Repository: vay3t/hax0rpi Branch: master Commit: 3b9a4f92a9ef Files: 5 Total size: 33.6 KB Directory structure: gitextract_bsa__mw_/ ├── .bashrc ├── README.md ├── hax0rpi ├── post-snap-install.sh └── ubuntu-installer.sh ================================================ FILE CONTENTS ================================================ ================================================ FILE: .bashrc ================================================ # ~/.bashrc: executed by bash(1) for non-login shells. # Note: PS1 and umask are already set in /etc/profile. You should not # need this unless you want different defaults for root. PS1='${debian_chroot:+($debian_chroot)}\[\033[01;31m\]\u@\h\[\033[00m\]:\[\033[01;34m\]\w\[\033[00m\]\$ ' # umask 022 # You may uncomment the following lines if you want `ls' to be colorized: export LS_OPTIONS='--color=auto' eval "`dircolors`" alias ls='ls $LS_OPTIONS' alias ll='ls $LS_OPTIONS -al' # alias l='ls $LS_OPTIONS -lA' # # Some more alias to avoid making mistakes: # alias rm='rm -i' # alias cp='cp -i' # alias mv='mv -i' ================================================ FILE: README.md ================================================ # This project has been archived, please visit: https://github.com/nchgroup/intruder-deployer # hax0rpi ``` pi@raspberrypi:~/hax0rpi $ ./hax0rpi _ ___ _ | |__ __ ___ __/ _ \ _ __ _ __ (_) | '_ \ / _' \ \/ / | | | '__| '_ \| | | | | | (_| |> <| |_| | | | |_) | | |_| |_|\__,_/_/\_\\___/|_| | .__/|_| |_| A Raspberry Pi Hacker Tools suite by Vay3t ---------------------------------------------------------------- This installer will load a comprehensive of hacker tools suite onto your Raspberry Pi. Note that the Raspbian distribution must be installed onto the SD card before proceeding. See README (if exist) for more information. ``` # Archived Migrated to https://gitlab.com/vay3t/hax0rpi # Why I do not like to be filled with tools, so I try to put the least possible # How to run? ### git clone ``` sudo apt-get install git -y git clone https://github.com/vay3t/hax0rpi cd hax0rpi chmod +x hax0rpi ./hax0rpi cd sudo rm -r hax0rpi/ sudo reboot ``` ### curl ``` sudo apt-get install curl -y curl -s https://raw.githubusercontent.com/vay3t/hax0rpi/master/hax0rpi | bash sudo reboot ``` # How to install Raspbian from Linux ``` wget https://downloads.raspberrypi.org/raspbian_lite/images/raspbian_lite-2020-02-14/2020-02-13-raspbian-buster-lite.zip unzip 2020-02-13-raspbian-buster-lite.zip umount /dev/mmcblk0p1 umount /dev/mmcblk0p2 dd bs=4M if=2020-02-13-raspbian-buster-lite.img of=/dev/mmcblk0 ``` more information: [https://www.raspberrypi.org/documentation/installation/installing-images/linux.md](https://www.raspberrypi.org/documentation/installation/installing-images/linux.md) # Tools List (not updated) ### Installed via apt-get: * apache2 - http daemon * arp-scan - scans lan * crunch - password list generator * curl - * dhex - * dnsmasq - DNS forwarder * dsniff - packet sniffer * ettercap-text-only - packet sniffer * gdb - gnu debugger * git - development tool for cloning repositories * hexedit - * hostapd - wireless utility for hosting an access point * hydra - Login bruteforce utility * iw - wireless utilities * john - * kismet - * libimage-exiftool-perl - perl tool for metadata files * locate - local file location database * macchanger - utility to change network MAC address * masscan - Port scanning utility * mariadb-client - mariadb database client * mariadb-server - mariadb database server * nbtscan - Utility for scanning Windows or Samba network shares * nmap - Port scanning utility * mycli - mysql client * openvpn - VPN software * php - Dynamic scripting language for web applications * proxychains - Utility to forward selected apps through a proxy or chain of proxies * python-dev - Python development libraries * python-pip - Python packages * ruby-full - install ruby * screen - screen terminal * smbclient - samba client * sslstrip - Utility to scan for HTTPS connections and obfuscate to non-SSL addresses * tcpdump - Packet sniffing utility * tmux - terminal with anabolics * tor - Anonymous onion routing * torsocks - utility socks for tor * tree - Directory listing utility * vim - text editor and IDE * wipe - Secure drive/data erasure