Repository: vay3t/hax0rpi
Branch: master
Commit: 3b9a4f92a9ef
Files: 5
Total size: 33.6 KB
Directory structure:
gitextract_bsa__mw_/
├── .bashrc
├── README.md
├── hax0rpi
├── post-snap-install.sh
└── ubuntu-installer.sh
================================================
FILE CONTENTS
================================================
================================================
FILE: .bashrc
================================================
# ~/.bashrc: executed by bash(1) for non-login shells.
# Note: PS1 and umask are already set in /etc/profile. You should not
# need this unless you want different defaults for root.
PS1='${debian_chroot:+($debian_chroot)}\[\033[01;31m\]\u@\h\[\033[00m\]:\[\033[01;34m\]\w\[\033[00m\]\$ '
# umask 022
# You may uncomment the following lines if you want `ls' to be colorized:
export LS_OPTIONS='--color=auto'
eval "`dircolors`"
alias ls='ls $LS_OPTIONS'
alias ll='ls $LS_OPTIONS -al'
# alias l='ls $LS_OPTIONS -lA'
#
# Some more alias to avoid making mistakes:
# alias rm='rm -i'
# alias cp='cp -i'
# alias mv='mv -i'
================================================
FILE: README.md
================================================
# This project has been archived, please visit: https://github.com/nchgroup/intruder-deployer
# hax0rpi
```
pi@raspberrypi:~/hax0rpi $ ./hax0rpi
_ ___ _
| |__ __ ___ __/ _ \ _ __ _ __ (_)
| '_ \ / _' \ \/ / | | | '__| '_ \| |
| | | | (_| |> <| |_| | | | |_) | |
|_| |_|\__,_/_/\_\\___/|_| | .__/|_|
|_|
A Raspberry Pi Hacker Tools suite by Vay3t
----------------------------------------------------------------
This installer will load a comprehensive of hacker tools
suite onto your Raspberry Pi. Note that the Raspbian
distribution must be installed onto the SD card before
proceeding. See README (if exist) for more information.
```
# Archived
Migrated to https://gitlab.com/vay3t/hax0rpi
# Why
I do not like to be filled with tools, so I try to put the least possible
# How to run?
### git clone
```
sudo apt-get install git -y
git clone https://github.com/vay3t/hax0rpi
cd hax0rpi
chmod +x hax0rpi
./hax0rpi
cd
sudo rm -r hax0rpi/
sudo reboot
```
### curl
```
sudo apt-get install curl -y
curl -s https://raw.githubusercontent.com/vay3t/hax0rpi/master/hax0rpi | bash
sudo reboot
```
# How to install Raspbian from Linux
```
wget https://downloads.raspberrypi.org/raspbian_lite/images/raspbian_lite-2020-02-14/2020-02-13-raspbian-buster-lite.zip
unzip 2020-02-13-raspbian-buster-lite.zip
umount /dev/mmcblk0p1
umount /dev/mmcblk0p2
dd bs=4M if=2020-02-13-raspbian-buster-lite.img of=/dev/mmcblk0
```
more information: [https://www.raspberrypi.org/documentation/installation/installing-images/linux.md](https://www.raspberrypi.org/documentation/installation/installing-images/linux.md)
# Tools List (not updated)
### Installed via apt-get:
* apache2 - http daemon
* arp-scan - scans lan
* crunch - password list generator
* curl -
* dhex -
* dnsmasq - DNS forwarder
* dsniff - packet sniffer
* ettercap-text-only - packet sniffer
* gdb - gnu debugger
* git - development tool for cloning repositories
* hexedit -
* hostapd - wireless utility for hosting an access point
* hydra - Login bruteforce utility
* iw - wireless utilities
* john -
* kismet -
* libimage-exiftool-perl - perl tool for metadata files
* locate - local file location database
* macchanger - utility to change network MAC address
* masscan - Port scanning utility
* mariadb-client - mariadb database client
* mariadb-server - mariadb database server
* nbtscan - Utility for scanning Windows or Samba network shares
* nmap - Port scanning utility
* mycli - mysql client
* openvpn - VPN software
* php - Dynamic scripting language for web applications
* proxychains - Utility to forward selected apps through a proxy or chain of proxies
* python-dev - Python development libraries
* python-pip - Python packages
* ruby-full - install ruby
* screen - screen terminal
* smbclient - samba client
* sslstrip - Utility to scan for HTTPS connections and obfuscate to non-SSL addresses
* tcpdump - Packet sniffing utility
* tmux - terminal with anabolics
* tor - Anonymous onion routing
* torsocks - utility socks for tor
* tree - Directory listing utility
* vim - text editor and IDE
* wipe - Secure drive/data erasure utility
* wireless-tools - Linux Wireless tools
* whois - internet address lookup utility
### Python tools:
* scapy
* crackmapexec
* wafw00f
* sqlmap
* shodan
### Miscellanous:
* pixiewps - Offline WiFi protected setup brute-force utility
* reaver - Wifi cracking utility
* aircrack-ng - wifi cracking utility
* mdk4 - aircrack utility?
