="/home/$SUDO_USER/.local/bin:$PATH" 380 | export PYTHONWARNINGS="ignore" 381 | python3 -m pip install -q yara-python >> $DIR/.install.log 2>>$DIR/.error.log 382 | python3 -m pip install -q capstone >> $DIR/.install.log 2>>$DIR/.error.log 383 | python3 -m pip install -q pefile >> $DIR/.install.log 2>>$DIR/.error.log 384 | python3 -m pip install -q setuptools >> $DIR/.install.log 2>>$DIR/.error.log 385 | wget -q https://bootstrap.pypa.io/pip/2.7/get-pip.py -O get-pip.py 386 | python2 get-pip.py >> $DIR/.install.log 2>>$DIR/.error.log 387 | rm get-pip.py 388 | #w3af 389 | apt-get -qq install -y graphviz >> $DIR/.install.log 2>>$DIR/.error.log 390 | apt-get -qq install -y npm >> $DIR/.install.log 2>>$DIR/.error.log 391 | apt-get -qq install -y libxslt-dev lib32ncurses5-dev >> $DIR/.install.log 2>>$DIR/.error.log 392 | #golismero 393 | apt-get -qq install -y python2.7 python2.7-dev python-docutils >> $DIR/.install.log 2>>$DIR/.error.log 394 | #bettercap 395 | apt-get -qq install -y libnetfilter-queue-dev libnetfilter-queue1 >> $DIR/.install.log 2>>$DIR/.error.log 396 | /sbin/ldconfig -v >> $DIR/.install.log 2>>$DIR/.error.log 397 | #jd-gui 398 | apt-get -qq install -y libcanberra-gtk-module libcanberra-gtk3-module >> $DIR/.install.log 2>>$DIR/.error.log 399 | #angry ip scanner 400 | apt-get -qq install -y openjdk-11-jdk rpm fakeroot wine-stable >> $DIR/.install.log 2>>$DIR/.error.log 401 | #catphish 402 | apt-get -qq install -y ruby-bundler >> $DIR/.install.log 2>>$DIR/.error.log 403 | #wifiphisher 404 | apt-get -qq install -y libnl-3-dev libnl-genl-3-dev >> $DIR/.install.log 2>>$DIR/.error.log 405 | #john the ripper (jumbo) 406 | apt-get -qq install -y yasm pkg-config libpcap-dev libbz2-dev >> $DIR/.install.log 2>>$DIR/.error.log 407 | apt-get -qq install -y nvidia-opencl-dev >> $DIR/.install.log 2>>$DIR/.error.log 408 | apt-get -qq install -y ocl-icd-opencl-dev opencl-headers fglrx-dev >> $DIR/.install.log 2>>$DIR/.error.log 409 | apt-get -qq install -y pocl-opencl-icd >> $DIR/.install.log 2>>$DIR/.error.log 410 | 411 | ##Inititate progress bar 412 | #if [ $QUIET == false ]; then 413 | # enable_trapping 414 | # setup_scroll_area 415 | #fi 416 | 417 | ## MISC 418 | echo "" 419 | echo -e "$CYAN\rInstalling Miscellaneous tools..." 420 | mkdir $DIR/Misc 421 | cd $DIR/Misc 422 | 423 | if [ $GUI ]; then 424 | p "Sublime Text 3" a b 425 | wget -qO - https://download.sublimetext.com/sublimehq-pub.gpg | apt-key add - >> $DIR/.install.log 2>>$DIR/.error.log 426 | apt-get -qq install apt-transport-https -y >> $DIR/.install.log 2>>$DIR/.error.log 427 | echo -e "deb https://download.sublimetext.com/ apt/stable/" | tee /etc/apt/sources.list.d/sublime-text.list >> $DIR/.install.log 2>>$DIR/.error.log 428 | apt-get -qq update >> $DIR/.install.log 2>>$DIR/.error.log 429 | apt-get -qq install -y sublime-text >> $DIR/.install.log 2>>$DIR/.error.log 430 | mv /opt/sublime_text $DIR/Misc >> $DIR/.install.log 2>>$DIR/.error.log 431 | rm /usr/bin/subl >> $DIR/.install.log 2>>$DIR/.error.log 432 | ln -s $DIR/Misc/sublime_text/sublime_text /usr/bin/subl >> $DIR/.install.log 2>>$DIR/.error.log 433 | 434 | download "xfreerdp" apt xfreerdp 435 | download "Remmina" apt remmina && apt-get -qq install -y remmina-common >> $DIR/.install.log 2>>$DIR/.error.log 436 | fi 437 | 438 | download "Apache2" apt apache2 439 | download "Lynx" apt lynx 440 | download "SMB Client" apt smbclient 441 | download "Telnet" apt telnet && apt-get -qq install -y telnetd inetutils-telnetd inetutils-telnet >> $DIR/.install.log 2>>$DIR/.error.log 442 | download "SSH & SFTP" apt ssh && apt-get -qq install -y openssh-client openssh-sftp-server openssh-server >> $DIR/.install.log 2>>$DIR/.error.log 443 | download "Docker" apt docker && apt-get -qq install -y docker-compose docker.io >> $DIR/.install.log 2>>$DIR/.error.log 444 | 445 | if [ $MINIMAL == false ]; then 446 | 447 | download "webshells" git https://github.com/BlackArch/webshells 448 | 449 | if [ $GUI ]; then 450 | p "Visual Studio Code" 451 | snap install --classic code >> $DIR/.install.log 2>>$DIR/.error.log 452 | 453 | download "Guake Terminal" apt guake 454 | 455 | p "Tor Browser" a b 456 | echo | add-apt-repository ppa:micahflee/ppa >> $DIR/.install.log 2>>$DIR/.error.log 457 | apt-get -qq update >> $DIR/.install.log 2>>$DIR/.error.log 458 | apt-get -qq install -y torbrowser-launcher >> $DIR/.install.log 2>>$DIR/.error.log 459 | 460 | download "VNC Viewer" apt vncviewer && apt-get -qq install -y tigervnc-viewer >> $DIR/.install.log 2>>$DIR/.error.log 461 | download "freerdp-x11" apt freerdp-x11 && apt-get -qq install -y freerdp2-x11 >> $DIR/.install.log 2>>$DIR/.error.log 462 | fi 