utility * wireless-tools - Linux Wireless tools * whois - internet address lookup utility ### Python tools: * scapy * crackmapexec * wafw00f * sqlmap * shodan ### Miscellanous: * pixiewps - Offline WiFi protected setup brute-force utility * reaver - Wifi cracking utility * aircrack-ng - wifi cracking utility * mdk4 - aircrack utility? * cewl - Ruby utility to spider a website, collecting data for password cracking * Windows exploit suggester - self-explanatory, compares Windows patch level against vulnerabilities * commix - utility to exploit web vulnerabilities through query command injection * theharvester - utility to gather searchable open information about a host address * exploit database - command line utility to search exploit database * rock3tman - script to setup a VPN * Kali Linux Windows binaries - win32 binaries for use on windows systems * metasploit - exploitation framework * anemone * wpscan # New tools? I accept suggestions ================================================ FILE: hax0rpi ================================================ #!/bin/bash BLACK='\e[30m' RED='\e[31m' GREEN='\e[32m' YELLOW='\e[33m' BLUE='\e[34m' PURPLE='\e[35m' CYAN='\e[36m' WHITE='\e[37m' NC='\e[0m' if [ `lsb_release -i | awk '{print $3}'` != Raspbian ]; then echo -e "\n${RED}[*] Your distro is not supported\n${NC}" exit 1 fi echo -e "${CYAN} _ ___ _ " echo " | |__ __ ___ __/ _ \ _ __ _ __ (_) " echo " | '_ \ / _' \ \/ / | | | '__| '_ \| | " echo " | | | | (_| |> <| |_| | | | |_) | | " echo ' |_| |_|\__,_/_/\_\\___/|_| | .__/|_| ' echo " |_| " echo -e "${NC}" echo -e "${RED} === hax0rpi Release 1.2 === ${NC}" echo -e "${RED} codename: Maromota Dorada ${NC}" echo -e "${YELLOW} A Raspberry Pi Hacker Tools suite by Vay3t ${NC}" echo "" echo "----------------------------------------------------------------" echo -e "${GREEN} This installer will load a comprehensive of hacker tools " echo " suite onto your Raspberry Pi. Note that the Raspbian " echo " distribution must be installed onto the SD card before " echo -e " proceeding. See README (if exist) for more information. ${NC}" echo "" echo -e "${CYAN}[>] Press ENTER to continue, CTRL+C to abort.${NC}" read INPUT echo "" # change password #passwd pi echo -e "${YELLOW}[!] enable ssh${NC}" sudo systemctl enable ssh # secret directory secret=arsenal cd mkdir $secret && cd $secret echo -e "\n${YELLOW}[+] folder 'secret' created${NC}" # update system echo -e "\n${YELLOW}[!] update and upgrade system${NC}" sudo apt-get update sudo apt-get dist-upgrade -y # install from apt-get echo -e "\n${YELLOW}\n[!] install tools with apt-get${NC}" sudo apt-get install -y \ apache2 \ arp-scan \ crunch \ curl \ dhex \ dnsmasq \ dsniff \ ettercap-text-only \ git \ hexedit \ hostapd \ hydra \ iw \ kismet \ libimage-exiftool-perl \ locate \ macchanger \ mariadb-client \ mariadb-server \ mycli \ nbtscan \ netcat \ netdiscover \ nmap \ openvpn \ php \ python3-dev \ python3-pip \ ruby-full \ screen \ smbclient \ snapd \ tcpdump \ tmux \ tor \ torsocks \ tree \ vim \ wipe \ wireless-tools \ whois; # install from gems echo -e "\n${YELLOW}[!] install from gems${NC}" sudo gem install wpscan bundle evil-winrm # install from pip echo -e "\n${YELLOW}[!] install from pip${NC}" sudo apt install -y libffi-dev sudo pip3 install exrex sqlmap shodan wafw00f requests beautifulsoup4 scapy proxy.py # clone repos echo -e "\n${YELLOW}[!] clone repos${NC}" git clone https://github.com/Mebus/cupp git clone https://github.com/drwetter/testssl.sh git clone https://github.com/m4ll0k/Atlas git clone https://github.com/commixproject/commix git clone https://github.com/maurosoria/dirsearch git clone https://github.com/lgandx/Responder git clone https://github.com/vulnersCom/nmap-vulners sudo pip3 install git+https://github.com/byt3bl33d3r/python-Wappalyzer # frp wget https://github.com/fatedier/frp/releases/download/v0.33.0/frp_0.33.0_linux_arm.tar.gz tar zxvf frp_0.33.0_linux_arm.tar.gz rm frp_0.33.0_linux_arm.tar.gz # portspoof git clone https://github.com/drk1wi/portspoof cd portspoof ./configure make sudo make install cd && cd $secret # git-dumper git clone https://github.com/arthaud/git-dumper cd git-dumper sudo pip3 install -r requirements.txt cd && cd $secret # crackmapexec git clone --recursive