From 8e4816801caaf2751bfcb945f0bfcca06ba3d4e0 Mon Sep 17 00:00:00 2001 From: Ekultek Date: Thu, 1 Mar 2018 11:43:46 -0600 Subject: [PATCH 01/12] Added a helpful link directory --- README.md | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 850d373..33c8146 100644 --- a/README.md +++ b/README.md @@ -9,6 +9,14 @@ Receiving back connections on your local machine might not be the best idea from The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent. +# Helpful links + - [Usage](https://github.com/NullArray/AutoSploit#usage) + - [Dependencies](https://github.com/NullArray/AutoSploit#dependencies) + - [User Manual](https://github.com/NullArray/AutoSploit/wiki) + - [Shoutouts](https://github.com/NullArray/AutoSploit#acknowledgements) + - [Development](https://github.com/NullArray/AutoSploit#active-development) + - [Discord server](https://discord.gg/9BeeZQk) + ## Usage Clone the repo. Or deploy via Docker. Details for which can be found [here](https://github.com/NullArray/AutoSploit/tree/master/Docker) @@ -113,10 +121,13 @@ And thanks to [Khast3x](https://github.com/khast3x) for setting up Docker suppor ### Active Development + While this isn't exactly a Beta release it is an early release nonetheless as such the tool might be subject to changes in the future. I've been working on the new version of the tool in an open source capacity with the help of a number of developers -that have expressed an interest in doing so. The new version will include extra features such as the ability to load in a custom target and exploit list among many more enhancements. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta) +that have expressed an interest in doing so. The new version will include extra features such as the ability to load in a custom target and exploit list among many more enhancements. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta). + +If you need some help understanding the code, or want to chat with some other AutoSploit community members, feel free to join our [Discord chat](https://discord.gg/9BeeZQk). ### Note From 33671f25d5393cff0f740acae7129fb06ecc5010 Mon Sep 17 00:00:00 2001 From: NullArray Date: Thu, 1 Mar 2018 17:53:20 +0000 Subject: [PATCH 02/12] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 33c8146..c7ebacf 100644 --- a/README.md +++ b/README.md @@ -122,7 +122,7 @@ And thanks to [Khast3x](https://github.com/khast3x) for setting up Docker suppor ### Active Development -While this isn't exactly a Beta release it is an early release nonetheless as such the tool might be subject to changes in the future. +While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future. I've been working on the new version of the tool in an open source capacity with the help of a number of developers that have expressed an interest in doing so. The new version will include extra features such as the ability to load in a custom target and exploit list among many more enhancements. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta). From 425799885ca026f075ea07c8b3ce593e33d9de4b Mon Sep 17 00:00:00 2001 From: NullArray Date: Thu, 1 Mar 2018 18:34:12 +0000 Subject: [PATCH 03/12] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c7ebacf..3fc99e1 100644 --- a/README.md +++ b/README.md @@ -125,7 +125,7 @@ And thanks to [Khast3x](https://github.com/khast3x) for setting up Docker suppor While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future. I've been working on the new version of the tool in an open source capacity with the help of a number of developers -that have expressed an interest in doing so. The new version will include extra features such as the ability to load in a custom target and exploit list among many more enhancements. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta). +that have expressed an interest in doing so. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta). If you need some help understanding the code, or want to chat with some other AutoSploit community members, feel free to join our [Discord chat](https://discord.gg/9BeeZQk). From 7c0ea6b0b34ff225ac7c7e402718c5a172bc25dc Mon Sep 17 00:00:00 2001 From: NullArray Date: Thu, 1 Mar 2018 18:41:31 +0000 Subject: [PATCH 04/12] Update README.md --- README.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/README.md b/README.md index 3fc99e1..e4b81a3 100644 --- a/README.md +++ b/README.md @@ -127,6 +127,8 @@ While this isn't exactly a Beta release, AutoSploit 2.0 is an early release none I've been working on the new version of the tool in an open source capacity with the help of a number of developers that have expressed an interest in doing so. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta). +If you would like to contribute to the development of this project please be sure to read [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md) as it contains our contribution guidelines. + If you need some help understanding the code, or want to chat with some other AutoSploit community members, feel free to join our [Discord chat](https://discord.gg/9BeeZQk). ### Note From f17bcf867cf67d39de61f10a5a044c619e3db3ff Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Camille=20Eyri=C3=A8s?= Date: Sun, 4 Mar 2018 22:22:03 +0100 Subject: [PATCH 05/12] Adding a python version check in main.py: python version must be a 2.x one. --- autosploit/main.py | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/autosploit/main.py b/autosploit/main.py index 58e7694..5badba7 100644 --- a/autosploit/main.py +++ b/autosploit/main.py @@ -29,6 +29,13 @@ def main(): logo() info("welcome to autosploit, give us a little bit while we configure") + + # verify if we are running python 2.X + misc_info("checking python version") + if not sys.version_info[0] == 2: # if we are not running a python version 2.X + error("Your Python installation seems to be incompatible with AutoSploit. You should try using Python 2.x") + exit() + misc_info("checking for disabled services") # according to ps aux, postgre and apache2 are the names of the services service_names = ("postgres", "apache2") From 96d7a45372f18662dd97593050cb2757342dad85 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Camille=20Eyri=C3=A8s?= Date: Sun, 4 Mar 2018 23:22:45 +0100 Subject: [PATCH 06/12] Added french translation ! --- README-fr.md | 170 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 170 insertions(+) create mode 100644 README-fr.md diff --git a/README-fr.md b/README-fr.md new file mode 100644 index 0000000..43e0ef0 --- /dev/null +++ b/README-fr.md @@ -0,0 +1,170 @@ +# AutoSploit + +Comme vous pouvez l'imaginer au vu du nom de ce projet, AutoSploit automatise l'exploitation d'hôtes distantes connectées à internet. Les adresses des hôtes à attaquer sont collectées automatiquement grâce à l'aide de Shodan, Censys et Zoomeye. Vous pouvez également utiliser vos propres listes de cibles. +Les modules Metasploit disponibles ont été sélectionnés afin de faciliter l'obtention d'exécution de code à distance ( Remote Code Execution, ou RCE ), qui permettent ensuite de créer des sessions terminal inversées ( reverse shell ) ou meterpreter ( via metasploit ). + + + +**Ne soyez pas stupides** + +Recevoir les connexions de vos victimes directement sur votre ordinateur n'est pas vraiment une bonne idée. Vous devriez considérer l'option de dépenser quelques euros dans un VPS ( ou VPN ). + +La nouvelle version d'AutoSploit permet néanmoins de définir un proxy et un User-Agent personalisé. + +# Liens utiles + + - [Utilisation](https://github.com/NullArray/AutoSploit/README-fr.md#Utilisation) + - [Installation](https://github.com/NullArray/AutoSploit/README-fr.md#Installation) + - [Dépendances](https://github.com/NullArray/AutoSploit/README-fr.md#Dépendances)) + - [Wiki](https://github.com/NullArray/AutoSploit/wiki) + - [Extensive usage breakdown](https://github.com/NullArray/AutoSploit/wiki/Usage#usage-options) + - [Captures d'écran](https://github.com/NullArray/AutoSploit/wiki/Examples-and-images) + - [Rapporter