* cewl - Ruby utility to spider a website, collecting data for password cracking
* Windows exploit suggester - self-explanatory, compares Windows patch level against vulnerabilities
* commix - utility to exploit web vulnerabilities through query command injection
* theharvester - utility to gather searchable open information about a host address
* exploit database - command line utility to search exploit database
* rock3tman - script to setup a VPN
* Kali Linux Windows binaries - win32 binaries for use on windows systems
* metasploit - exploitation framework
* anemone
* wpscan
# New tools?
I accept suggestions
================================================
FILE: hax0rpi
================================================
#!/bin/bash
BLACK='\e[30m'
RED='\e[31m'
GREEN='\e[32m'
YELLOW='\e[33m'
BLUE='\e[34m'
PURPLE='\e[35m'
CYAN='\e[36m'
WHITE='\e[37m'
NC='\e[0m'
if [ `lsb_release -i | awk '{print $3}'` != Raspbian ]; then
echo -e "\n${RED}[*] Your distro is not supported\n${NC}"
exit 1
fi
echo -e "${CYAN} _ ___ _ "
echo " | |__ __ ___ __/ _ \ _ __ _ __ (_) "
echo " | '_ \ / _' \ \/ / | | | '__| '_ \| | "
echo " | | | | (_| |> <| |_| | | | |_) | | "
echo ' |_| |_|\__,_/_/\_\\___/|_| | .__/|_| '
echo " |_| "
echo -e "${NC}"
echo -e "${RED} === hax0rpi Release 1.2 === ${NC}"
echo -e "${RED} codename: Maromota Dorada ${NC}"
echo -e "${YELLOW} A Raspberry Pi Hacker Tools suite by Vay3t ${NC}"
echo ""
echo "----------------------------------------------------------------"
echo -e "${GREEN} This installer will load a comprehensive of hacker tools "
echo " suite onto your Raspberry Pi. Note that the Raspbian "
echo " distribution must be installed onto the SD card before "
echo -e " proceeding. See README (if exist) for more information. ${NC}"
echo ""
echo -e "${CYAN}[>] Press ENTER to continue, CTRL+C to abort.${NC}"
read INPUT
echo ""
# change password
#passwd pi
echo -e "${YELLOW}[!] enable ssh${NC}"
sudo systemctl enable ssh
# secret directory
secret=arsenal
cd
mkdir $secret && cd $secret
echo -e "\n${YELLOW}[+] folder 'secret' created${NC}"
# update system
echo -e "\n${YELLOW}[!] update and upgrade system${NC}"
sudo apt-get update
sudo apt-get dist-upgrade -y
# install from apt-get
echo -e "\n${YELLOW}\n[!] install tools with apt-get${NC}"
sudo apt-get install -y \
apache2 \
arp-scan \
crunch \
curl \
dhex \
dnsmasq \
dsniff \
ettercap-text-only \
git \
hexedit \
hostapd \
hydra \
iw \
kismet \
libimage-exiftool-perl \
locate \
macchanger \
mariadb-client \
mariadb-server \
mycli \
nbtscan \
netcat \
netdiscover \
nmap \
openvpn \
php \
python3-dev \
python3-pip \
ruby-full \
screen \
smbclient \
snapd \
tcpdump \
tmux \
tor \
torsocks \
tree \
vim \
wipe \
wireless-tools \
whois;
# install from gems
echo -e "\n${YELLOW}[!] install from gems${NC}"
sudo gem install wpscan bundle evil-winrm
# install from pip
echo -e "\n${YELLOW}[!] install from pip${NC}"
sudo apt install -y libffi-dev
sudo pip3 install exrex sqlmap shodan wafw00f requests beautifulsoup4 scapy proxy.py
# clone repos
echo -e "\n${YELLOW}[!] clone repos${NC}"
git clone https://github.com/Mebus/cupp
git clone https://github.com/drwetter/testssl.sh
git clone https://github.com/m4ll0k/Atlas
git clone https://github.com/commixproject/commix
git clone https://github.com/maurosoria/dirsearch
git clone https://github.com/lgandx/Responder
git clone https://github.com/vulnersCom/nmap-vulners
sudo pip3 install git+https://github.com/byt3bl33d3r/python-Wappalyzer
# frp
wget https://github.com/fatedier/frp/releases/download/v0.33.0/frp_0.33.0_linux_arm.tar.gz
tar zxvf frp_0.33.0_linux_arm.tar.gz
rm frp_0.33.0_linux_arm.tar.gz
# portspoof
git clone https://github.com/drk1wi/portspoof
cd portspoof
./configure
make
sudo make install
cd && cd $secret
# git-dumper
git clone https://github.com/arthaud/git-dumper
cd git-dumper
sudo pip3 install -r requirements.txt
cd && cd $secret
# crackmapexec
git clone --recursive https://github.com/byt3bl33d3r/CrackMapExec
cd CrackMapExec
python3 setup.py install
cd && cd $secret
# photon
git clone https://github.com/s0md3v/Photon
cd Photon
sudo pip3 install -r requirements.txt
cd && cd $secret
# intruder payloads
git clone https://github.com/1N3/IntruderPayloads
cd IntruderPayloads
./install.sh
cd && cd $secret
# massscan
sudo apt-get install git gcc make libpcap-dev
git clone https://github.com/robertdavidgraham/masscan
cd masscan