https://github.com/byt3bl33d3r/CrackMapExec cd CrackMapExec python3 setup.py install cd && cd $secret # photon git clone https://github.com/s0md3v/Photon cd Photon sudo pip3 install -r requirements.txt cd && cd $secret # intruder payloads git clone https://github.com/1N3/IntruderPayloads cd IntruderPayloads ./install.sh cd && cd $secret # massscan sudo apt-get install git gcc make libpcap-dev git clone https://github.com/robertdavidgraham/masscan cd masscan make -j sudo make install cd && cd $secret # proxychains git clone https://github.com/rofl0r/proxychains-ng cd proxychains-ng ./configure --prefix=/usr --sysconfdir=/etc make -j sudo make install sudo make install-config cd && cd $secret # rexgen-john echo -e "\n${YELLOW}[!] install rexgen-john${NC}" sudo apt-get -y install cmake bison flex libicu-dev mkdir ~/src cd ~/src git clone https://github.com/vay3t/rexgen-john rexgen cd rexgen ./install.sh sudo ldconfig cd && cd $secret # john echo -e "\n${YELLOW}[!] install john${NC}" sudo apt-get -y install git build-essential libssl-dev zlib1g-dev sudo apt-get -y install yasm pkg-config libgmp-dev libpcap-dev libbz2-dev git clone https://github.com/magnumripper/JohnTheRipper john cd john/src ./configure --enable-rexgen && make -s clean && make -sj4 cd && cd $secret # install sublist3r echo -e "\n${YELLOW}[!] install Sublist3r${NC}" git clone https://github.com/aboul3la/Sublist3r cd Sublist3r sudo pip3 install -r requirements.txt cd && cd $secret # install theharvester echo -e "\n${YELLOW}[!] install theharvester${NC}" git clone https://github.com/laramies/theHarvester cd theHarvester sudo pip3 install -r requirements.txt cd && cd $secret # install windows-exploit-suggester echo -e "\n${YELLOW}[!] install windows-exploit-suggester${NC}" git clone https://github.com/GDSSecurity/Windows-Exploit-Suggester cd Windows-Exploit-Suggester ./windows-exploit-suggester.py --update cd && cd $secret #install cewl echo -e "\n${YELLOW}[!] install cewl${NC}" git clone https://github.com/digininja/CeWL cd CeWL bundle install ruby -W0 ./cewl.rb cd && cd $secret # install metasploit echo -e "\n${YELLOW}[!] install metasploit${NC}" cd /opt sudo git clone https://github.com/rapid7/metasploit-framework.git sudo chown -R `whoami` /opt/metasploit-framework gem install bundler bundle install sudo bash -c 'for MSF in $(ls msf*); do ln -s /opt/metasploit-framework/$MSF /usr/local/bin/$MSF;done' echo "export PATH=$PATH:/usr/lib/postgresql/11/bin" >> ~/.bashrc sudo usermod -a -G postgres `whoami` sudo su - `whoami` cd /opt/metasploit-framework/ sudo msfupdate msfdb init cd && cd $secret # install aircrack-ng echo -e "\n${YELLOW}[!] install aircrack-ng${NC}" sudo apt install -y autoconf automake libtool sudo apt install -y libssl-dev libgcrypt20-dev libnl-3-dev libnl-genl-3-dev ethtool wget https://download.aircrack-ng.org/aircrack-ng-1.6.tar.gz echo "decompress aircrack-ng..." tar -zxvf aircrack-ng-1.6.tar.gz rm aircrack-ng-1.6.tar.gz cd aircrack-ng-1.6 ./autogen.sh make sudo make install sudo airodump-ng-oui-update cd && cd $secret # instal mdk3 echo -e "\n${YELLOW}[!] install mdk4${NC}" sudo apt-get install pkg-config libnl-3-dev libnl-genl-3-dev libpcap-dev git clone https://github.com/aircrack-ng/mdk4 cd mdk4 make sudo make install cd && cd $secret # install pixie-dust echo -e "\n${YELLOW}[!] install pixie-dust${NC}" git clone https://github.com/wiire/pixiewps cd pixiewps*/ cd src/ make sudo make install cd && cd $secret # install reaver echo -e "\n${YELLOW}[!] install reaver${NC}" sudo apt-get -y install build-essential libpcap-dev sqlite3 libsqlite3-dev git clone https://github.com/t6x/reaver-wps-fork-t6x cd reaver-wps-fork-t6x*/ cd src/ ./configure make sudo make install cd && cd $secret # install shc echo -e "\n${YELLOW}[!] install shc${NC}" git clone https://github.com/neurobin/shc cd shc ./configure make sudo make install cd && cd $secret # install ds_store_exp echo -e "\n${YELLOW}[!] install ds_store_exp${NC}" git clone https://github.com/lijiejie/ds_store_exp cd ds_store_exp sudo pip3 install -r requirements.txt cd && cd $secret # install fing mkdir fing cd fing wget https://www.fing.com/images/uploads/general/CLI_Linux_Debian_5.5.2.zip sudo dpkg -i fing-5.5.2-armhf.deb cd && cd $secret rm -rf fing # install searchsploit echo -e "\n${YELLOW}[!] install searchsploit${NC}" sudo git clone https://github.com/offensive-security/exploitdb.git /opt/exploitdb sed 's|path_array+=(.