un bug, donner une idée](https://github.com/NullArray/AutoSploit/wiki/Bugs-and-ideas#bugs) + - [Lignes directrices du développement](https://github.com/NullArray/AutoSploit/wiki/Development-information#development-of-autosploit) + - [Développement](https://github.com/NullArray/AutoSploit/README-fr.md#Développement) + - [Serveur discord ( en anglais, mais ne vous découragez pas ! )](https://discord.gg/9BeeZQk) + + +# Installation + +Installer AutoSploit est un jeu d'enfant. Vous pouvez trouver la dernière version stable [ici](https://github.com/NullArray/AutoSploit/releases/tag/2.0). Vous pouvez aussi télécharger la branche ``master`` en [zip](https://github.com/NullArray/AutSploit/zipball/master) ou en [tarball](https://github.com/NullArray/AutSploit/tarball/master). Vous pouvez également suivre une des méthodes ci-dessous; + +###### Cloner + +```bash +sudo -s << EOF +git clone https://github.com/NullArray/Autosploit.git +cd AutoSploit +pip2 install -r requirements.txt +python2 autosploit.py +EOF +``` + +###### Docker + +```bash +sudo -s << EOF +git clone https://github.com/NullArray/AutoSploit.git +cd AutoSploit/Docker +docker network create -d bridge haknet +docker run --network haknet --name msfdb -e POSTGRES_PASSWORD=s3cr3t -d postgres +docker build -t autosploit . +docker run -it --network haknet -p 80:80 -p 443:443 -p 4444:4444 autosploit +EOF +``` + +Plus d'informations sur la façon d'utiliser Docker [ici](https://github.com/NullArray/AutoSploit/tree/master/Docker) + +## Utilisation + +L'ouverture du programme avec `python autosploit.py` devrait ouvrir une session terminal AutoSploit. Les options sont les suivantes ( en anglais ). + +``` +1. Usage And Legal +2. Gather Hosts +3. Custom Hosts +4. Add Single Host +5. View Gathered Hosts +6. Exploit Gathered Hosts +99. Quit +``` + +Sélectionner l'option `2` vous demandra de choisir quel type d'hôtes rechercher. Vous pouvez par exemple rentrer `IIS` ou `Apache`. Ensuite, on vous demandera quel moteurs de recherches doivent être utilisés lors de la recherche. Si tout fontionne correctement, les hôtes collectées seront sauvegardées et utilisables dans le menu d'exploitation ( `Exploit` ) + +Depuis la version 2.0, AutoSploit peut être lancé avec des arguments/drapeaux. Pour en savoir plus, exécutez `python autosploit.py -h`. +Pour référence, voici les options ( en anglais ). + +``` +usage: python autosploit.py -[c|z|s|a] -[q] QUERY + [-C] WORKSPACE LHOST LPORT [-e] + [--ruby-exec] [--msf-path] PATH [-E] EXPLOIT-FILE-PATH + [--rand-agent] [--proxy] PROTO://IP:PORT [-P] AGENT + +optional arguments: + -h, --help show this help message and exit + +search engines: + possible search engines to use + + -c, --censys use censys.io as the search engine to gather hosts + -z, --zoomeye use zoomeye.org as the search engine to gather hosts + -s, --shodan use shodan.io as the search engine to gather hosts + -a, --all search all available search engines to gather hosts + +requests: + arguments to edit your requests + + --proxy PROTO://IP:PORT + run behind a proxy while performing the searches + --random-agent use a random HTTP User-Agent header + -P USER-AGENT, --personal-agent USER-AGENT + pass a personal User-Agent to use for HTTP requests + -q QUERY, --query QUERY + pass your search query + +exploits: + arguments to edit your exploits + + -E PATH, --exploit-file PATH + provide a text file to convert into JSON and save for + later use + -C WORKSPACE LHOST LPORT, --config WORKSPACE LHOST LPORT + set the configuration for MSF (IE -C default 127.0.0.1 + 8080) + -e, --exploit start exploiting the already gathered hosts + +misc arguments: + arguments that don't fit anywhere else + + --ruby-exec if you need to run the Ruby executable with MSF use + this + --msf-path MSF-PATH pass the path to your framework if it is not in your + ENV PATH +``` + +# Dépendances + +AutoSploit exige la présence des modules Python2.7 suivants. + +``` +requests +psutil +``` + +Si vous ne les avez pas, vous