Skip to main content

Hive Metasploit connector

Project description

hive-metasploit

logo

Site Required OS Python3 version License Version

Description

hive-metasploit is a python library for:

with hive-metasploit you can import/export Metasploit data to/from Hive such as:

  • hosts
  • services
  • vulnerabilities
  • loots
  • notes
  • credentials

Python versions

  • Python 3.6
  • Python 3.7
  • Python 3.8
  • Python 3.9

Dependencies

Installing

hive-metasploit can be installed with pip:

pip3 install hive-metasploit

Alternatively, you can grab the latest source code from github:

git clone https://github.com/hive-metasploit/hive-metasploit.git
cd hive-metasploit
python3 setup.py install

Import

$ cat ~/.hive/config.yaml
cookie: SESSIONID=82e50cd3-9d41-4e7e-8157-5559548f39ac
password: Password
proxy: http://127.0.0.1:8888
server: http://127.0.0.1:8080
username: user@mail.com
$ cat ~/.msf4/config
[framework/database]
default_db=local-https-data-service

[framework/database/local-https-data-service]
url=https://localhost:5443
cert=/Users/vladimir/.msf4/msf-ws-cert.pem
skip_verify=true
api_token=cf2dbb7f9d1f92839a84f9c165ee9afef3dd3a3116bc99badf45be4ae5655168c9c2c3c58621b460

$ hive-metasploit -hn test_project -mw test_workspace -I
[*] Imported data from Metasploit workspace: test_workspace to Hive project: test_project
[+] Successfully imported host: 192.168.0.161 port: 135
[+] Successfully imported host: 192.168.0.161 port: 139
[+] Successfully imported host: 192.168.0.161 port: 445
[+] Successfully imported host: 192.168.0.161 port: 1025
[+] Successfully imported host: 192.168.0.161 port: 5000

Import data from Metasploit workspace to Hive project

Export

$ cat ~/.hive/config.yaml
cookie: SESSIONID=82e50cd3-9d41-4e7e-8157-5559548f39ac
password: Password
proxy: http://127.0.0.1:8888
server: http://127.0.0.1:8080
username: user@mail.com
$ cat ~/.msf4/config
[framework/database]
default_db=local-https-data-service

[framework/database/local-https-data-service]
url=https://localhost:5443
cert=/Users/vladimir/.msf4/msf-ws-cert.pem
skip_verify=true
api_token=cf2dbb7f9d1f92839a84f9c165ee9afef3dd3a3116bc99badf45be4ae5655168c9c2c3c58621b460

$ hive-metasploit -hn test_project -mw test_workspace -E
[*] Exported data from Hive project: test_project to Metasploit workspace: test_workspace
[+] Successfully exported host: 192.168.0.161
[+] Successfully exported service: 135 (tcp) for host: 192.168.0.161
[+] Successfully exported service: 139 (tcp) for host: 192.168.0.161
[+] Successfully exported service: 445 (tcp) for host: 192.168.0.161
[+] Successfully exported service: 1025 (tcp) for host: 192.168.0.161
[+] Successfully exported service: 5000 (tcp) for host: 192.168.0.161
[+] Successfully exported vulnerability: SMB Signing Is Not Required for host: 192.168.0.161

Export data from Hive project to Metasploit workspace

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

hive-metasploit-0.0.1a2.tar.gz (13.7 kB view hashes)

Uploaded Source

Built Distribution

hive_metasploit-0.0.1a2-py3-none-any.whl (13.4 kB view hashes)

Uploaded Python 3

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page