*)|path_array+=("/opt/exploitdb")|g' /opt/exploitdb/.searchsploit_rc > ~/.searchsploit_rc sudo ln -sf /opt/exploitdb/searchsploit /usr/local/bin/searchsploit # disable service echo -e "\n${YELLOW}[!] disable services${NC}" sudo systemctl disable apache2 sudo systemctl disable bluetooth sudo systemctl disable dnsmasq sudo systemctl disable mariadb sudo systemctl disable postgresql sudo systemctl disable tor # update updatedb echo -e "\n${YELLOW}[!] updatedb${NC}" sudo updatedb # need reboot echo -e "\n${GREEN}[>] Need reboot${NC}" echo "Please run 'bash post-snap-install.sh' after reboot" ##### more tools # https://github.com/sensepost/go-out # https://github.com/ustayready/fireprox # https://github.com/ssh-mitm/ssh-mitm # https://github.com/Sjord/jwtcrack # https://github.com/hahwul/jwt-hack # https://github.com/aircrack-ng/mdk4 # https://github.com/cathugger/mkp224o # https://github.com/NickCarneiro/curlconverter # https://github.com/jamhall/s3rver # curl -sL https://deb.nodesource.com/setup_14.x | sudo -E bash - # sudo apt-get install -y nodejs # sudo npm install yarn -g # https://github.com/s4vitar/rpcenum # https://github.com/clarketm/s3recon # https://github.com/nnposter/nndefaccts # https://github.com/sharkdp/bat # https://github.com/shazow/ssh-chat # https://github.com/sharkdp/hexyl # https://github.com/bitsadmin/wesng # https://github.com/gtanner/qrcode-terminal # https://github.com/evilsocket/ditto # https://github.com/bettercap/bettercap # https://github.com/mitmproxy/mitmproxy # https://github.com/pry0cc/soxy # https://github.com/s0md3v/Arjun # https://github.com/SecureAuthCorp/impacket # https://github.com/byt3bl33d3r/CrackMapExec # https://github.com/samratashok/nishang # https://github.com/BC-SECURITY/Empire # https://github.com/nettitude/PoshC2 ================================================ FILE: post-snap-install.sh ================================================ #!/bin/bash source ~/.bashrc function add_env(){ echo 'GOBIN=$HOME/go/bin' >> ~/.bashrc echo 'export PATH=$PATH:$GOBIN' >> ~/.bashrc } grep "GOBIN" ~/.bashrc &> /dev/null && true || add_env which go &> /dev/null if [ $? -ne 0 ]; then echo "please install go 'sudo snap install go --classic'" exit fi function exit_trap() { local lc="$BASH_COMMAND" rc=$? echo "Command [$lc] exited with code [$rc]" } trap exit_trap err # install golang programs go get -u github.com/asciimoo/wuzz &>/dev/null go get -u github.com/tomnomnom/fff &> /dev/null go get -u github.com/tomnomnom/waybackurls &>/dev/null go get -u github.com/tomnomnom/unfurl &>/dev/null go get -u github.com/tomnomnom/gron &>/dev/null go get -u github.com/tomnomnom/qsreplace &>/dev/null go get -u github.com/tomnomnom/gf &>/dev/null go get -u github.com/mvdan/xurls &>/dev/null go get -u github.com/BBVA/kapow &>/dev/null go get -u github.com/davecheney/httpstat &>/dev/null go install github.com/OJ/gobuster/v3@latest &>/dev/null go get -u github.com/michenriksen/aquatone &>/dev/null go get -u github.com/ffuf/ffuf &>/dev/null go get -u github.com/ffuf/pencode/cmd/pencode &>/dev/null go get -u github.com/ericchiang/pup &>/dev/null go get -u github.com/1ndianl33t/urlprobe &>/dev/null go get -u github.com/hakluke/hakrawler &>/dev/null go get -u github.com/haccer/subjack &>/dev/null go get -u github.com/rverton/webanalyze/cmd/webanalyze &>/dev/null go get -u github.com/ameenmaali/qsfuzz &>/dev/null go get -u github.com/ameenmaali/qsinject &>/dev/null go get -u github.com/zricethezav/gitleaks &>/dev/null go get -u github.com/DominicBreuker/pspy &>/dev/null go get -u github.com/liamg/traitor &>/dev/null go get -u github.com/rverton/webanalyze &>/dev/null go get -u github.com/goretk/redress &>/dev/null go get -u gitlab.com/michenriksen/jdam &>/dev/null go get -u github.com/shenwei356/rush &>/dev/null go get -u github.com/nakabonne/pbgopy &>/dev/null go get -u github.com/irevenko/what-anime-cli &>/dev/null go get -u github.com/jpillora/chisel &>/dev/null go get -u github.com/giteshnxtlvl/cook &>/dev/null go get -u github.com/beefsack/webify &>/dev/null go get -u github.com/ropnop/kerbrute &>/dev/null