463 | 464 | download "Bulk Downloader for Reddit" git https://github.com/aliparlakci/bulk-downloader-for-reddit && cd bulk-downloader-for-reddit && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Misc 465 | download "ffmpeg" apt ffmpeg 466 | download "CAN utils" apt "can-utils" 467 | download "ngrok" wget "https://bin.equinox.io/c/4VmDzA7iaHb/ngrok-stable-linux-amd64.zip" && unzip -qq "ngrok-stable-linux-amd64.zip" >> $DIR/.install.log; rm "ngrok-stable-linux-amd64.zip" && ln -s $DIR/Misc/ngrok /usr/bin/ngrok 468 | download "youtube_dl" pip3 youtube_dl 469 | download "WlCreator" git https://github.com/Keshav2136/wlcreator; cd wlcreator; gcc -o wlcreator wlcreator.c >> $DIR/.install.log 2>>$DIR/.error.log; ln -s $DIR/Misc/wlcreator /usr/bin/wlcreator; cd $DIR/Misc 470 | download "Crunch" apt crunch 471 | download "Cewl" apt cewl 472 | download "GoClone" git https://github.com/imthaghost/goclone; cd goclone/cmd/goclone; go install >> $DIR/.install.log 2>>$DIR/.error.log; cd $DIR/Misc 473 | download "MDB Tools" apt mdbtools 474 | download "BPython" pip3 bpython 475 | fi 476 | 477 | 478 | 479 | ## Social Engineering 480 | if [ $QUIET == false ]; then 481 | echo "" 482 | fi 483 | echo -e "$CYAN\rInstalling Social Engineering tools..." 484 | mkdir $DIR/Social\ Engineering 485 | cd $DIR/Social\ Engineering 486 | 487 | download "NexPhisher" git https://github.com/htr-tech/nexphisher && cd nexphisher && ./setup >> $DIR/.install.log 2>>$DIR/.error.log; ln -s $DIR/Social\ Engineering/nexphisher/nexphisher /usr/bin/nexphisher; cd $DIR/Social\ Engineering 488 | download "The Social-Engineer Toolkit (SET)" git https://github.com/trustedsec/social-engineer-toolkit && mv social-engineer-toolkit setoolkit && cd setoolkit && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && python3 setup.py >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Social\ Engineering 489 | download "CATPHISH" git https://github.com/ring0lab/catphish && cd catphish && bundle install >> $DIR/.install.log 2>>$DIR/.error.log; ln -s $DIR/Social\ Engineering/catphish/catphish.rb /usr/bin/catphish; cd $DIR/Social\ Engineering 490 | download "wifiphisher" git https://github.com/wifiphisher/wifiphisher && cd wifiphisher && python3 setup.py install >> $DIR/.install.log 2>>$DIR/.error.log && chmod +x $DIR/Social\ Engineering/wifiphisher/wifiphisher/pywifiphisher.py && ln -s $DIR/Social\ Engineering/wifiphisher/wifiphisher/pywifiphisher.py /usr/bin/wifiphisher && cd $DIR/Social\ Engineering 491 | download "roguehostapd" git https://github.com/wifiphisher/roguehostapd && cd roguehostapd && python3 setup.py install >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Social\ Engineering 492 | 493 | if [ $MINIMAL == false ]; then 494 | download "Zphisher" git https://github.com/htr-tech/zphisher && ln -s $DIR/Social\ Engineering/zphisher/zphisher.sh /usr/bin/zphisher 495 | download "Seeker" git https://github.com/thewhiteh4t/seeker && python3 -m pip install -q requests >> $DIR/.install.log 2>>$DIR/.error.log 496 | download "King Phisher" wget https://github.com/securestate/king-phisher/raw/master/tools/install.sh && chmod +x install.sh && echo 1 | ./install.sh -y >> $DIR/.install.log 2>>$DIR/.error.log; rm install.sh && mv /opt/king-phisher $DIR/Social\ Engineering 497 | fi 498 | 499 | if [ $GUI ]; then 500 | download "Gophish" wget https://github.com/gophish/gophish/releases/download/v0.11.0/gophish-v0.11.0-linux-64bit.zip && mv gophish-v0.11.0-linux-64bit.zip gophish.zip && mkdir gophish && mv gophish.zip gophish && cd gophish && unzip -qq gophish.zip >> $DIR/.install.log && rm gophish.zip && chmod +x gophish && ln -s $DIR/Misc/gophish/gophish /usr/bin/gophish && cd $DIR/Misc 501 | fi 502 | 503 | 504 | 505 | ## Enumeration 506 | if [ $QUIET == false ]; then 507 | echo "" 508 | fi 509 | echo -e "$CYAN\rInstalling Enumeration tools..." 510 | mkdir $DIR/Enumeration 511 | cd $DIR/Enumeration 512 | 513 | ### Fuzzers 514 | mkdir $DIR/Enumeration/Fuzzers 515 | cd $DIR/Enumeration/Fuzzers 516 | 517 | download "wfuzz" pip3 wfuzz 518 | download "GoBuster" wget https://github.com/OJ/gobuster/releases/download/v3.1.0/gobuster-linux-amd64.7z && 7z x "gobuster-linux-amd64.7z" >> $DIR/.install.log 2>>$DIR/.error.log; rm "gobuster-linux-amd64.7z" && cd "gobuster-linux-amd64" && chmod +x gobuster && mv gobuster /usr/bin/gobuster && cd ..; rm -rf "gobuster-linux-amd64" && cd $DIR/Enumeration/Fuzzers 519 | download "Dirb" apt dirb 520 | 521 | p "SubFinder" a e 522 | GO111MODULE=on go get -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder >> $DIR/.install.log 2>>$DIR/.error.log 523 | 524 | if [ $MINIMAL == false ]; then 525 | download "ffuf" wget https://github.com/ffuf/ffuf/releases/download/v1.3.0/ffuf_1.3.0_linux_amd64.tar.gz && mkdir ffuf && mv ffuf_1.3.0_linux_amd64.tar.gz ffuf && cd ffuf && gunzip -d ffuf_1.3.0_linux_amd64.tar.gz && 7z x ffuf_1.3.0_linux_amd64.tar >> $DIR/.install.log 2>>$DIR/.error.log; rm ffuf_1.3.0_linux_amd64.tar && chmod +x ffuf && ln -s $DIR/Enumeration/Fuzzers/ffuf/ffuf /usr/bin/ffuf && cd $DIR/Enumeration/Fuzzers 526 | download "MassDNS" git https://github.com/blechschmidt/massdns 527 | download "Async DNS Brute" pip3 aiodnsbrute 528 | download "OneForAll" git https://github.com/shmilylty/OneForAll && python3 -m pip install -q testresources >> $DIR/.install.log 2>>$DIR/.error.log && cd OneForAll && python3 -m pip install -U pip setuptools wheel -i https://mirrors.aliyun.com/pypi/simple/ >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -r requirements.txt -i https://mirrors.aliyun.com/pypi/simple/ >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Enumeration/Fuzzers 529 | 530 | if [ $GUI ]; then 531 | download "Dirbuster" git https://gitlab.com/kalilinux/packages/dirbuster && cd dirbuster; rm DirBuster-1.0-RC1.sh && echo -e "#!/bin/bash" >DirBuster-1.0-RC1.sh && echo -e "java -Xmx256M -jar $(pwd)/DirBuster-1.0-RC1.jar" >DirBuster-1.0-RC1.sh && chmod +x $DIR/Enumeration/Fuzzers/dirbuster/DirBuster-1.0-RC1.sh && ln -s $DIR/Enumeration/Fuzzers/dirbuster/DirBuster-1.0-RC1.sh /usr/bin/dirbuster && cd $DIR/Enumeration/Fuzzers 532 | fi 533 | fi 534 | 535 | ### Scanners 536 | mkdir $DIR/Enumeration/Scanners 537 | cd $DIR/Enumeration/Scanners 538 | 539 | download "enum4linux" git https://github.com/CiscoCXSecurity/enum4linux && mv $DIR/Enumeration/Scanners/enum4linux/enum4linux.pl $DIR/Enumeration/Scanners && ln -s $DIR/Enumeration/Scanners/enum4linux.pl /usr/bin/enum4linux && rm -r $DIR/Enumeration/Scanners/enum4linux >> $DIR/.install.log 2>>$DIR/.error.log; cd $DIR/Enumeration/Scanners 540 | download "SMBMap" apt smbmap 541 | download "SQLMap" apt sqlmap 542 | download "WPScan" gem wpscan 543 | download "NBTScan" apt nbtscan 544 | download "Nmap" apt nmap 545 | download "DNSMap" apt dnsmap 546 | download "Nikto" apt nikto 547 | 548 | if [ $MINIMAL == false ]; then 549 | download "Rust Scan" wget https://github.com/RustScan/RustScan/releases/download/2.0.1/rustscan_2.0.1_amd64.deb && dpkg -i rustscan_2.0.1_amd64.deb >> $DIR/.install.log 2>>$DIR/.error.log; rm rustscan_2.0.1_amd64.deb 550 | download "Fierce" git https://gitlab.com/kalilinux/packages/fierce && ln -s $DIR/Enumeration/Scanners/fierce/fierce.pl /usr/bin/fierce 551 | download "AngularJS CSTI Scanner" pip3 https://github.com/tijme/angularjs-csti-scanner/archive/master.zip 552 | download "DNSEnum" apt dnsenum 553 | download "DNSRecon" git https://github.com/darkoperator/dnsrecon && cd dnsrecon && python3 setup.py install >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Enumeration/Scanners 554 | download "Masscan" git https://github.com/robertdavidgraham/masscan && cd masscan && make >> $DIR/.install.log 2>>$DIR/.error.log && make install >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Enumeration/Scanners 555 | download "XanXSS" git https://github.com/Ekultek/XanXSS && cd XanXSS && pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Enumeration/Scanners 556 | download "W3af" git https://github.com/andresriancho/w3af && cd w3af && wget -q http://archive.ubuntu.com/ubuntu/pool/universe/p/pygtk/python-gtk2_2.24.0-5.1ubuntu2_amd64.deb; sudo apt-get install -y ./python-gtk2_2.24.0-5.1ubuntu2_amd64.deb >> $DIR/.install.log 2>>$DIR/.error.log; npm install -g retire@2.0.3 >> $DIR/.install.log 2>>$DIR/.error.log; npm update -g retire >> $DIR/.install.log 2>>$DIR/.error.log; pip install -q pygtk >> $DIR/.install.log 2>>$DIR/.error.log && pip install -q pyClamd==0.4.0 PyGithub==1.21.0 GitPython==2.1.15 pybloomfiltermmap==0.3.14 phply==0.9.1 nltk==3.0.1 chardet==3.0.4 tblib==0.2.0 pdfminer==20140328 futures==3.2.0 pyOpenSSL==18.0.0 ndg-httpsclient==0.4.0 pyasn1==0.4.2 lxml==3.4.4 scapy==2.4.0 guess-language==0.2 cluster==1.1.1b3 msgpack==0.5.6 python-ntlm==1.0.1 halberd==0.2.4 darts.util.lru==0.5 Jinja2==2.10 vulndb==0.1.1 markdown==2.6.1 psutil==5.4.8 ds-store==1.1.2 termcolor==1.1.0 mitmproxy==0.13 ruamel.ordereddict==0.4.8 Flask==0.10.1 PyYAML==3.12 tldextract==1.7.2 pebble==4.3.8 acora==2.1 esmre==0.3.1 diff-match-patch==20121119 bravado-core==5.15.0 lz4==1.1.0 vulners==1.3.0 ipaddresses==0.0.2 subprocess32==3.5.4 xdot==0.6 >> $DIR/.install.log 2>>$DIR/.error.log; ln -s $DIR/Enumeration/Scanners/w3af/w3af_console /usr/bin/w3af; cd $DIR/Enumeration/Scanners 557 | download "Golismero" git https://github.com/golismero/golismero && cd golismero && wget http://ftp.br.debian.org/debian/pool/main/s/sslscan/sslscan_2.0.7-1_amd64.deb -q -O sslscan.deb && dpkg -i sslscan.deb >> $DIR/.install.log 2>>$DIR/.error.log && pip install -q -r requirements_unix.txt >> $DIR/.install.log 2>>$DIR/.error.log && ln -s ${PWD}/golismero.py /usr/bin/golismero && cd $DIR/Enumeration/Scanners 558 | download "Joomscan" git https://github.com/OWASP/joomscan && cd joomscan && dos2unix joomscan.pl >> $DIR/.install.log 2>>$DIR/.error.log && ln -s $DIR/Enumeration/Scanners/joomscan/joomscan.pl /usr/bin/joomscan && cd $DIR/Enumeration/Scanners 559 | download "Droopescan" pip3 droopescan 560 | 561 | if [ $GUI ]; then 562 | download "OWASP ZAP" wget https://download.opensuse.org/repositories/home:/cabelo/xUbuntu_21.04/amd64/owasp-zap_2.10.0-1_amd64.deb && apt -qq install -y ./owasp-zap_2.10.0-1_amd64.deb >> $DIR/.install.log 2>>$DIR/.error.log; rm owasp-zap_2.10.0-1_amd64.deb 563 | download "BloodHound" wget https://github.com/BloodHoundAD/BloodHound/releases/download/4.0.2/BloodHound-linux-x64.zip && unzip -qq BloodHound*.zip >> $DIR/.install.log; rm BloodHound*.zip && mv BloodHound* BloodHound 564 | fi 565 | fi 566 | 567 | 568 | 569 | ## Exploitation 570 | if [ $QUIET == false ]; then 571 | echo "" 572 | fi 573 | echo -e "$CYAN\rInstalling Exploitation tools..." 574 | mkdir $DIR/Exploitation 575 | cd $DIR/Exploitation 576 | 577 | download "Metasploit" wget https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb >> $DIR/.install.log 2>>$DIR/.error.log && mv msfupdate.erb msfinstall && chmod 755 msfinstall && ./msfinstall >> $DIR/.install.log 2>>$DIR/.error.log && ln -s /opt/metasploit-framework /usr/share/metasploit-framework && ln -s /opt/metasploit-framework $DIR/Exploitation; rm msfinstall && cd $DIR/Exploitation 578 | download "Exploitdb" wget https://http.kali.org/pool/main/e/exploitdb/exploitdb_20210730-0kali1_all.deb && dpkg -i exploitdb_20210730-0kali1_all.deb >> $DIR/.install.log 2>>$DIR/.error.log; rm exploitdb_20210730-0kali1_all.deb && cd $DIR/Exploitation 579 | 580 | if [ $GUI ]; then 581 | download "Burpsuite" wget "https://portswigger.net/burp/releases/download?product=community&version=2021.5&type=Linux" && mv downloa* burp.sh && chmod +x burp.sh && echo "/usr/bin" | echo | echo "$DIR/Exploitation/BurpSuiteCommunity" | echo | ./burp.sh -c >> $DIR/.install.log 2>>$DIR/.error.log; rm burp.sh 582 | fi 583 | 584 | if [ $MINIMAL == false ]; then 585 | if [ $GUI ]; then 586 | p "Venom" a b 587 | 588 | download "Bettercap" wget https://github.com/bettercap/bettercap/releases/download/v2.31.0/bettercap_linux_amd64_v2.31.0.zip && unzip -qq bettercap_linux_amd64_v2.31.0.zip && mv bettercap /usr/bin/bettercap; rm *.sha256; rm bettercap_linux_amd64_v2.31.0.zip 589 | download "BeEF" git https://github.com/beefproject/beef && echo y | echo y | echo y | beef/install >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Exploitation 590 | 591 | #p "Veil" 592 | #git clone -q https://github.com/Veil-Framework/Veil.git 593 | #cd Veil/ 594 | #echo -e "/usr/bin/" | ./config/setup.sh --force --silent >> $DIR/.install.log 2>>$DIR/.error.log 595 | #cd $DIR/Exploitation 596 | fi 597 | 598 | download "PRET" git https://github.com/RUB-NDS/PRET && pip install -q colorama pysnmp >> $DIR/.install.log 2>>$DIR/.error.log 599 | download "CME: CrackMapExec" git https://github.com/byt3bl33d3r/CrackMapExec && python3 -m pip install -q -r CrackMapExec/requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -q pipx >> $DIR/.install.log 2>>$DIR/.error.log && pipx install crackmapexec >> $DIR/.install.log 2>>$DIR/.error.log && mv /root/.local/bin/cme /root/.local/bin/cmedb /root/.local/bin/crackmapexec /home/$SUDO_USER/.local/bin >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Exploitation 600 | download "MITMf" git https://github.com/byt3bl33d3r/MITMf && cd MITMf && git submodule init >> $DIR/.install.log 2>>$DIR/.error.log && git submodule update --recursive >> $DIR/.install.log 2>>$DIR/.error.log && pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Exploitation 601 | download "SPARTA" git https://github.com/SECFORCE/sparta && ln -s $DIR/Exploitation/sparta /usr/share/sparta && chmod +x sparta/sparta && cp sparta/sparta /usr/bin/sparta && cd $DIR/Exploitation 602 | download "RouterSploit" git https://www.github.com/threat9/routersploit && cd routersploit && sudo python3 setup.py install >> $DIR/.install.log 2>>$DIR/.error.log && sudo ln -s rsf.py /usr/bin/rsf && cd $DIR/Exploitation 603 | download "Unicorn" git https://github.com/trustedsec/unicorn 604 | download "Xerxes (C)" git https://github.com/XCHADXFAQ77X/XERXES && cd XERXES && gcc -o