pouvez les installer avec les commandes ci-dessous ( dans le dossier d'AutoSploit ): + +```bash +pip install requests psutil +``` + +ou + +```bash +pip install -r requirements.txt +``` + +Comme le programme invoque des fonctionalités du Metasploit, vous devez l'avoir installé au préalable. Vous pouvez en obtenir une copie depuis le site de Rapid7 en cliquant [ici](https://www.rapid7.com/products/metasploit/). + + + +### Développement + +Même si AutoSploit n'est pas vraiment en Béta, il est sujet à des changements dans le futur. + +Si vous souhaitez rester à jour au niveau du développement et obtenir avant tout le monde toutes les super nouvelles fonctionalités, utilisez la [branche de développement](https://github.com/NullArray/AutoSploit/tree/dev-beta). + +Si vous voulez contribuer au développement de ce projet, lisez [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md). Ce fichier contient nos lignes directrices de contribution. + +Aussi, lisez nos [standards de contribution](https://github.com/NullArray/AutoSploit/wiki/Development-information#contribution-standards) avant d'envoyer une pull request. + +Si vous souhaitez obtenir de l'aide avec le code, ou juste partager avec les autres membres de la communauté d'AutoSploit, rejoignez-nous sur notre [serveur Discord](https://discord.gg/9BeeZQk). ( Nous ne mordons pas ) + +## Note + +Si vous rencontrez un bug et que vous souhaitez le signaler, [ouvrez un ticket](https://github.com/NullArray/AutoSploit/issues). + +Merci d'avance. + +Traduction par [jesuiscamille](https://github.com/jesuiscamille). J'ai probablement fait des erreurs de conjugaison/orthographe/traduction. N'hésitez pas à juste [ouvrir un ticket](https://github.com/NullArray/AutoSploit/issues), c'est rapide et ça nous encourage :) ! From 313019416738294066a09a42d986b97d3e61e4b5 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Camille=20Eyri=C3=A8s?= Date: Sun, 4 Mar 2018 23:25:02 +0100 Subject: [PATCH 07/12] fixed markdown error --- README-fr.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README-fr.md b/README-fr.md index 43e0ef0..2d86abe 100644 --- a/README-fr.md +++ b/README-fr.md @@ -7,7 +7,8 @@ Les modules Metasploit disponibles ont été sélectionnés afin de faciliter l' Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started --!> -**Ne soyez pas stupides** + +**Ne soyez pas stupides** Recevoir les connexions de vos victimes directement sur votre ordinateur n'est pas vraiment une bonne idée. Vous devriez considérer l'option de dépenser quelques euros dans un VPS ( ou VPN ). From 9b62b843a577ba8312c816a9aa7a8af83363b0a1 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Camille=20Eyri=C3=A8s?= Date: Sun, 4 Mar 2018 23:29:49 +0100 Subject: [PATCH 08/12] Damn, these comments really breaks the markdown. Removing them. --- README-fr.md | 5 ----- 1 file changed, 5 deletions(-) diff --git a/README-fr.md b/README-fr.md index 2d86abe..fdc6066 100644 --- a/README-fr.md +++ b/README-fr.md @@ -3,11 +3,6 @@ Comme vous pouvez l'imaginer au vu du nom de ce projet, AutoSploit automatise l'exploitation d'hôtes distantes connectées à internet. Les adresses des hôtes à attaquer sont collectées automatiquement grâce à l'aide de Shodan, Censys et Zoomeye. Vous pouvez également utiliser vos propres listes de cibles. Les modules Metasploit disponibles ont été sélectionnés afin de faciliter l'obtention d'exécution de code à distance ( Remote Code Execution, ou RCE ), qui permettent ensuite de créer des sessions terminal inversées ( reverse shell ) ou meterpreter ( via metasploit ). - - - **Ne soyez pas stupides** Recevoir les connexions de vos victimes directement sur votre ordinateur n'est pas vraiment une bonne idée. Vous devriez considérer l'option de dépenser quelques euros dans un VPS ( ou VPN ). From 4bb01fc48ef674e2e763063014f38c1d45c920b3 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Camille=20Eyri=C3=A8s?= Date: Sun, 4 Mar 2018 23:31:00 +0100 Subject: [PATCH 09/12] removing them all ! --- README-fr.