Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ait-testbed/atb-ansible-postexploit
Ansible Role for AECID Testbed PostExploitation Tools
https://github.com/ait-testbed/atb-ansible-postexploit
aecid ansible ansible-role atb exploit postexploit privesc testbed
Last synced: about 1 month ago
JSON representation
Ansible Role for AECID Testbed PostExploitation Tools
- Host: GitHub
- URL: https://github.com/ait-testbed/atb-ansible-postexploit
- Owner: ait-testbed
- Created: 2023-05-23T15:18:26.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-02-14T17:45:51.000Z (12 months ago)
- Last Synced: 2024-11-09T21:11:55.414Z (3 months ago)
- Topics: aecid, ansible, ansible-role, atb, exploit, postexploit, privesc, testbed
- Language: C
- Homepage:
- Size: 5.24 MB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
AECID-Testbed: PostExploit
==========================This role installs some post-exploit-tools to a specific directory. In the AECID Testbed, this will be deployed to the
webroot of the attacker-server.Currently the following Tools are Supported:
- LinPEAS(https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS)
- PWNkit(https://github.com/ly4k/PwnKit.git)
- linux-pam-backdoor(https://github.com/zephrax/linux-pam-backdoor)
- Logrotten(https://github.com/whotwagner/logrotten)
- Static compiled Nmap(https://nmap.org/)
- do-not-cry ransomeware(https://github.com/RotrixLOL/do-not-cry)Requirements
------------Any Debian-based Linux Distribution is supported.
Role Variables
--------------```
postexploit_files:
- name: linpeas.sh
path: linPEAS/linpeas.sh
- name: PwnKit
path: PwnKit/PwnKit
- name: logrotten
path: Logrotten/logrotten
# password: haveityourway
- name: pam_unix.so
path: linux-pam-backdoor/pam_unix.so
- name: nmap
path: Nmap/nmap-7.94_amd64postexploit_destpath: "/var/www/html"
postexploit_apache: True
postexploit_owner: "root"
postexploit_group: "root"
```Example Playbook
----------------The following playbook will install apache2 and deploy the post-exploit-tools into the webroot at `/var/www/html`:
```
- hosts: localhost
roles:
- role: postexploit
```License
-------GPL-3.0
Author Information
------------------Wolfgang Hotwagner(https://www.ait.ac.at)