Beginner Pentesting Toolkit/Framework
Project description
# Installation Instructions:
## Using Pip
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
pip3 install babysploit
babysploit
```
In order to use `search` command you must follow steps [here](https://www.exploit-db.com/searchsploit/#install) to install the searchsploit binary!
## Building From Source
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
git clone https://github.com/M4cs/BabySploit.git
cd BabySploit/
python3 setup.py install
babysploit
```
## Docker Run Command
```
docker run --rm -idt --name babysploit xshuden/babysploit # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit
```
# Getting Started:
#### Setting Configuration Values:
BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically
generated and located at `./babysploit/config/config.cfg`. You can manually change configuration settings
by opening up the file and editing with a text editor or you can use the set command to set a new value for
a key. Use the set command like so:
```
set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!
```
If before running this command the rhost key had a value of 80, the rhost key after running this command has a
value of 10. You can also add configuration variables to the config by using the set command with a new key after it
like so:
```
set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!
```
Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config
until you use the `reset` command which resets the saved configuration.
#### Running A Tool
In order to run a tool all you have to do is enter the name of the tool into BabySploit. You can use the `tools` command
to display a menu with all the currently availble tools. If we run tools we get the depiction:
<p align="center">
<img src="https://image.prntscr.com/image/dMlUOjFnQk_KSyru1gTQ2A.png" alt="Tools"/>
</p>
*this depiction may be outdated*
This menu will display the tools available and the description of each tool. To run a tool simply enter the tool name
into BabySploit. Ex: `ftpbruteforce` - runs the ftpbruteforce tool.
# Features (Current, In The Works, Planned):
[Visit](https://github.com/M4cs/BabySploit/projects/1) project board for tools.
- Information Gathering
- Exploitation
- Post Exploitation
- Bruteforcing
- Phishing
- Cryptography/Stenography
### Information Gathering:
- Nmap
- IP Info
- Tcpdump (In The Works)
- Datasploit (In The Works)
- Censys Lookup
- DNS Lookup
- Raccoon
- Cloudflare Bypasser
### Exploitation:
- Searchsploit
- ReverseShell Wizard
- FTP Buffer Overflow Scan
- WPSeku WordPress Vuln Scanner
### Post Exploitation:
- In The Works
### Bruteforcing:
- FTP Bruteforcer
- WPSeku WordPress Login Bruteforce
### Phishing:
- BlackEye Python
### Crypto/Stegano:
- MetaKiller
- PDFMeta
# Contributing
Feel free to contribute by making plugins or fixing bugs with a Pull Request. All contributions are helpful and will help make this a great tool.
Licensed Under [MIT](https://github.com/M4cs/BabySploit/blob/master/LICENSE.md).
Copyright (c) 2018 Syndicated Intelligence
## Using Pip
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
pip3 install babysploit
babysploit
```
In order to use `search` command you must follow steps [here](https://www.exploit-db.com/searchsploit/#install) to install the searchsploit binary!
## Building From Source
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
git clone https://github.com/M4cs/BabySploit.git
cd BabySploit/
python3 setup.py install
babysploit
```
## Docker Run Command
```
docker run --rm -idt --name babysploit xshuden/babysploit # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit
```
# Getting Started:
#### Setting Configuration Values:
BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically
generated and located at `./babysploit/config/config.cfg`. You can manually change configuration settings
by opening up the file and editing with a text editor or you can use the set command to set a new value for
a key. Use the set command like so:
```
set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!
```
If before running this command the rhost key had a value of 80, the rhost key after running this command has a
value of 10. You can also add configuration variables to the config by using the set command with a new key after it
like so:
```
set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!
```
Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config
until you use the `reset` command which resets the saved configuration.
#### Running A Tool
In order to run a tool all you have to do is enter the name of the tool into BabySploit. You can use the `tools` command
to display a menu with all the currently availble tools. If we run tools we get the depiction:
<p align="center">
<img src="https://image.prntscr.com/image/dMlUOjFnQk_KSyru1gTQ2A.png" alt="Tools"/>
</p>
*this depiction may be outdated*
This menu will display the tools available and the description of each tool. To run a tool simply enter the tool name
into BabySploit. Ex: `ftpbruteforce` - runs the ftpbruteforce tool.
# Features (Current, In The Works, Planned):
[Visit](https://github.com/M4cs/BabySploit/projects/1) project board for tools.
- Information Gathering
- Exploitation
- Post Exploitation
- Bruteforcing
- Phishing
- Cryptography/Stenography
### Information Gathering:
- Nmap
- IP Info
- Tcpdump (In The Works)
- Datasploit (In The Works)
- Censys Lookup
- DNS Lookup
- Raccoon
- Cloudflare Bypasser
### Exploitation:
- Searchsploit
- ReverseShell Wizard
- FTP Buffer Overflow Scan
- WPSeku WordPress Vuln Scanner
### Post Exploitation:
- In The Works
### Bruteforcing:
- FTP Bruteforcer
- WPSeku WordPress Login Bruteforce
### Phishing:
- BlackEye Python
### Crypto/Stegano:
- MetaKiller
- PDFMeta
# Contributing
Feel free to contribute by making plugins or fixing bugs with a Pull Request. All contributions are helpful and will help make this a great tool.
Licensed Under [MIT](https://github.com/M4cs/BabySploit/blob/master/LICENSE.md).
Copyright (c) 2018 Syndicated Intelligence
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
babysploit-1.4.tar.gz
(15.6 kB
view details)
Built Distribution
babysploit-1.4-py3-none-any.whl
(21.5 kB
view details)
File details
Details for the file babysploit-1.4.tar.gz
.
File metadata
- Download URL: babysploit-1.4.tar.gz
- Upload date:
- Size: 15.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.21.0 setuptools/40.6.3 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | ca6a07ecb713dfeb5f757ef9920cce33735563687864ad4cc9c9516716307587 |
|
MD5 | cf8a89e640d8e47c61b48b0f43b5e29d |
|
BLAKE2b-256 | 91c137200839a99af0f2fdc366173f0af980d0124df1fb61e4b703471c2ab84f |
File details
Details for the file babysploit-1.4-py3-none-any.whl
.
File metadata
- Download URL: babysploit-1.4-py3-none-any.whl
- Upload date:
- Size: 21.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.21.0 setuptools/40.6.3 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.6.7
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 0d6541a8ed084dc756ae5bfdf7f6c144abf11247f6c06f74d51d00193d048d45 |
|
MD5 | 18c4eb7eeab8a12c9347aa55ef339729 |
|
BLAKE2b-256 | f47e7a2be61e27fb8b65624b1011cc8554bcfc0c1ef9081d4955b4897d7fb7e3 |