xerxes xerxes.c && ln -s $DIR/Exploitation/XERXES/xerxes /usr/bin/xerxes && cd $DIR/Exploitation 605 | download "Xerxes (C++)" git https://github.com/sepehrdaddev/Xerxes && cd Xerxes && mkdir build && git submodule update --init --recursive >> $DIR/.install.log 2>>$DIR/.error.log && cd build && cmake .. >> $DIR/.install.log 2>>$DIR/.error.log && make >> $DIR/.install.log 2>>$DIR/.error.log && ln -s $DIR/Exploitation/Xerxes/build/bin/Xerxes /usr/bin/Xerxes && cd $DIR/Exploitation 606 | download "sslstrip2" git https://github.com/byt3bl33d3r/sslstrip2 607 | fi 608 | 609 | 610 | 611 | ### Post-Exploitation 612 | if [ $QUIET == false ]; then 613 | echo "" 614 | fi 615 | echo -e "$CYAN\rInstalling Post-Exploitation tools..." 616 | mkdir "$DIR/Post-Exploitation" 617 | cd "$DIR/Post-Exploitation" 618 | 619 | download "mimikatz" git https://github.com/gentilkiwi/mimikatz 620 | download "nishang" git https://github.com/samratashok/nishang 621 | download "PEASS" git https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite 622 | download "Windows Exploit Suggester" git https://github.com/AonCyberLabs/Windows-Exploit-Suggester 623 | download "Linux Exploit Suggester" git https://github.com/InteliSecureLabs/Linux_Exploit_Suggester 624 | download "LinEnum" wget https://raw.githubusercontent.com/rebootuser/LinEnum/master/LinEnum.sh 625 | download "Linux Smart Enumeration" wget https://raw.githubusercontent.com/diego-treitos/linux-smart-enumeration/master/lse.sh 626 | 627 | if [ $MINIMAL == false ]; then 628 | download "Firefox Decrypt" git https://github.com/unode/firefox_decrypt 629 | download "Merlin" wget https://github.com/Ne0nd0g/merlin/releases/download/v1.0.0/merlinServer-Linux-x64.7z && mkdir Merlin && mv merlinServer* Merlin && cd Merlin && 7z x -p"merlin" merlinServer-Linux-x64.7z >> $DIR/.install.log 2>>$DIR/.error.log; rm merlinServer-Linux-x64.7z && cd "$DIR/Post-Exploitation" 630 | download "SSH-Backdoor" git https://github.com/NinjaJc01/ssh-backdoor 631 | download "Weevely" apt weevely 632 | download "Dumper" git https://github.com/fssecur3/dumper 633 | download "Keylogger" git https://github.com/aydinnyunus/Keylogger 634 | download "Postenum" git https://github.com/mostaphabahadou/postenum 635 | download "LES: Linux Privilege Escalation Auditing Tool" wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh && mv linux-exploit-suggester.sh les.sh 636 | download "mimikittenz" git https://github.com/orlyjamie/mimikittenz 637 | download "SILENTTRINITY" git https://github.com/byt3bl33d3r/SILENTTRINITY && cd SILENTTRINITY && python3 -m pip install -q --user pipenv >> $DIR/.install.log 2>>$DIR/.error.log && pipenv install >> $DIR/.install.log 2>>$DIR/.error.log && cd "$DIR/Post-Exploitation" 638 | download "Empire" docker empireproject/empire 639 | download "Sherlock" git https://github.com/rasta-mouse/Sherlock 640 | download "Watson" git https://github.com/rasta-mouse/Watson 641 | download "JAWS" git https://github.com/411Hall/JAWS 642 | download "Seatbelt" git https://github.com/GhostPack/Seatbelt 643 | download "impacket" git https://github.com/SecureAuthCorp/impacket && python3 -m pip install -q -r impacket/requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log 644 | download "PowerSploit" git https://github.com/PowerShellMafia/PowerSploit 645 | download "VirusTotalAPI" git https://github.com/doomedraven/VirusTotalApi && cd "$DIR/Post-Exploitation/VirusTotalApi" && pip install -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && python setup.py install >> $DIR/.install.log 2>>$DIR/.error.log && cd "$DIR/Post-Exploitation" 646 | download "Simple Keylogger" git https://github.com/GiacomoLaw/Keylogger 647 | fi 648 | 649 | 650 | 651 | ## Reverse Engineering 652 | if [ $QUIET == false ]; then 653 | echo "" 654 | fi 655 | echo -e "$CYAN\rInstalling Reverse Engineering tools..." 656 | mkdir "$DIR/Reverse Engineering" 657 | cd "$DIR/Reverse Engineering" 658 | 659 | download "radare2" apt radare2 660 | download "ltrace" apt ltrace 661 | download "strace" apt strace 662 | download "objdump" apt binutils 663 | download "gdb" apt gdb 664 | 665 | if [ $MINIMAL == false ]; then 666 | mkdir frida && cd frida 667 | python3 -m pip -q install frida-tools >> $DIR/.install.log 2>>$DIR/.error.log 668 | download "Frida" pip3 frida 669 | npm install frida >> $DIR/.install.log 2>>$DIR/.error.log 670 | cd "$DIR/Reverse Engineering" 671 | 672 | if [ $GUI ]; then 673 | download "bless" apt bless 674 | 675 | valid "https://out7.hex-rays.com/files/idafree76_linux.run" 676 | if [ $? == 1 ]; then 677 | p "IDA" 678 | else 679 | p "IDA" e 680 | fi 681 | 682 | download "JD-GUI" wget https://github.com/java-decompiler/jd-gui/releases/download/v1.6.6/jd-gui-1.6.6.deb && mv jd-gui* jd-gui.deb && dpkg -i jd-gui.deb >> $DIR/.install.log 2>>$DIR/.error.log; rm jd-gui.deb && mv /opt/jd-gui "$DIR/Reverse Engineering/" && cd jd-gui && touch jd-gui && echo "#!