Beginner Pentesting Toolkit/Framework
Project description
# Installation Instructions:
## Using Pip
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
pip3 install babysploit
babysploit
```
In order to use `search` command you must follow steps [here](https://www.exploit-db.com/searchsploit/#install) to install the searchsploit binary!
## Building From Source
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
git clone https://github.com/M4cs/BabySploit.git
cd BabySploit/
python3 setup.py install
babysploit
```
## Docker Run Command
```
docker run --rm -idt --name babysploit xshuden/babysploit # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit
```
# Getting Started:
#### Setting Configuration Values:
BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically
generated and located at `./babysploit/config/config.cfg`. You can manually change configuration settings
by opening up the file and editing with a text editor or you can use the set command to set a new value for
a key. Use the set command like so:
```
set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!
```
If before running this command the rhost key had a value of 80, the rhost key after running this command has a
value of 10. You can also add configuration variables to the config by using the set command with a new key after it
like so:
```
set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!
```
Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config
until you use the `reset` command which resets the saved configuration.
#### Running A Tool
In order to run a tool all you have to do is enter the name of the tool into BabySploit. You can use the `tools` command
to display a menu with all the currently availble tools. If we run tools we get the depiction:
<p align="center">
<img src="https://image.prntscr.com/image/dMlUOjFnQk_KSyru1gTQ2A.png" alt="Tools"/>
</p>
*this depiction may be outdated*
This menu will display the tools available and the description of each tool. To run a tool simply enter the tool name
into BabySploit. Ex: `ftpbruteforce` - runs the ftpbruteforce tool.
# Features (Current, In The Works, Planned):
[Visit](https://github.com/M4cs/BabySploit/projects/1) project board for tools.
- Information Gathering
- Exploitation
- Post Exploitation
- Bruteforcing
- Phishing
- Cryptography/Stenography
### Information Gathering:
- Nmap
- IP Info
- Tcpdump (In The Works)
- Datasploit (In The Works)
- Censys Lookup
- DNS Lookup
- Raccoon
- Cloudflare Bypasser
### Exploitation:
- Searchsploit
- ReverseShell Wizard
- FTP Buffer Overflow Scan
- WPSeku WordPress Vuln Scanner
### Post Exploitation:
- In The Works
### Bruteforcing:
- FTP Bruteforcer
- WPSeku WordPress Login Bruteforce
### Phishing:
- BlackEye Python
### Crypto/Stegano:
- MetaKiller
- PDFMeta
# Contributing
Feel free to contribute by making plugins or fixing bugs with a Pull Request. All contributions are helpful and will help make this a great tool.
Licensed Under [MIT](https://github.com/M4cs/BabySploit/blob/master/LICENSE.md).
Copyright (c) 2018 Syndicated Intelligence
## Using Pip
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
pip3 install babysploit
babysploit
```
In order to use `search` command you must follow steps [here](https://www.exploit-db.com/searchsploit/#install) to install the searchsploit binary!
## Building From Source
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
git clone https://github.com/M4cs/BabySploit.git
cd BabySploit/
python3 setup.py install
babysploit
```
## Docker Run Command
```
docker run --rm -idt --name babysploit xshuden/babysploit # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit
```
# Getting Started:
#### Setting Configuration Values:
BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically
generated and located at `./babysploit/config/config.cfg`. You can manually change configuration settings
by opening up the file and editing with a text editor or you can use the set command to set a new value for
a key. Use the set command like so:
```
set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!
```
If before running this command the rhost key had a value of 80, the rhost key after running this command has a
value of 10. You can also add configuration variables to the config by using the set command with a new key after it
like so:
```
set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!
```
Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config
until you use the `reset` command which resets the saved configuration.
#### Running A Tool
In order to run a tool all you have to do is enter the name of the tool into BabySploit. You can use the `tools` command
to display a menu with all the currently availble tools. If we run tools we get the depiction:
<p align="center">
<img src="https://image.prntscr.com/image/dMlUOjFnQk_KSyru1gTQ2A.png" alt="Tools"/>
</p>
*this depiction may be outdated*
This menu will display the tools available and the description of each tool. To run a tool simply enter the tool name
into BabySploit. Ex: `ftpbruteforce` - runs the ftpbruteforce tool.
# Features (Current, In The Works, Planned):
[Visit](https://github.com/M4cs/BabySploit/projects/1) project board for tools.
- Information Gathering
- Exploitation
- Post Exploitation
- Bruteforcing
- Phishing
- Cryptography/Stenography
### Information Gathering:
- Nmap
- IP Info
- Tcpdump (In The Works)
- Datasploit (In The Works)
- Censys Lookup
- DNS Lookup
- Raccoon
- Cloudflare Bypasser
### Exploitation:
- Searchsploit
- ReverseShell Wizard
- FTP Buffer Overflow Scan
- WPSeku WordPress Vuln Scanner
### Post Exploitation:
- In The Works
### Bruteforcing:
- FTP Bruteforcer
- WPSeku WordPress Login Bruteforce
### Phishing:
- BlackEye Python
### Crypto/Stegano:
- MetaKiller
- PDFMeta
# Contributing
Feel free to contribute by making plugins or fixing bugs with a Pull Request. All contributions are helpful and will help make this a great tool.
Licensed Under [MIT](https://github.com/M4cs/BabySploit/blob/master/LICENSE.md).
Copyright (c) 2018 Syndicated Intelligence
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
babysploit-1.3.2.tar.gz
(15.6 kB
view details)
Built Distribution
File details
Details for the file babysploit-1.3.2.tar.gz
.
File metadata
- Download URL: babysploit-1.3.2.tar.gz
- Upload date:
- Size: 15.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.21.0 setuptools/40.6.3 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2d93f3ebacc6719a701b705fedf1a309a0aef2ec5554589d743026dce107b13c |
|
MD5 | 97fb8deed2005da5bbb2036f0fd87e9c |
|
BLAKE2b-256 | cd6ce65592905fff5f35cb9c9051dc38f35349d20e87e47911ba0c84167df8a3 |
File details
Details for the file babysploit-1.3.2-py3-none-any.whl
.
File metadata
- Download URL: babysploit-1.3.2-py3-none-any.whl
- Upload date:
- Size: 21.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.21.0 setuptools/40.6.3 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | b53f16a86518b6678e7c1d0e559d7decb0fac72795e0e5f201da9a703ceabf37 |
|
MD5 | 4f4c2921edba2ff871eec669ffb53dc1 |
|
BLAKE2b-256 | 8ab60b45bf597020b58c342536f2e9bca2582e88e222982c5702b565971deb9b |