GO111MODULE=on go get -u ktbs.dev/mubeng/cmd/mubeng &>/dev/null GO111MODULE=on go get -u mvdan.cc/garble &>/dev/null GO111MODULE=on go get -u github.com/OWASP/Amass/v3/... &>/dev/null GO111MODULE=on go get -u github.com/projectdiscovery/nuclei/v2/cmd/nuclei &>/dev/null GO111MODULE=on go get -u github.com/projectdiscovery/dnsx/cmd/dnsx &>/dev/null GO111MODULE=on go get -u github.com/projectdiscovery/proxify/cmd/proxify &>/dev/null GO111MODULE=on go get -u github.com/projectdiscovery/simplehttpserver/cmd/simplehttpserver &>/dev/null GO111MODULE=auto go get -u github.com/projectdiscovery/httpx/cmd/httpx &>/dev/null GO111MODULE=auto go get -u github.com/projectdiscovery/subfinder/v2/cmd/subfinder &>/dev/null echo "[+] Completed" ================================================ FILE: ubuntu-installer.sh ================================================ #!/bin/bash export DEBIAN_FRONTEND=noninteractive # secret directory secret=arsenal cd mkdir $secret cd $secret echo -e "\n${YELLOW}[+] folder 'secret' created${NC}" sudo sh -c 'echo "\nDefaults timestamp_timeout=-1">>/etc/sudoers' # update system echo -e "\n${YELLOW}[!] update and upgrade system${NC}" sudo apt-get update sudo apt-get dist-upgrade -y ##### Repo ##### # install from apt-get echo -e "\n${YELLOW}\n[!] install tools with apt-get${NC}" sudo apt-get install -yq \ adb \ apache2 \ apropos \ arp-scan \ baobab \ curl \ default-jdk \ default-jre \ dhex \ dnsmasq \ ettercap-text-only \ evince \ fastboot \ filezilla \ flameshot \ git \ hashcat \ hexedit \ hexyl \ hostapd \ hping3 \ htop \ iperf3 \ iw \ jq \ libimage-exiftool-perl \ libreoffice \ libreoffice-l10n-es \ locate \ macchanger \ mariadb-client \ mariadb-server \ mycli \ nbtscan \ netcat \ netdiscover \ nmap \ openvpn \ php \ prips \ proxychains4 \ python3-dev \ python3-pip \ ruby-full \ s3fs \ screen \ simplescreenrecorder \ smbclient \ snapd \ tcpdump \ terminator \ tmux \ tor \ torsocks \ traceroute \ tree \ trickle \ unrar \ vim \ wipe \ wireless-tools \ wireshark-qt \ whois \ xclip \ zeal; # aircrack-ng sudo apt install -y aircrack-ng mdk4 ##### Ruby ###### echo -e "\n${YELLOW}[!] install from gems${NC}" sudo gem install \ wpscan \ bundle \ evil-winrm \ pedump; ##### Python ##### sudo pip3 install \ apkid \ autopep8 \ beautifulsoup4 \ cloudscraper \ diagrams \ dnspython \ dnstwist \ exrex \ fastapi \ Faker \ festin \ getsploit \ glances \ grip \ intensio-obfuscator \ myjwt \ name-that-hash \ nfstream \ nudepy \ pipreqs \ pproxy \ proxy.py \ pyautogui \ pyinstaller \ pyserv \ python-telegram-bot \ python-whois \ requests \ s3recon \ scapy \ search-that-hash \ shadowsocks \ shodan \ slowloris \ smtp-user-enum \ sqlmap \ ssh-mitm \ sshuttle \ wafw00f; ##### Snap ##### sudo snap install \ amass \ beekeeper-studio \ binwalk-spirotot \ brave \ chromium \ drawio \ john-the-ripper \ jwt-hack \ leafpad \ lolcat \ mycli \ postman \ scrcpy \ vlc; sudo snap install code --classic sudo snap install go --classic sudo snap install netbeans --classic sudo snap install node --classic #sudo snap install intellij-idea-community --classic #sudo snap install pycharm-community --classic # install chrome wget https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb sudo dpkg -i google-chrome-stable_current_amd64.deb rm -rf google-chrome-stable_current_amd64.deb # Go tools curl https://raw.githubusercontent.com/vay3t/hax0rpi/master/post-snap-install.sh | bash ##### Git ##### git clone https://github.com/maurosoria/dirsearch git clone https://github.com/lgandx/Responder git clone https://github.com/drwetter/testssl.sh git clone --recursive https://github.com/evgeni/qifi.git git clone https://github.com/trustedsec/unicorn git clone https://github.com/L-codes/Neo-reGeorg git clone https://github.com/defparam/smuggler git clone https://github.com/blackarrowsec/mssqlproxy git clone https://github.com/volatilityfoundation/volatility3 git clone https://github.com/WHK102/htrash git clone https://github.com/PowerShellMafia/PowerSploit git clone https://github.com/samratashok/nishang git clone https://github.com/danielbohannon/Invoke-Obfuscation git clone https://github.com/nnposter/nndefaccts git clone https://github.com/CISOfy/lynis git clone https://github.com/s4vitar/rpcenum git clone