Usage Instructions - kaotickj/K-Sploit GitHub Wiki
Using KSploit
-
YOU MUST HAVE METASPLOIT FRAMEWORK INSTALLED TO USE THIS SCRIPT!!!
- Metasploit is preinstalled in kali linux by default, but, if you do not have it for some reason, run:
sudo apt update && sudo apt install -y metasploit-framework
- For distros other than Kali Linux, see https://github.com/rapid7/metasploit-framework for install instructions
- Metasploit is preinstalled in kali linux by default, but, if you do not have it for some reason, run:
-
If you don't know if you have metasploit installed, run:
msfconsole --version
You should get a result indicating which msf version is installed: if not, see step 1.
- Set executable permission on the script (before first run only)
chmod +x ksploit.sh
- (Optional) Add K-Sploit directory to PATH
echo 'export PATH="$PATH:/path/to/K-Sploit"' >> ~/.bashrc
source ~/.bashrc
Replace
/path/to/K-Sploit
with the actual path to ksploit.sh (i.e.,/home/user/git/K-Sploit
)if you use a different shell, modify
'.bashrc'
in the commands above accordingly. For example, if you use zsh,'.bashrc'
should be replaced by'.zshrc'
in the echo and source commands above.
- Run the script
./ksploit.sh
- Press
enter
to continue
Listeners
-
Press
1
to load the listeners menu to craft and quickly deploy metasploit listeners. Choose from Windows x86/x64, Linux x86/x64, Mac/OSX, and Android listeners. -
Press
enter
to continue.
- Choose an option from the Listeners Menu
Payloads
-
Press
2
to load the Payloads Menu to quickly and easily craft metasploit payloads for a wide variety of targets (options for windows x86/x64, linux x86/x64, mac/osx, android, and python). -
Press
enter
to continue.
- Choose an option from the Payloads Menu
Windows Executable Payload Injection
- Press
3
to load the Windows executable injection menu to inject Metasploit payloads into Windows executables.
Shells
######################################################
Please note:
The Shell generation functionality has been removed.
Instead, please use Payload Forge
#######################################################