https://github.com/r00t-3xp10it/rc-exploiter
NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
https://github.com/r00t-3xp10it/rc-exploiter
brute-force metasploit nmap-scripts resource-files wlan-lan
Last synced: 3 months ago
JSON representation
NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)
- Host: GitHub
- URL: https://github.com/r00t-3xp10it/rc-exploiter
- Owner: r00t-3xp10it
- Created: 2016-11-16T21:33:28.000Z (over 8 years ago)
- Default Branch: master
- Last Pushed: 2017-05-16T16:51:48.000Z (about 8 years ago)
- Last Synced: 2025-03-18T01:01:47.265Z (3 months ago)
- Topics: brute-force, metasploit, nmap-scripts, resource-files, wlan-lan
- Language: Lua
- Homepage:
- Size: 139 KB
- Stars: 49
- Watchers: 6
- Forks: 36
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
[]()
[]()
[]()
[]()# RC-EXPLOITER v1.1.7 - resource file services exploiter
Version release : v1.1.7
Author: pedro ubuntu [ r00t-3xp10it ]
Distros supported : Linux:kali, Ubuntu, Parrot OS, Mint (tested)
Suspicious-Shell-Activity (SSA) RedTeam develop @2016# LEGAL DISCLAMER
The author does not hold any responsibility about the bad use of this script,
remmenber that attacking targets without prior concent its ilegal and punish
by law, this script was build to show how resource files can automate tasks.
Learn more about 'resource files' ERB scripting here: http://goo.gl/218cxM# Framework description
Scanning WAN networks in search of targets may take 10 to 15 minutes depending
of your network connection, the tool will search in 1024 random hosts for the
selected port open, then port hosts found to metasploit database, and run the
conrrespondent 'exploit.rc' againts all hosts stored into 'RHOSTS' variable.
All rc files will use nmap nse scripting enginne to gather information and
msf auxiliarys modules to gather information + brute-force service selected.
'Each discovered matching login and password will create one shell session'By default rc-exploiter uses 'one-per-line' dicionarys to brute-force services
found or we can provide the full path to another dicionary file to be used, also
rc-exploiter give us the abillity to exploit multiple targets at once (RHOSTS)
for that just separate the hosts by a blank space [ eg: 127.0.0.1 192.168.1.68 ]# Framework additional settings
Additional tool settings can be configurated just by editing the 'settings' file
before running the tool, settings like: use decoys [ scanning WAN networks ] or
spoof mac addr [ change mac addr + ip addr ] among other default settings.# Dependencies
Nmap, Metasploit, Macchanger, Zenity, Xterm# Download/Install
1º - Download framework from github
tar.gz OR zip OR git clone2º - Set files execution permitions
cd RC-exploiter
sudo chmod -R +x *.sh4º - Run main tool
nano settings
sudo ./rc-exploiter.sh# Framework Banner

# Framework Main Menu
_EOF