https://github.com/magnumripper/JohnTheRipper john git clone https://github.com/cujanovic/Open-Redirect-Payloads git clone https://github.com/trustedsec/hate_crack git clone https://github.com/Mr-Un1k0d3r/DKMC git clone https://github.com/cytopia/pwncat git clone https://github.com/m4ll0k/Atlas git clone https://github.com/OsandaMalith/IPObfuscator git clone https://github.com/chrispetrou/EnumSNMP ##### Wget ##### wget https://github.com/byt3bl33d3r/CrackMapExec/releases/download/v5.1.1dev/cmedb-ubuntu-latest.zip wget https://github.com/byt3bl33d3r/CrackMapExec/releases/download/v5.1.1dev/cme-ubuntu-latest.4.zip wget https://snapshots.mitmproxy.org/6.0.2/mitmproxy-6.0.2-linux.tar.gz wget https://github.com/EgeBalci/amber/releases/download/v3.1/amber_linux_amd64_3.1.zip wget https://github.com/BloodHoundAD/BloodHound/releases/download/4.0.2/BloodHound-linux-x64.zip wget https://github.com/Studio3T/robomongo/releases/download/v1.4.3/robo3t-1.4.3-linux-x86_64-48f7dfd.tar.gz wget https://github.com/projectdiscovery/nuclei/releases/download/v2.3.4/nuclei_2.3.4_linux_amd64.tar.gz wget https://github.com/projectdiscovery/proxify/releases/download/v0.0.3/proxify_0.0.3_linux_amd64.tar.gz wget https://github.com/projectdiscovery/httpx/releases/download/v1.0.5/httpx_1.0.5_linux_amd64.tar.gz wget https://github.com/projectdiscovery/subfinder/releases/download/v2.4.7/subfinder_2.4.7_linux_amd64.tar.gz wget https://github.com/icsharpcode/AvaloniaILSpy/releases/download/v7.0-rc1/linux-x64.zip wget https://github.com/s4n7h0/Halcyon-IDE/releases/download/v2.0.2/Halcyon_IDE_v2.0.2.jar wget https://github.com/angryip/ipscan/releases/download/3.7.6/ipscan_3.7.6_amd64.deb wget https://github.com/subhra74/snowflake/releases/download/v1.0.4/snowflake-1.0.4-setup-amd64.deb ##### Install from URL ##### # joplin wget -O - https://raw.githubusercontent.com/laurent22/joplin/dev/Joplin_install_and_update.sh | bash # gitjacker curl -s "https://raw.githubusercontent.com/liamg/gitjacker/master/scripts/install.sh" | sudo bash ##### npm ##### sudo npm install -g yarn sudo npm install -g elasticdump #sudo npm install -g curlconverter sudo npm install -g qrcode-terminal sudo npm install -g s3rver sudo npm install -g apk-mitm sudo yarn global add wappalyzer ##### Git install ##### # snmpwn git clone https://github.com/hatlord/snmpwn.git cd snmpwn sudo bundle install cd && cd $secret # enum4linux-ng git clone https://github.com/cddmp/enum4linux-ng cd enum4linux-ng sudo python3 setup.py install cd && cd $secret # Sherlock git clone https://github.com/sherlock-project/sherlock.git cd sherlock python3 -m pip install -r requirements.txt cd && cd $secret # Photon git clone https://github.com/s0md3v/Photon.git cd Photon sudo pip3 install -r requirements.txt cd && cd $secret # Impacket git clone https://github.com/SecureAuthCorp/impacket cd impacket sudo python3 setup.py install cd && cd $secret # Sublist3r git clone https://github.com/aboul3la/Sublist3r cd Sublist3r sudo pip3 install -r requirements.txt cd && cd $secret # spiderfoot git clone https://github.com/smicallef/spiderfoot.git cd spiderfoot sudo pip3 install -r requirements.txt cd && cd $secret # theHarvester git clone https://github.com/laramies/theHarvester cd theHarvester sudo pip3 install -r requirements.txt cd && cd $secret # git-dumper git clone https://github.com/arthaud/git-dumper cd git-dumper sudo pip3 install -r requirements.txt cd && cd $secret # wesng git clone https://github.com/bitsadmin/wesng cd wesng sudo python3 setup.py install cd && cd $secret # RsaCtfTool git clone https://github.com/Ganapati/RsaCtfTool cd RsaCtfTool sudo apt-get install libgmp3-dev libmpc-dev -y pip3 install -r requirements.txt cd && cd $secret # uncompyle6 git clone https://github.com/rocky/python-uncompyle6 cd python-uncompyle6 sudo python3 setup.py install cd && cd $secret # smbmap git clone https://github.com/ShawnDEvans/smbmap cd smbmap python3 -m pip install -r requirements.txt cd && cd $secret # salamandra sudo apt-get install rtl-sdr -y git clone https://github.com/eldraco/Salamandra # crowbar git clone https://github.com/galkan/crowbar cd crowbar/ pip3 install -r requirements.txt cd && cd $secret # SSRFmap git clone https://github.com/swisskyrepo/SSRFmap cd SSRFmap/ sudo pip3 install -r requirements.txt cd && cd $secret # s3viewer git clone https://github.com/SharonBrizinov/s3viewer cd s3viewer python3 -m pip install -r packaging/requirements.txt cd && cd $secret # dotdotslash git clone https://github.com/jcesarstef/dotdotslash cd dotdotslash sudo pip3 install -r requirements.txt cd && cd $secret # ntlm_theft git clone https://github.com/Greenwolf/ntlm_theft cd ntlm_theft sudo pip3 install xlsxwriter cd && cd $secret # jwtcrack git clone https://github.com/Sjord/jwtcrack cd jwtcrack sudo pip3 install -r requirements.txt cd && cd $secret # ccat git clone https://github.com/cisco-config-analysis-tool/ccat cd ccat sudo pip3 install -r requirements.txt cd && cd $secret # wss git clone https://github.com/WHK102/wss cd wss sudo pip3 install -r requirements.txt cd && cd $secret # fing mkdir finggg cd finggg wget https://www.fing.com/images/uploads/general/CLI_Linux_Debian_5.5.2.zip unzip CLI_Linux_Debian_5.5.2.zip sudo dpkg -i fing-5.5.2-amd64.deb cd .. rm -rf finggg cd && cd $secret # searchsploit sudo git clone https://github.com/offensive-security/exploitdb.git /opt/exploitdb sudo ln -sf /opt/exploitdb/searchsploit /usr/local/bin/searchsploit # metasploit wget "https://apt.metasploit.com/$(curl -s https://apt.metasploit.com/ | grep 'amd64.deb' | tail -1 | cut -d '"' -f 2)" sudo dpkg -i metasploit*.deb rm metasploit*.deb cd && cd $secret # cewl echo -e "\n${YELLOW}[!] install cewl${NC}" git clone https://github.com/digininja/CeWL cd CeWL bundle install cd && cd $secret # intruder payloads git clone https://github.com/1N3/IntruderPayloads cd IntruderPayloads ./install.sh cd && cd $secret # eaphammer git clone https://github.com/s0lst1c3/eaphammer # hcxtools git clone https://github.com/ZerBea/hcxtools cd hcxtools make sudo make install cd && cd $secret # onesixtyone git clone https://github.com/trailofbits/onesixtyone cd onesixtyone make sudo make install cd && cd $secret # 3proxy git clone https://github.com/z3apa3a/3proxy cd 3proxy ln -s Makefile.Linux Makefile make sudo make install cd && cd $secret # Radamsa sudo apt-get install gcc make git wget git clone https://gitlab.com/akihe/radamsa.git && cd radamsa && make && sudo make install cd && cd $secret # Sublime text wget -qO - https://download.sublimetext.com/sublimehq-pub.gpg | sudo apt-key add - sudo apt-get install apt-transport-https -y echo "deb https://download.sublimetext.com/ apt/stable/" | sudo tee /etc/apt/sources.list.d/sublime-text.list sudo apt-get update sudo apt-get install sublime-text -y # oletools git clone https://github.com/decalage2/oletools cd oletools sudo python3 setup.py install cd && cd $secret # PCredz git clone https://github.com/lgandx/PCredz apt install python3-pip -y && sudo apt-get install libpcap-dev -y && pip3 install Cython && pip3 install python-libpcap # Hydra sudo apt-get install -y libssl-dev libssh-dev libidn11-dev libpcre3-dev \ libgtk2.0-dev libmysqlclient-dev libpq-dev libsvn-dev \ firebird-dev libmemcached-dev libgpg-error-dev \ libgcrypt11-dev libgcrypt20-dev git clone https://github.com/vanhauser-thc/thc-hydra cd thc-hydra ./configure make sudo make install cd && cd $secret ##### Download git release and more function websocat_install(){ echo "Installing latest version of websocat" latest_version=$(curl -s https://github.com/vi/websocat/releases/ | grep "websocat_" | head -1 | cut -d'/' -f6) curl -L "https://github.com/vi/websocat/releases/download/$latest_version/websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb" --output "websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb" sudo dpkg -i "websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb" rm "websocat_$(echo $latest_version | sed 's/v//')_newer_amd64.deb" } function bat_install(){ echo "Installing latest version of bat" latest_version=$(curl -s https://github.com/sharkdp/bat/releases | grep "bat_" | head -1 | cut -d'/' -f6) curl -L "https://github.com/sharkdp/bat/releases/download/$latest_version/bat_$(echo $latest_version | sed 's/v//')_amd64.deb" --output "bat_$(echo $latest_version | sed 's/v//')_amd64.deb" sudo dpkg -i "bat_$(echo $latest_version | sed 's/v//')_amd64.deb" rm "bat_$(echo $latest_version | sed 's/v//')_amd64.deb" } function jdgui_install(){ echo "Installing latest version of