-
Notifications
You must be signed in to change notification settings - Fork 148
/
setup.py
189 lines (150 loc) · 5.37 KB
/
setup.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
#!/usr/bin/env python3
import sys, requests
from setuptools import setup, find_packages
setup(
name='babysploit',
version='1.5',
author='Max Bridgland',
author_email='[email protected]',
description='Beginner Pentesting Toolkit/Framework',
long_description="""# Installation Instructions:
## Using Pip
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
pip3 install babysploit
babysploit
```
In order to use `search` command you must follow steps [here](https://www.exploit-db.com/searchsploit/#install) to install the searchsploit binary!
## Building From Source
```
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
git clone https://github.com/M4cs/BabySploit.git
cd BabySploit/
python3 setup.py install
babysploit
```
## Docker Run Command
```
docker run --rm -idt --name babysploit xshuden/babysploit # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit
```
# Getting Started:
#### Setting Configuration Values:
BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically
generated and located at `./babysploit/config/config.cfg`. You can manually change configuration settings
by opening up the file and editing with a text editor or you can use the set command to set a new value for
a key. Use the set command like so:
```
set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!
```
If before running this command the rhost key had a value of 80, the rhost key after running this command has a
value of 10. You can also add configuration variables to the config by using the set command with a new key after it
like so:
```
set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!
```
Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config
until you use the `reset` command which resets the saved configuration.
#### Running A Tool
In order to run a tool all you have to do is enter the name of the tool into BabySploit. You can use the `tools` command
to display a menu with all the currently available tools. If we run tools we get the depiction:
<p align="center">
<img src="https://image.prntscr.com/image/dMlUOjFnQk_KSyru1gTQ2A.png" alt="Tools"/>
</p>
*this depiction may be outdated*
This menu will display the tools available and the description of each tool. To run a tool simply enter the tool name
into BabySploit. Ex: `ftpbruteforce` - runs the ftpbruteforce tool.
# Features (Current, In The Works, Planned):
[Visit](https://github.com/M4cs/BabySploit/projects/1) project board for tools.
- Information Gathering
- Exploitation
- Post Exploitation
- Bruteforcing
- Phishing
- Cryptography/Stenography
### Information Gathering:
- Nmap
- IP Info
- Tcpdump (In The Works)
- Datasploit (In The Works)
- Censys Lookup
- DNS Lookup
- Raccoon
- Cloudflare Bypasser
### Exploitation:
- Searchsploit
- ReverseShell Wizard
- FTP Buffer Overflow Scan
- WPSeku WordPress Vuln Scanner
### Post Exploitation:
- In The Works
### Bruteforcing:
- FTP Bruteforcer
- WPSeku WordPress Login Bruteforce
### Phishing:
- BlackEye Python
### Crypto/Stegano:
- MetaKiller
- PDFMeta
# Contributing
Feel free to contribute by making plugins or fixing bugs with a Pull Request. All contributions are helpful and will help make this a great tool.
Licensed Under [MIT](https://github.com/M4cs/BabySploit/blob/master/LICENSE.md).
Copyright (c) 2018 Syndicated Intelligence""",
long_description_content_type='text/markdown',
url='https://github.com/M4cs/BabySploit',
packages=['babysploit'],
install_requires=[
'netifaces',
'urllib3',
'humanfriendly',
'terminaltables',
'pyfiglet',
'requests',
'raccoon-scanner'
],
project_urls={
'Wiki': 'https://github.com/M4cs/BabySploit/wiki',
'Discord Server': 'https://discordapp.com/invite/7VN9VZe'
},
license='GNU General Public License v3 (GPLv3) (GPL)',
zip_safe=True,
entry_points={
'console_scripts':[
'babysploit = babysploit.__main__:main',
],
},
tests_require=[
'mock;python_version<"3"',
'pytest',
'pytest-cov'
],
classifiers=[ # Used by PyPI to classify the project and make it searchable
'Development Status :: 4 - Beta',
'Environment :: Console',
'License :: OSI Approved :: GNU General Public License v3 (GPLv3)',
'Programming Language :: Python',
'Programming Language :: Python :: 3.6',
'Programming Language :: Python :: 3.7',
'Programming Language :: Python :: Implementation :: CPython',
'Programming Language :: Python :: Implementation :: PyPy',
'Programming Language :: Python :: Implementation :: IronPython',
'Programming Language :: Python :: Implementation :: Jython',
'Intended Audience :: Developers',
'Intended Audience :: System Administrators',
'Intended Audience :: Information Technology',
'Topic :: Software Development :: Libraries :: Python Modules',
'Topic :: Software Development :: Libraries',
'Topic :: System :: Systems Administration',
'Topic :: System :: Networking',
'Topic :: Utilities',
]
)