make -j
sudo make install
cd && cd $secret
# proxychains
git clone https://github.com/rofl0r/proxychains-ng
cd proxychains-ng
./configure --prefix=/usr --sysconfdir=/etc
make -j
sudo make install
sudo make install-config
cd && cd $secret
# rexgen-john
echo -e "\n${YELLOW}[!] install rexgen-john${NC}"
sudo apt-get -y install cmake bison flex libicu-dev
mkdir ~/src
cd ~/src
git clone https://github.com/vay3t/rexgen-john rexgen
cd rexgen
./install.sh
sudo ldconfig
cd && cd $secret
# john
echo -e "\n${YELLOW}[!] install john${NC}"
sudo apt-get -y install git build-essential libssl-dev zlib1g-dev
sudo apt-get -y install yasm pkg-config libgmp-dev libpcap-dev libbz2-dev
git clone https://github.com/magnumripper/JohnTheRipper john
cd john/src
./configure --enable-rexgen && make -s clean && make -sj4
cd && cd $secret
# install sublist3r
echo -e "\n${YELLOW}[!] install Sublist3r${NC}"
git clone https://github.com/aboul3la/Sublist3r
cd Sublist3r
sudo pip3 install -r requirements.txt
cd && cd $secret
# install theharvester
echo -e "\n${YELLOW}[!] install theharvester${NC}"
git clone https://github.com/laramies/theHarvester
cd theHarvester
sudo pip3 install -r requirements.txt
cd && cd $secret
# install windows-exploit-suggester
echo -e "\n${YELLOW}[!] install windows-exploit-suggester${NC}"
git clone https://github.com/GDSSecurity/Windows-Exploit-Suggester
cd Windows-Exploit-Suggester
./windows-exploit-suggester.py --update
cd && cd $secret
#install cewl
echo -e "\n${YELLOW}[!] install cewl${NC}"
git clone https://github.com/digininja/CeWL
cd CeWL
bundle install
ruby -W0 ./cewl.rb
cd && cd $secret
# install metasploit
echo -e "\n${YELLOW}[!] install metasploit${NC}"
cd /opt
sudo git clone https://github.com/rapid7/metasploit-framework.git
sudo chown -R `whoami` /opt/metasploit-framework
gem install bundler
bundle install
sudo bash -c 'for MSF in $(ls msf*); do ln -s /opt/metasploit-framework/$MSF /usr/local/bin/$MSF;done'
echo "export PATH=$PATH:/usr/lib/postgresql/11/bin" >> ~/.bashrc
sudo usermod -a -G postgres `whoami`
sudo su - `whoami`
cd /opt/metasploit-framework/
sudo msfupdate
msfdb init
cd && cd $secret
# install aircrack-ng
echo -e "\n${YELLOW}[!] install aircrack-ng${NC}"
sudo apt install -y autoconf automake libtool
sudo apt install -y libssl-dev libgcrypt20-dev libnl-3-dev libnl-genl-3-dev ethtool
wget https://download.aircrack-ng.org/aircrack-ng-1.6.tar.gz
echo "decompress aircrack-ng..."
tar -zxvf aircrack-ng-1.6.tar.gz
rm aircrack-ng-1.6.tar.gz
cd aircrack-ng-1.6
./autogen.sh
make
sudo make install
sudo airodump-ng-oui-update
cd && cd $secret
# instal mdk3
echo -e "\n${YELLOW}[!] install mdk4${NC}"
sudo apt-get install pkg-config libnl-3-dev libnl-genl-3-dev libpcap-dev
git clone https://github.com/aircrack-ng/mdk4
cd mdk4
make
sudo make install
cd && cd $secret
# install pixie-dust
echo -e "\n${YELLOW}[!] install pixie-dust${NC}"
git clone https://github.com/wiire/pixiewps
cd pixiewps*/
cd src/
make
sudo make install
cd && cd $secret
# install reaver
echo -e "\n${YELLOW}[!] install reaver${NC}"
sudo apt-get -y install build-essential libpcap-dev sqlite3 libsqlite3-dev
git clone https://github.com/t6x/reaver-wps-fork-t6x
cd reaver-wps-fork-t6x*/
cd src/
./configure
make
sudo make install
cd && cd $secret
# install shc
echo -e "\n${YELLOW}[!] install shc${NC}"
git clone https://github.com/neurobin/shc
cd shc
./configure
make
sudo make install
cd && cd $secret
# install ds_store_exp
echo -e "\n${YELLOW}[!] install ds_store_exp${NC}"
git clone https://github.com/lijiejie/ds_store_exp
cd ds_store_exp
sudo pip3 install -r requirements.txt
cd && cd $secret
# install fing
mkdir fing
cd fing
wget https://www.fing.com/images/uploads/general/CLI_Linux_Debian_5.5.2.zip
sudo dpkg -i fing-5.5.2-armhf.deb
cd && cd $secret
rm -rf fing
# install searchsploit
echo -e "\n${YELLOW}[!] install searchsploit${NC}"
sudo git clone https://github.com/offensive-security/exploitdb.git /opt/exploitdb
sed 's|path_array+=(.*)|path_array+=("/opt/exploitdb")|g' /opt/exploitdb/.searchsploit_rc > ~/.searchsploit_rc
sudo ln -sf /opt/exploitdb/searchsploit /usr/local/bin/searchsploit
# disable service
echo -e "\n${YELLOW}[!] disable services${NC}"
sudo systemctl disable apache2
sudo systemctl disable bluetooth
sudo systemctl disable dnsmasq
sudo systemctl disable mariadb
sudo systemctl disable postgresql
sudo systemctl disable tor