/bin/bash" > jd-gui && echo >> jd-gui && echo "java -jar $DIR/Reverse Engineering/jd-gui/jd-gui.jar" >> jd-gui && chmod +x jd-gui && ln -s "$DIR/Reverse Engineering/jd-gui/jd-gui" /usr/bin/jd-gui && cd "$DIR/Reverse Engineering" 683 | fi 684 | fi 685 | 686 | 687 | 688 | ## Cracking 689 | if [ $QUIET == false ]; then 690 | echo "" 691 | fi 692 | echo -e "$CYAN\rInstalling Cracking tools..." 693 | mkdir "$DIR/Cracking" 694 | cd "$DIR/Cracking" 695 | 696 | download "THC Hydra" apt hydra && apt-get -qq install -y hydra-gtk >> $DIR/.install.log 2>>$DIR/.error.log 697 | 698 | p "John The Ripper" 699 | git clone -q https://github.com/openwall/john.git -b bleeding-jumbo john 700 | cd john/src 701 | ./configure >> $DIR/.install.log 2>>$DIR/.error.log && make -s clean && make -sj4 >> $DIR/.install.log 2>>$DIR/.error.log 702 | echo "alias john=$DIR/Cracking/john/run/john" >> /home/$SUDO_USER/.bash_aliases 703 | cd $DIR/Cracking 704 | 705 | download "hashcat" apt hashcat 706 | download "hash-identifier" git https://github.com/blackploit/hash-identifier 707 | download "hash-id" apt hashid 708 | 709 | if [ $MINIMAL == false ]; then 710 | download "StegBrute" wget https://github.com/R4yGM/stegbrute/releases/download/0.1.1/stegbrute_0.1.1_amd64.deb && apt-get -qq install -y ./stegbrute_0.1.1_amd64.deb >> $DIR/.install.log 2>>$DIR/.error.log; rm stegbrute_0.1.1_amd64.deb 711 | download "StegSeek" wget https://github.com/RickdeJager/stegseek/releases/download/v0.6/stegseek_0.6-1.deb && apt-get -qq install -y ./stegseek_0.6-1.deb >> $DIR/.install.log 2>>$DIR/.error.log; rm stegseek_0.6-1.deb && cd $DIR/Cracking 712 | download "Wifi-Cracker" git https://github.com/fssecur3/wifi-cracker && cd wifi-cracker && chmod +x wifi-cracker.py && ln -s $DIR/Cracking/wifi-cracker/wifi-cracker.py /usr/bin/wifi-cracker && cd $DIR/Cracking 713 | download "Crowbar" git https://github.com/galkan/crowbar && python3 -m pip install -q -r crowbar/requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log 714 | download "ophcrack (CLI)" apt ophcrack-cli 715 | 716 | if [ $GUI ]; then 717 | download "ophcrack (GUI)" apt ophcrack 718 | fi 719 | fi 720 | 721 | 722 | 723 | ## Wifi Hacking 724 | if [ $QUIET == false ]; then 725 | echo "" 726 | fi 727 | echo -e "$CYAN\rInstalling Wifi Hacking tools..." 728 | mkdir "$DIR/Wifi Hacking" 729 | cd "$DIR/Wifi Hacking" 730 | 731 | p "airgeddon" a b 732 | git clone -q --depth 1 https://github.com/v1s1t0r1sh3r3/airgeddon.git 733 | 734 | download "aircrack-ng" apt "aircrack-ng" 735 | download "Wifite 2" git https://github.com/derv82/wifite2 && cd wifite2 && python3 setup.py install >> $DIR/.install.log 2>>$DIR/.error.log 736 | download "reaver" apt reaver 737 | 738 | p "kismet" a b 739 | DEBIAN_FRONTEND=noninteractive DEBIAN_PRIORITY=critical apt-get -qq -y --force-yes -o "Dpkg::Options::=--force-confdef" -o "Dpkg::Options::=--force-confold" install kismet >> $DIR/.install.log 2>>$DIR/.error.log && apt-get -qq install -y kismet-plugins >> $DIR/.install.log 2>>$DIR/.error.log && apt-get -qq install --ignore-missing -y kismet-core kismet-capture-linux-bluetooth kismet-capture-linux-wifi kismet-capture-nrf-mousejack python-kismetcapturertl433 python-kismetcapturertladsb python-kismetcapturertlamr python-kismetcapturefreaklabszigbee kismet-logtools >> $DIR/.install.log 2>>$DIR/.error.log 740 | 741 | 742 | 743 | ## Networking 744 | if [ $QUIET == false ]; then 745 | echo "" 746 | fi 747 | echo -e "$CYAN\rInstalling Networking tools..." 748 | mkdir $DIR/Networking 749 | cd $DIR/Networking 750 | 751 | download "netcat" apt netcat 752 | download "tcpdump" apt tcpdump 753 | download "dsniff" apt dsniff 754 | download "netdiscover" apt netdiscover 755 | 756 | p "tshark" a b 757 | DEBIAN_FRONTEND=noninteractive DEBIAN_PRIORITY=critical apt-get -qq -y --force-yes -o "Dpkg::Options::=--force-confdef" -o "Dpkg::Options::=--force-confold" install tshark >> $DIR/.install.log 2>>$DIR/.error.log 758 | 759 | if [ $GUI ]; then 760 | download "Wireshark" apt wireshark 761 | fi 762 | 763 | if [ $MINIMAL == false ]; then 764 | download "hping3" apt hping3 765 | download "Scapy" git https://github.com/secdev/scapy 766 | download "arping" apt arping 767 | download "sslsplit" apt sslsplit 768 | download "Wifi Jammer" git https://github.com/DanMcInerney/wifijammer && cd wifijammer && python2 setup.py install >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Networking 