Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked AutoSploit v3.0 release: Automated Mass Exploiter


itsMe

Recommended Posts

This is the hidden content, please

AutoSploit

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started

Operational Security Consideration

Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available.

The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent.

Changelog v3.0


Features

  •     New Terminal. Now also supports;
  •         Custom Commands
  •         Command Histor
  •         Native binary execution (/bin & /sbin)
  •     Host file backup support
  •     Options to renew or reset API tokens


This is the hidden content, please

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.