# update updatedb
echo -e "\n${YELLOW}[!] updatedb${NC}"
sudo updatedb
# need reboot
echo -e "\n${GREEN}[>] Need reboot${NC}"
echo "Please run 'bash post-snap-install.sh' after reboot"
##### more tools
# https://github.com/sensepost/go-out
# https://github.com/ustayready/fireprox
# https://github.com/ssh-mitm/ssh-mitm
# https://github.com/Sjord/jwtcrack
# https://github.com/hahwul/jwt-hack
# https://github.com/aircrack-ng/mdk4
# https://github.com/cathugger/mkp224o
# https://github.com/NickCarneiro/curlconverter
# https://github.com/jamhall/s3rver
# curl -sL https://deb.nodesource.com/setup_14.x | sudo -E bash -
# sudo apt-get install -y nodejs
# sudo npm install yarn -g
# https://github.com/s4vitar/rpcenum
# https://github.com/clarketm/s3recon
# https://github.com/nnposter/nndefaccts
# https://github.com/sharkdp/bat
# https://github.com/shazow/ssh-chat
# https://github.com/sharkdp/hexyl
# https://github.com/bitsadmin/wesng
# https://github.com/gtanner/qrcode-terminal
# https://github.com/evilsocket/ditto
# https://github.com/bettercap/bettercap
# https://github.com/mitmproxy/mitmproxy
# https://github.com/pry0cc/soxy
# https://github.com/s0md3v/Arjun
# https://github.com/SecureAuthCorp/impacket
# https://github.com/byt3bl33d3r/CrackMapExec
# https://github.com/samratashok/nishang
# https://github.com/BC-SECURITY/Empire
# https://github.com/nettitude/PoshC2
================================================
FILE: post-snap-install.sh
================================================
#!/bin/bash
source ~/.bashrc
function add_env(){
echo 'GOBIN=$HOME/go/bin' >> ~/.bashrc
echo 'export PATH=$PATH:$GOBIN' >> ~/.bashrc
}
grep "GOBIN" ~/.bashrc &> /dev/null && true || add_env
which go &> /dev/null
if [ $? -ne 0 ]; then
echo "please install go 'sudo snap install go --classic'"
exit
fi
function exit_trap() {
local lc="$BASH_COMMAND" rc=$?
echo "Command [$lc] exited with code [$rc]"
}
trap exit_trap err
# install golang programs
go get -u github.com/asciimoo/wuzz &>/dev/null
go get -u github.com/tomnomnom/fff &> /dev/null
go get -u github.com/tomnomnom/waybackurls &>/dev/null
go get -u github.com/tomnomnom/unfurl &>/dev/null
go get -u github.com/tomnomnom/gron &>/dev/null
go get -u github.com/tomnomnom/qsreplace &>/dev/null
go get -u github.com/tomnomnom/gf &>/dev/null
go get -u github.com/mvdan/xurls &>/dev/null
go get -u github.com/BBVA/kapow &>/dev/null
go get -u github.com/davecheney/httpstat &>/dev/null
go install github.com/OJ/gobuster/v3@latest &>/dev/null
go get -u github.com/michenriksen/aquatone &>/dev/null
go get -u github.com/ffuf/ffuf &>/dev/null
go get -u github.com/ffuf/pencode/cmd/pencode &>/dev/null
go get -u github.com/ericchiang/pup &>/dev/null
go get -u github.com/1ndianl33t/urlprobe &>/dev/null
go get -u github.com/hakluke/hakrawler &>/dev/null
go get -u github.com/haccer/subjack &>/dev/null
go get -u github.com/rverton/webanalyze/cmd/webanalyze &>/dev/null
go get -u github.com/ameenmaali/qsfuzz &>/dev/null
go get -u github.com/ameenmaali/qsinject &>/dev/null
go get -u github.com/zricethezav/gitleaks &>/dev/null
go get -u github.com/DominicBreuker/pspy &>/dev/null
go get -u github.com/liamg/traitor &>/dev/null
go get -u github.com/rverton/webanalyze &>/dev/null
go get -u github.com/goretk/redress &>/dev/null
go get -u gitlab.com/michenriksen/jdam &>/dev/null
go get -u github.com/shenwei356/rush &>/dev/null
go get -u github.com/nakabonne/pbgopy &>/dev/null
go get -u github.com/irevenko/what-anime-cli &>/dev/null
go get -u github.com/jpillora/chisel &>/dev/null
go get -u github.com/giteshnxtlvl/cook &>/dev/null
go get -u github.com/beefsack/webify &>/dev/null
go get -u github.com/ropnop/kerbrute &>/dev/null
GO111MODULE=on go get -u ktbs.dev/mubeng/cmd/mubeng &>/dev/null
GO111MODULE=on go get -u mvdan.cc/garble &>/dev/null
GO111MODULE=on go get -u github.com/OWASP/Amass/v3/... &>/dev/null
GO111MODULE=on go get -u github.com/projectdiscovery/nuclei/v2/cmd/nuclei &>/dev/null
GO111MODULE=on go get -u github.com/projectdiscovery/dnsx/cmd/dnsx &>/dev/null
GO111MODULE=on go get -u github.com/projectdiscovery/proxify/cmd/proxify &>/dev/null
GO111MODULE=on go get -u github.com/projectdiscovery/simplehttpserver/cmd/simplehttpserver &>/dev/null
GO111MODULE=auto go get -u github.com/projectdiscovery/httpx/cmd/httpx &>/dev/null
GO111MODULE=auto go get -u github.com/projectdiscovery/subfinder/v2/cmd/subfinder &>/dev/null