769 | download "dns2proxy" git https://github.com/LeonardoNve/dns2proxy && pip install -q dnspython >> $DIR/.install.log 2>>$DIR/.error.log && pip install -q pcapy >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Networking/dns2proxy && chmod +x ./install.sh && ./install.sh >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Networking 770 | download "Ettercap (CLI)" apt ettercap-common && apt-get -qq install -y ettercap-text-only >> $DIR/.install.log 2>>$DIR/.error.log 771 | 772 | p "macchanger" a b 773 | DEBIAN_FRONTEND=noninteractive DEBIAN_PRIORITY=critical apt-get -qq -y -o "Dpkg::Options::=--force-confdef" -o "Dpkg::Options::=--force-confold" install macchanger >> $DIR/.install.log 2>>$DIR/.error.log 774 | 775 | p "Speedtest CLI" 776 | curl -s https://install.speedtest.net/app/cli/install.deb.sh | sudo bash >> $DIR/.install.log 2>>$DIR/.error.log 777 | sudo apt-get install speedtest >> $DIR/.install.log 2>>$DIR/.error.log 778 | 779 | if [ $GUI ]; then 780 | download "Ettercap (GUI)" apt ettercap-graphical 781 | download "Angry IP Scanner" wget https://github.com/angryip/ipscan/releases/download/3.7.6/ipscan_3.7.6_amd64.deb && mv ipscan_3.7.6_amd64.deb ipscan.deb && dpkg -i ipscan.deb >> $DIR/.install.log 2>>$DIR/.error.log; rm ipscan.deb 782 | fi 783 | fi 784 | 785 | 786 | 787 | ## OSINT 788 | if [ $QUIET == false ]; then 789 | echo "" 790 | fi 791 | echo -e "$CYAN\rInstalling OSINT tools..." 792 | mkdir $DIR/OSINT 793 | cd $DIR/OSINT 794 | 795 | download "Recon-NG" git https://github.com/lanmaster53/recon-ng && cd recon-ng && python3 -m pip install -q -r REQUIREMENTS >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/OSINT 796 | download "Shodan" pip3 shodan 797 | download "Search That Hash" pip3 search-that-hash 798 | download "Scylla" git https://www.github.com/DoubleThreatSecurity/Scylla && cd Scylla && python3 -m pip install -q -r requirments.txt >> $DIR/.install.log 2>>$DIR/.error.log && sed '1i#!/usr/bin/env python3' scylla.py >scylla; rm scylla.py && mv scylla scylla.py && cd $DIR/OSINT 799 | download "TheHarvester" git https://github.com/laramies/theHarvester && cd theHarvester && python3 -m pip install -q testresources >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -q -r requirements.txt --ignore-installed >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -q pipenv >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -q webscreenshot >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/OSINT 800 | 801 | if [ $GUI ]; then 802 | download "Spider Foot" git https://github.com/smicallef/spiderfoot && cd spiderfoot && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/OSINT 803 | fi 804 | 805 | if [ $MINIMAL == false ]; then 806 | download "Sherlock" git https://github.com/sherlock-project/sherlock && cd sherlock && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/OSINT 807 | download "SocialScan" pip3 socialscan 808 | download "ReconSpider" git https://github.com/bhavsec/reconspider && cd reconspider && python3 setup.py install >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/OSINT 809 | download "UserRecon" git https://github.com/wishihab/userrecon 810 | download "WhatsMyName" git https://github.com/WebBreacher/WhatsMyName && cd WhatsMyName && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/OSINT 811 | download "Amass" snap amass 812 | download "Sublist3r" git https://github.com/aboul3la/Sublist3r && cd Sublist3r && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log; cd $DIR/OSINT 813 | download "Photon" git https://github.com/s0md3v/Photon && cd Photon && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log; cd $DIR/OSINT 814 | fi 815 | 816 | 817 | 818 | ## Forensics 819 | if [ $QUIET == false ]; then 820 | echo "" 821 | fi 822 | echo -e "$CYAN\rInstalling Forensics tools..." 823 | mkdir $DIR/Forensics 824 | cd $DIR/Forensics 825 | 826 | download "binwalk" apt binwalk 827 | download "Volatility 3" git https://github.com/volatilityfoundation/volatility3 828 | download "Foremost" apt foremost 829 | download "steghide" apt steghide 830 | download "exiftool" apt libimage-exiftool-perl 831 | download "hexdump" apt bsdmainutils 832 | 833 | if [ $MINIMAL == false ]; then 834 | download "Abeebus" git https://github.com/13Cubed/Abeebus 835 | download "zsteg" gem 836 | download "net-creds" git https://github.com/DanMcInerney/net-creds && cd net-creds && python3 -m pip install -q -r requirements.txt >> $DIR/.install.log 2>>$DIR/.error.log && python3 -m pip install -q scapy >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Forensics 837 | download "The Sleuth Kit" apt sleuthkit 838 | 839 | if [ $GUI ]; then 840 | download "AudioStego" git https://github.com/danielcardeenas/AudioStego && cd AudioStego && mkdir build && cd build && cmake .. >> $DIR/.install.log 2>>$DIR/.error.log && make >> $DIR/.install.log 2>>$DIR/.error.log && ln -s $DIR/Forensics/AudioStego/build/hideme /usr/bin/hideme && cd $DIR/Forensics 841 | download "Autopsy" apt autopsy 842 | fi 843 | fi 844 | 845 | 846 | 847 | ## Security 848 | if [ $QUIET == false ]; then 849 | echo "" 850 | fi 851 | echo -e "$CYAN\rInstalling Security tools..." 