JD-GUI" latest_version=$(curl -s https://github.com/java-decompiler/jd-gui/releases | grep "jd-gui-" | head -1 | cut -d'/' -f6) curl -L "https://github.com/java-decompiler/jd-gui/releases/download/$latest_version/jd-gui-$(echo $latest_version | sed 's/v//').deb" --output "jd-gui-$(echo $latest_version | sed 's/v//').deb" sudo dpkg -i "jd-gui-$(echo $latest_version | sed 's/v//').deb" rm "jd-gui-$(echo $latest_version | sed 's/v//').deb" } function starkiller_install(){ echo "Installing latest version of Starkiller" latest_version=$(curl -s https://github.com/BC-SECURITY/Starkiller/releases | grep "starkiller-" | head -1 | cut -d'/' -f6) curl -L "https://github.com/BC-SECURITY/Starkiller/releases/download/$latest_version/starkiller-$(echo $latest_version | sed 's/v//').AppImage" --output "starkiller-$(echo $latest_version | sed 's/v//').AppImage" chmod +x "starkiller-$(echo $latest_version | sed 's/v//').AppImage" } function burp_download(){ echo "Downloading latest version of Burpsuite Community" latest_version=$(curl "https://portswigger.net/burp/releases/data?previousLastId=-1&lastId=-1&pageSize=10" -s | jq ".ResultSet.Results[].builds" | grep -A5 '"community"' | grep -A4 '"Linux"' | grep Version | cut -d '"' -f 4 | sort -n | tail -1) curl -L "https://portswigger.net/burp/releases/download?product=community&version=$latest_version&type=Linux" --output burp.sh chmod +x burp.sh } function hashcat_download(){ echo "Downloading latest version of hashcat" latest_version=$(curl -s https://github.com/hashcat/hashcat/releases | grep "hashcat-" | head -1 | cut -d'/' -f6) curl -L "https://github.com/hashcat/hashcat/releases/download/$latest_version/hashcat-$(echo $latest_version | sed 's/v//').7z" --output "hashcat-$(echo $latest_version | sed 's/v//').7z" 7z x "hashcat-$(echo $latest_version | sed 's/v//').7z" rm "hashcat-$(echo $latest_version | sed 's/v//').7z" } function frp_download(){ echo "Downloading latest version of fast reverse proxy" latest_version=$(curl -s https://github.com/fatedier/frp/releases | grep "frp_" | head -1 | cut -d'/' -f6) curl -L "https://github.com/fatedier/frp/releases/download/$latest_version/frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz" --output "frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz" tar xzvf "frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz" rm "frp_$(echo $latest_version | sed 's/v//')_linux_amd64.tar.gz" } function powershell_installer(){ echo "Installing latest version of powershell" latest_version="$(curl -s https://github.com/PowerShell/PowerShell/releases | grep powershell_ | cut -d "/" -f6 | grep -E "^v" | head -1)" curl -L "https://github.com/PowerShell/PowerShell/releases/download/$latest_version/powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb" --output "powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb" sudo dpkg -i "powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb" sudo apt install -f rm "powershell_$(echo $latest_version | sed 's/v//')-1.ubuntu.20.04_amd64.deb" } # run functions websocat_install bat_install jdgui_install starkiller_install burp_download hashcat_download frp_download # Install empire powershell_installer sudo pip3 install poetry git clone --recursive https://github.com/BC-SECURITY/Empire.git cd Empire sudo ./setup/install.sh sudo poetry install cd && cd $secret # disable service echo -e "\n${YELLOW}[!] disable services${NC}" sudo systemctl disable apache2 sudo systemctl disable bluetooth sudo systemctl disable dnsmasq sudo systemctl disable mariadb sudo systemctl disable postgresql sudo systemctl disable tor #install_rustbuster() { # echo "Installing latest version of Rustbuster" # latest_version=`curl -s https://github.com/phra/rustbuster/releases | grep "rustbuster-v" | head -n1 | cut -d'/' -f6` # echo "Latest release: $latest_version" # mkdir -p /opt/rustbuster # wget -qP /opt/rustbuster https://github.com/phra/rustbuster/releases/download/$latest_version/rustbuster-$latest_version-x86_64-unknown-linux-gnu # ln -fs /opt/rustbuster/rustbuster-$latest_version-x86_64-unknown-linux-gnu /opt/rustbuster/rustbuster # chmod +x /opt/rustbuster/rustbuster # echo "Done! Try running" # echo "/opt/rustbuster/rustbuster -h" #} #install_rustbuster sudo sed -i '$ d' /etc/sudoers