echo "[+] Completed"
================================================
FILE: ubuntu-installer.sh
================================================
#!/bin/bash
export DEBIAN_FRONTEND=noninteractive
# secret directory
secret=arsenal
cd
mkdir $secret
cd $secret
echo -e "\n${YELLOW}[+] folder 'secret' created${NC}"
sudo sh -c 'echo "\nDefaults timestamp_timeout=-1">>/etc/sudoers'
# update system
echo -e "\n${YELLOW}[!] update and upgrade system${NC}"
sudo apt-get update
sudo apt-get dist-upgrade -y
##### Repo #####
# install from apt-get
echo -e "\n${YELLOW}\n[!] install tools with apt-get${NC}"
sudo apt-get install -yq \
adb \
apache2 \
apropos \
arp-scan \
baobab \
curl \
default-jdk \
default-jre \
dhex \
dnsmasq \
ettercap-text-only \
evince \
fastboot \
filezilla \
flameshot \
git \
hashcat \
hexedit \
hexyl \
hostapd \
hping3 \
htop \
iperf3 \
iw \
jq \
libimage-exiftool-perl \
libreoffice \
libreoffice-l10n-es \
locate \
macchanger \
mariadb-client \
mariadb-server \
mycli \
nbtscan \
netcat \
netdiscover \
nmap \
openvpn \
php \
prips \
proxychains4 \
python3-dev \
python3-pip \
ruby-full \
s3fs \
screen \
simplescreenrecorder \
smbclient \
snapd \
tcpdump \
terminator \
tmux \
tor \
torsocks \
traceroute \
tree \
trickle \
unrar \
vim \
wipe \
wireless-tools \
wireshark-qt \
whois \
xclip \
zeal;
# aircrack-ng
sudo apt install -y aircrack-ng mdk4
##### Ruby ######
echo -e "\n${YELLOW}[!] install from gems${NC}"
sudo gem install \
wpscan \
bundle \
evil-winrm \
pedump;
##### Python #####
sudo pip3 install \
apkid \
autopep8 \
beautifulsoup4 \
cloudscraper \
diagrams \
dnspython \
dnstwist \
exrex \
fastapi \
Faker \
festin \
getsploit \
glances \
grip \
intensio-obfuscator \
myjwt \
name-that-hash \
nfstream \
nudepy \
pipreqs \
pproxy \
proxy.py \
pyautogui \
pyinstaller \
pyserv \
python-telegram-bot \
python-whois \
requests \
s3recon \
scapy \
search-that-hash \
shadowsocks \
shodan \
slowloris \
smtp-user-enum \
sqlmap \
ssh-mitm \
sshuttle \
wafw00f;
##### Snap #####
sudo snap install \
amass \
beekeeper-studio \
binwalk-spirotot \
brave \
chromium \
drawio \
john-the-ripper \
jwt-hack \
leafpad \
lolcat \
mycli \
postman \
scrcpy \
vlc;
sudo snap install code --classic
sudo snap install go --classic
sudo snap install netbeans --classic
sudo snap install node --classic
#sudo snap install intellij-idea-community --classic
#sudo snap install pycharm-community --classic
# install chrome
wget https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb
sudo dpkg -i google-chrome-stable_current_amd64.deb
rm -rf google-chrome-stable_current_amd64.deb
# Go tools
curl https://raw.githubusercontent.com/vay3t/hax0rpi/master/post-snap-install.sh | bash
##### Git #####
git clone https://github.com/maurosoria/dirsearch
git clone https://github.com/lgandx/Responder
git clone https://github.com/drwetter/testssl.sh
git clone --recursive https://github.com/evgeni/qifi.git
git clone https://github.com/trustedsec/unicorn
git clone https://github.com/L-codes/Neo-reGeorg
git clone https://github.com/defparam/smuggler
git clone https://github.com/blackarrowsec/mssqlproxy
git clone https://github.com/volatilityfoundation/volatility3
git clone https://github.com/WHK102/htrash
git clone https://github.com/PowerShellMafia/PowerSploit
git clone https://github.com/samratashok/nishang
git clone https://github.com/danielbohannon/Invoke-Obfuscation
git clone https://github.com/nnposter/nndefaccts
git clone https://github.com/CISOfy/lynis
git clone https://github.com/s4vitar/rpcenum
git clone https://github.com/magnumripper/JohnTheRipper john
git clone https://github.com/cujanovic/Open-Redirect-Payloads
git clone https://github.com/trustedsec/hate_crack
git clone https://github.com/Mr-Un1k0d3r/DKMC
git clone https://github.com/cytopia/pwncat
git clone https://github.com/m4ll0k/Atlas
git clone https://github.com/OsandaMalith/IPObfuscator
git clone https://github.com/chrispetrou/EnumSNMP
##### Wget #####
wget https://github.com/byt3bl33d3r/CrackMapExec/releases/download/v5.1.1dev/cmedb-ubuntu-latest.zip
wget https://github.com/byt3bl33d3r/CrackMapExec/releases/download/v5.1.1dev/cme-ubuntu-latest.4.zip
wget https://snapshots.mitmproxy.org/6.0.2/mitmproxy-6.0.2-linux.tar.gz
wget https://github.com/EgeBalci/amber/releases/download/v3.1/amber_linux_amd64_3.1.zip
wget https://github.com/BloodHoundAD/BloodHound/releases/download/4.0.2/BloodHound-linux-x64.zip
