[homepage]https://github.com/NullArray/AutoSploit[/homepage]
[tags]automation,exploit,shodan,censys,rce,metasploit,shell[/tags]
[short_descr]Automated Mass Exploiter.[/short_descr]
[long_descr]As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started[/long_descr]
[image]https://raw.githubusercontent.com/gwen001/offsectools_www/main/ad9944c8ec5f67c26e526a8be66de93f.png[/image]
[homepage]https://github.com/NullArray/AutoSploit[/homepage] [tags]automation,exploit,shodan,censys,rce,metasploit,shell[/tags] [short_descr]Automated Mass Exploiter.[/short_descr] [long_descr]As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started[/long_descr] [image]https://raw.githubusercontent.com/gwen001/offsectools_www/main/ad9944c8ec5f67c26e526a8be66de93f.png[/image]