852 | mkdir $DIR/Security 853 | cd $DIR/Security 854 | 855 | download "ProxyChains4" apt proxychains4 856 | download "OpenVPN" apt openvpn 857 | download "UFW" apt ufw && apt-get -qq install gufw -y >> $DIR/.install.log 2>>$DIR/.error.log 858 | download "Anonsurf" git https://github.com/Und3rf10w/kali-anonsurf && cd kali-anonsurf && echo | ./installer.sh >> $DIR/.install.log 2>>$DIR/.error.log && cd $DIR/Security 859 | 860 | if [ $MINIMAL == false ]; then 861 | download "mat2" apt mat2 862 | 863 | if [ $GUI ]; then 864 | echo -e "\n" | add-apt-repository ppa:phoerious/keepassxc >> $DIR/.install.log 2>>$DIR/.error.log 865 | apt-get -qq update >> $DIR/.install.log 2>>$DIR/.error.log 866 | download "KeePassXC" apt keepassxc 867 | fi 868 | fi 869 | 870 | 871 | 872 | ## WORDLISTS 873 | if [ $QUIET == false ]; then 874 | echo "" 875 | fi 876 | echo -e "$CYAN\rInstalling Wordlists..." 877 | [ ! -d $WORDLISTS ] && mkdir $WORDLISTS 878 | ln -s $WORDLISTS $DIR 879 | mv $DIR/wordlists $DIR/Wordlists 880 | cd $WORDLISTS 881 | 882 | download "rockyou" wget https://github.com/brannondorsey/naive-hashcat/releases/download/data/rockyou.txt 883 | download "SecLists" git https://github.com/danielmiessler/SecLists 884 | download "Payloads All The Things" git https://github.com/swisskyrepo/PayloadsAllTheThings 885 | 886 | if [ $MINIMAL == false ]; then 887 | download "crackstation-human-only" wget https://crackstation.net/files/crackstation-human-only.txt.gz && gunzip -d $WORDLISTS/crackstation-human-only.txt.gz 888 | download "fuzzdb" git https://github.com/fuzzdb-project/fuzzdb 889 | fi 890 | 891 | if [ $QUIET == false ]; then 892 | echo "" 893 | fi 894 | 895 | # Create symlinks for all the wordlists 896 | echo -e "$CYAN\rSetting up wordlists..." 897 | mv SecLists/Web-Shells $DIR/Misc 898 | ln -s /usr/share/dirb/wordlists dirb 899 | ln -s /usr/share/nmap/nselib/data nmap 900 | if [ $MINIMAL == false ]; then 901 | ln -s $DIR/OSINT/theHarvester/wordlists theHarvester 902 | mkdir dirbuster 903 | mv $DIR/Enumeration/Fuzzers/dirbuster/*.txt dirbuster 904 | ln -s $DIR/Exploitation/sparta/wordlists $DIR/Wordlists/sparta 905 | fi 906 | 907 | 908 | 909 | # NEEDS INPUT FROM USER 910 | echo 911 | echo -e -n "$CYAN\rThe following installations require user input [Press Enter to continue...]$RESET"; read 912 | 913 | if [ $GUI ]; then 914 | if [ $MINIMAL == false ]; then 915 | #IDA 916 | cd "$DIR/Reverse Engineering" 917 | wget -q https://out7.hex-rays.com/files/idafree76_linux.run -O ida.run 918 | IDA="`find / 2>/dev/null | grep idafree | head -n 1`" 919 | ln -s $IDA/ida64 /usr/bin/ida 920 | chmod +x ida.run 921 | ./ida.run 922 | rm ida.run 923 | 924 | #venom 925 | cd $DIR/Exploitation 926 | git clone -q https://github.com/r00t-3xp10it/venom.git 927 | cd venom 928 | find ./ -name "*.sh" -exec chmod +x {} \; 929 | find ./ -name "*.py" -exec chmod +x {} \; 930 | cd aux 931 | ./setup.sh >> $DIR/.install.log 2>>$DIR/.error.log 932 | cd $DIR/Exploitation 933 | fi 934 | fi 935 | 936 | ## Finish the progress bar 937 | #if [ $QUIET == false ]; then 938 | # destroy_scroll_area 939 | #fi 940 | 941 | # Checking for corrupted installations and fixing them 942 | echo -e "$CYAN\rFinishing touches...$RESET" 943 | apt-get -qq update --fix-missing >> $DIR/.install.log 2>>$DIR/.error.log 944 | apt-get -qq -y upgrade >> $DIR/.install.log 2>>$DIR/.error.log 945 | apt-get --fix-broken -qq install >> $DIR/.install.log 2>>$DIR/.error.log 946 | source /home/$SUDO_USER/.bash_aliases 947 | 948 | # Checking for errors 949 | # grep -w --ignore-case 'not found\|error\|unable\|invalid\|no such\|cannot' $DIR/.install.log | grep -vi inflating | grep -vi creating | sort | uniq -c | sort -r >> $DIR/.error.log 950 | if [ -s "$DIR/.error.log" ]; then 951 | echo 952 | echo -e "$YELLOW\r[*] WARNING! There's been detected some errors during the installation. Check the '.error.log' file.$RESET" 953 | fi 954 | 955 | 956 | 957 | # Final Message 958 | echo "" 959 | echo -e "$GREEN\rInstallation Completed! Please reboot your machine.$RESET" 960 | echo "" 961 | 962 | # Exit from root 963 | exit 964 | --------------------------------------------------------------------------------