wget https://github.com/Studio3T/robomongo/releases/download/v1.4.3/robo3t-1.4.3-linux-x86_64-48f7dfd.tar.gz
wget https://github.com/projectdiscovery/nuclei/releases/download/v2.3.4/nuclei_2.3.4_linux_amd64.tar.gz
wget https://github.com/projectdiscovery/proxify/releases/download/v0.0.3/proxify_0.0.3_linux_amd64.tar.gz
wget https://github.com/projectdiscovery/httpx/releases/download/v1.0.5/httpx_1.0.5_linux_amd64.tar.gz
wget https://github.com/projectdiscovery/subfinder/releases/download/v2.4.7/subfinder_2.4.7_linux_amd64.tar.gz
wget https://github.com/icsharpcode/AvaloniaILSpy/releases/download/v7.0-rc1/linux-x64.zip
wget https://github.com/s4n7h0/Halcyon-IDE/releases/download/v2.0.2/Halcyon_IDE_v2.0.2.jar
wget https://github.com/angryip/ipscan/releases/download/3.7.6/ipscan_3.7.6_amd64.deb
wget https://github.com/subhra74/snowflake/releases/download/v1.0.4/snowflake-1.0.4-setup-amd64.deb
##### Install from URL #####
# joplin
wget -O - https://raw.githubusercontent.com/laurent22/joplin/dev/Joplin_install_and_update.sh | bash
# gitjacker
curl -s "https://raw.githubusercontent.com/liamg/gitjacker/master/scripts/install.sh" | sudo bash
##### npm #####
sudo npm install -g yarn
sudo npm install -g elasticdump
#sudo npm install -g curlconverter
sudo npm install -g qrcode-terminal
sudo npm install -g s3rver
sudo npm install -g apk-mitm
sudo yarn global add wappalyzer
##### Git install #####
# snmpwn
git clone https://github.com/hatlord/snmpwn.git
cd snmpwn
sudo bundle install
cd && cd $secret
# enum4linux-ng
git clone https://github.com/cddmp/enum4linux-ng
cd enum4linux-ng
sudo python3 setup.py install
cd && cd $secret
# Sherlock
git clone https://github.com/sherlock-project/sherlock.git
cd sherlock
python3 -m pip install -r requirements.txt
cd && cd $secret
# Photon
git clone https://github.com/s0md3v/Photon.git
cd Photon
sudo pip3 install -r requirements.txt
cd && cd $secret
# Impacket
git clone https://github.com/SecureAuthCorp/impacket
cd impacket
sudo python3 setup.py install
cd && cd $secret
# Sublist3r
git clone https://github.com/aboul3la/Sublist3r
cd Sublist3r
sudo pip3 install -r requirements.txt
cd && cd $secret
# spiderfoot
git clone https://github.com/smicallef/spiderfoot.git
cd spiderfoot
sudo pip3 install -r requirements.txt
cd && cd $secret
# theHarvester
git clone https://github.com/laramies/theHarvester
cd theHarvester
sudo pip3 install -r requirements.txt
cd && cd $secret
# git-dumper
git clone https://github.com/arthaud/git-dumper
cd git-dumper
sudo pip3 install -r requirements.txt
cd && cd $secret
# wesng
git clone https://github.com/bitsadmin/wesng
cd wesng
sudo python3 setup.py install
cd && cd $secret
# RsaCtfTool
git clone https://github.com/Ganapati/RsaCtfTool
cd RsaCtfTool
sudo apt-get install libgmp3-dev libmpc-dev -y
pip3 install -r requirements.txt
cd && cd $secret
# uncompyle6
git clone https://github.com/rocky/python-uncompyle6
cd python-uncompyle6
sudo python3 setup.py install
cd && cd $secret
# smbmap
git clone https://github.com/ShawnDEvans/smbmap
cd smbmap
python3 -m pip install -r requirements.txt
cd && cd $secret
# salamandra
sudo apt-get install rtl-sdr -y
git clone https://github.com/eldraco/Salamandra
# crowbar
git clone https://github.com/galkan/crowbar
cd crowbar/
pip3 install -r requirements.txt
cd && cd $secret
# SSRFmap
git clone https://github.com/swisskyrepo/SSRFmap
cd SSRFmap/
sudo pip3 install -r requirements.txt
cd && cd $secret
# s3viewer
git clone https://github.com/SharonBrizinov/s3viewer
cd s3viewer
python3 -m pip install -r packaging/requirements.txt
cd && cd $secret
# dotdotslash
git clone https://github.com/jcesarstef/dotdotslash
cd dotdotslash
sudo pip3 install -r requirements.txt
cd && cd $secret
# ntlm_theft
git clone https://github.com/Greenwolf/ntlm_theft
cd ntlm_theft
sudo pip3 install xlsxwriter
cd && cd $secret
# jwtcrack
git clone https://github.com/Sjord/jwtcrack
cd jwtcrack
sudo pip3 install -r requirements.txt
cd && cd $secret
# ccat
git clone https://github.com/cisco-config-analysis-tool/ccat
cd ccat
sudo pip3 install -r requirements.txt
cd && cd $secret
# wss
git clone https://github.com/WHK102/wss
cd wss
sudo pip3 install -r requirements.txt
cd && cd $secret
# fing
mkdir finggg
cd finggg
wget https://www.fing.com/images/uploads/general/CLI_Linux_Debian_5.5.2.zip
unzip CLI_Linux_Debian_5.5.2.zip
sudo dpkg -i fing-5.5.2-amd64.deb
cd ..
rm -rf finggg
cd && cd $secret
# searchsploit
sudo git clone https://github.com/offensive-security/exploitdb.git /opt/exploitdb
sudo ln -sf /opt/exploitdb/searchsploit /usr/local/bin/searchsploit
# metasploit
wget "https://apt.metasploit.com/$(curl -s https://apt.metasploit.com/ | grep 'amd64.deb' | tail -1 | cut -d '"' -f 2)"
sudo dpkg -i metasploit*.deb
rm metasploit*.deb
cd && cd $secret
# cewl
echo -e "\n${YELLOW}[!] install cewl${NC}"
git clone https://github.com/digininja/CeWL
cd CeWL
bundle install
cd && cd $secret
# intruder payloads
git clone https://github.com/1N3/IntruderPayloads
cd IntruderPayloads
./install.sh
cd && cd $secret
# eaphammer
git clone https://github.com/s0lst1c3/eaphammer
# hcxtools
git clone https://github.com/ZerBea/hcxtools
cd hcxtools
make
sudo make install
cd && cd $secret
# onesixtyone
git clone https://github.com/trailofbits/onesixtyone
cd onesixtyone
make
sudo make install
cd && cd $secret
# 3proxy
git clone https://github.com/z3apa3a/3proxy
cd 3proxy
ln -s Makefile.Linux Makefile
make
sudo make install
cd && cd $secret
# Radamsa
sudo apt-get install gcc make git wget
git clone https://gitlab.com/akihe/radamsa.git && cd radamsa && make && sudo make install
cd && cd $secret
# Sublime text
wget -qO - https://download.sublimetext.com/sublimehq-pub.gpg | sudo apt-key add -
sudo apt-get install apt-transport-https -y
echo "deb https://download.sublimetext.com/ apt/stable/" | sudo tee /etc/apt/sources.list.d/sublime-text.list
sudo apt-get update
sudo apt-get install sublime-text -y
# oletools
git clone https://github.com/decalage2/oletools
cd oletools
sudo python3 setup.py install
cd && cd $secret
# PCredz
git clone https://github.com/lgandx/PCredz
apt install python3-pip -y && sudo apt-get install libpcap-dev -y && pip3 install Cython && pip3 install python-libpcap
# Hydra
sudo apt-get install -y libssl-dev libssh-dev libidn11-dev libpcre3-dev \
libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \
firebird-dev libmemcached-dev libgpg-error-dev \
libgcrypt11-dev libgcrypt20-dev
git clone https://github.com/vanhauser-thc/thc-hydra
cd thc-hydra
./configure
make
sudo make install
cd && cd $secret
##### Download git release and more
function websocat_install(){
echo "Installing latest version of websocat"
latest_version=$(curl -s https://github.com/vi/websocat/releases/ | grep "websocat_" | head -1 | cut -d'/' -f6)
curl -L "https://github.com/vi/websocat/releases/download/$latest_version/websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb" --output "websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb"
sudo dpkg -i "websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb"
rm "websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb"
}
function bat_install(){
echo "Installing latest version of bat"
latest_version=$(curl -s https://github.com/sharkdp/bat/releases | grep "bat_" | head -1 | cut -d'/' -f6)
curl -L "https://github.com/sharkdp/bat/releases/download/$latest_version/bat_$(echo $latest_version | sed 's/v//')_amd64.deb" --output "bat_$(echo $latest_version | sed 's/v//')_amd64.deb"
sudo dpkg -i "bat_$(echo $latest_version | sed 's/v//')_amd64.deb"
rm "bat_$(echo $latest_version | sed 's/v//')_amd64.deb"
}
function jdgui_install(){
echo "Installing latest version of JD-GUI"
latest_version=$(curl -s https://github.com/java-decompiler/jd-gui/releases | grep "jd-gui-" | head -1 | cut -d'/' -f6)
curl -L "https://github.com/java-decompiler/jd-gui/releases/download/$latest_version/jd-gui-$(echo $latest_version | sed 's/v//').deb" --output "jd-gui-$(echo $latest_version | sed 's/v//').deb"
sudo dpkg -i "jd-gui-$(echo $latest_version | sed 's/v//').deb"
rm "jd-gui-$(echo $latest_version | sed 's/v//').deb"
}
function starkiller_install(){
echo "Installing latest version of Starkiller"
latest_version=$(curl -s https://github.com/BC-SECURITY/Starkiller/releases | grep "starkiller-" | head -1 | cut -d'/' -f6)
curl -L "https://github.com/BC-SECURITY/Starkiller/releases/download/$latest_version/starkiller-$(echo $latest_version | sed 's/v//').AppImage" --output "starkiller-$(echo $latest_version | sed 's/v//').AppImage"
chmod +x "starkiller-$(echo $latest_version | sed 's/v//').AppImage"
}
function burp_download(){
echo "Downloading latest version of Burpsuite Community"
latest_version=$(curl "https://portswigger.net/burp/releases/data?previousLastId=-1&lastId=-1&pageSize=10" -s | jq ".ResultSet.Results[].builds" | grep -A5 '"community"' | grep -A4 '"Linux"' | grep Version | cut -d '"' -f 4 | sort -n | tail -1)
curl -L "https://portswigger.net/burp/releases/download?product=community&version=$latest_version&type=Linux" --output burp.sh
chmod +x burp.sh
}
function hashcat_download(){
echo "Downloading latest version of hashcat"
latest_version=$(curl -s https://github.com/hashcat/hashcat/releases | grep "hashcat-" | head -1 | cut -d'/' -f6)
curl -L "https://github.com/hashcat/hashcat/releases/download/$latest_version/hashcat-$(echo $latest_version | sed 's/v//').7z" --output "hashcat-$(echo $latest_version | sed 's/v//').7z"
7z x "hashcat-$(echo $latest_version | sed 's/v//').7z"
rm "hashcat-$(echo $latest_version | sed 's/v//').7z"
}
function frp_download(){
echo "Downloading latest version of fast reverse proxy"
latest_version=$(curl -s https://github.com/fatedier/frp/releases | grep "frp_" | head -1 | cut -d'/' -f6)
curl -L "https://github.com/fatedier/frp/releases/download/$latest_version/frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz" --output "frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz"
tar xzvf "frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz"
rm "frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz"
}
function powershell_installer(){
echo "Installing latest version of powershell"
latest_version="$(curl -s https://github.com/PowerShell/PowerShell/releases | grep powershell_ | cut -d "/" -f6 | grep -E "^v" | head -1)"
curl -L "https://github.com/PowerShell/PowerShell/releases/download/$latest_version/powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb" --output "powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb"
sudo dpkg -i "powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb"
sudo apt install -f
rm "powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb"
}
# run functions
websocat_install
bat_install
jdgui_install
starkiller_install
burp_download
hashcat_download
frp_download
# Install empire
powershell_installer
sudo pip3 install poetry
git clone --recursive https://github.com/BC-SECURITY/Empire.git
cd Empire
sudo ./setup/install.sh
sudo poetry install
cd && cd $secret
# disable service
echo -e "\n${YELLOW}[!] disable services${NC}"
sudo systemctl disable apache2
sudo systemctl disable bluetooth
sudo systemctl disable dnsmasq
sudo systemctl disable mariadb
sudo systemctl disable postgresql
sudo systemctl disable tor
#install_rustbuster() {
# echo "Installing latest version of Rustbuster"
# latest_version=`curl -s https://github.com/phra/rustbuster/releases | grep "rustbuster-v" | head -n1 | cut -d'/' -f6`
# echo "Latest release: $latest_version"
# mkdir -p /opt/rustbuster
# wget -qP /opt/rustbuster https://github.com/phra/rustbuster/releases/download/$latest_version/rustbuster-$latest_version-x86_64-unknown-linux-gnu
# ln -fs /opt/rustbuster/rustbuster-$latest_version-x86_64-unknown-linux-gnu /opt/rustbuster/rustbuster
# chmod +x /opt/rustbuster/rustbuster
# echo "Done! Try running"
# echo "/opt/rustbuster/rustbuster -h"
#}
#install_rustbuster
sudo sed -i '$ d' /etc/sudoers
gitextract_bsa__mw_/ ├── .bashrc ├── README.md ├── hax0rpi ├── post-snap-install.sh └── ubuntu-installer.sh
Condensed preview — 5 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (36K chars).
[
{
"path": ".bashrc",
"chars": 618,
"preview": "# ~/.bashrc: executed by bash(1) for non-login shells.\n\n# Note: PS1 and umask are already set in /etc/profile. You shoul"
},
{
"path": "README.md",
"chars": 4425,
"preview": "# This project has been archived, please visit: https://github.com/nchgroup/intruder-deployer\n# hax0rpi\n\n```\npi@raspberr"
},
{
"path": "hax0rpi",
"chars": 9856,
"preview": "#!/bin/bash\n\nBLACK='\\e[30m'\nRED='\\e[31m'\nGREEN='\\e[32m'\nYELLOW='\\e[33m'\nBLUE='\\e[34m'\nPURPLE='\\e[35m'\nCYAN='\\e[36m'\nWHIT"
},
{
"path": "post-snap-install.sh",
"chars": 2928,
"preview": "#!/bin/bash\n\nsource ~/.bashrc\n\nfunction add_env(){\n\techo 'GOBIN=$HOME/go/bin' >> ~/.bashrc\n\techo 'export PATH=$PATH:$GOB"
},
{
"path": "ubuntu-installer.sh",
"chars": 16599,
"preview": "#!/bin/bash\nexport DEBIAN_FRONTEND=noninteractive\n\n# secret directory\nsecret=arsenal\ncd\nmkdir $secret\ncd $secret\necho -e"
}
]
About this extraction
This page contains the full source code of the vay3t/hax0rpi GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 5 files (33.6 KB), approximately 10.7k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.