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/README-fr.md b/README-fr.md index fdc6066..37e677e 100644 --- a/README-fr.md +++ b/README-fr.md @@ -143,8 +143,6 @@ pip install -r requirements.txt Comme le programme invoque des fonctionalités du Metasploit, vous devez l'avoir installé au préalable. Vous pouvez en obtenir une copie depuis le site de Rapid7 en cliquant [ici](https://www.rapid7.com/products/metasploit/). - - ### Développement Même si AutoSploit n'est pas vraiment en Béta, il est sujet à des changements dans le futur. From c1c524090f4e7ebd52256b8b5cd26dc18a8b03a9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Camille=20Eyri=C3=A8s?= Date: Sun, 4 Mar 2018 23:53:00 +0100 Subject: [PATCH 10/12] git hell :( --- README.md | 170 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 170 insertions(+) create mode 100644 README.md diff --git a/README.md b/README.md new file mode 100644 index 0000000..967f25e --- /dev/null +++ b/README.md @@ -0,0 +1,170 @@ +# AutoSploit + +As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through Shodan, Censys or Zoomeye. But options to add your custom targets and host lists have been included as well. +The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured by filling out the dialog that comes up before the exploit component is started + +**Operational Security Consideration** + +Receiving back connections on your local machine might not be the best idea from an OPSEC standpoint. Instead consider running this tool from a VPS that has all the dependencies required, available. + +The new version of AutoSploit has a feature that allows you to set a proxy before you connect and a custom user-agent. + +# Helpful links + + - [Usage](https://github.com/NullArray/AutoSploit#usage) + - [Installing](https://github.com/NullArray/AutoSploit#Installation) + - [Dependencies](https://github.com/NullArray/AutoSploit#dependencies) + - [User Manual](https://github.com/NullArray/AutoSploit/wiki) + - [Extensive usage breakdown](https://github.com/NullArray/AutoSploit/wiki/Usage#usage-options) + - [Screenshots](https://github.com/NullArray/AutoSploit/wiki/Examples-and-images) + - [Reporting bugs/ideas](https://github.com/NullArray/AutoSploit/wiki/Bugs-and-ideas#bugs) + - [Development guidelines](https://github.com/NullArray/AutoSploit/wiki/Development-information#development-of-autosploit) + - [Shoutouts](https://github.com/NullArray/AutoSploit#acknowledgements) + - [Development](https://github.com/NullArray/AutoSploit#active-development) + - [Discord server](https://discord.gg/9BeeZQk) + +# Installation + +Installing AutoSploit is very simple, you can find the latest stable release [here](https://github.com/NullArray/AutoSploit/releases/tag/2.0). You can also download the master branch as a [zip](https://github.com/NullArray/AutSploit/zipball/master) or [tarball](https://github.com/NullArray/AutSploit/tarball/master) or follow one of the below methods; + +###### Cloning + +```bash +sudo -s << EOF +git clone https://github.com/NullArray/Autosploit.git +cd AutoSploit +pip2 install -r requirements.txt +python2 autosploit.py +EOF +``` + +###### Docker + +```bash +sudo -s << EOF +git clone https://github.com/NullArray/AutoSploit.git +cd AutoSploit/Docker +docker network create -d bridge haknet +docker run --network haknet --name msfdb -e POSTGRES_PASSWORD=s3cr3t -d postgres +docker build -t autosploit . +docker run -it --network haknet -p 80:80 -p 443:443 -p 4444:4444 autosploit +EOF +``` + +More information on running Docker can be found [here](https://github.com/NullArray/AutoSploit/tree/master/Docker) + +## Usage + +Starting the program with `python autosploit.py` will open an AutoSploit terminal session. The options for which are as follows. +``` +1. Usage And Legal +2. Gather Hosts +3. Custom Hosts +4. Add Single Host +5. View Gathered Hosts +6. Exploit Gathered Hosts +99. Quit +``` + +Choosing option `2` will prompt you for a platform specific search query. Enter `IIS` or `Apache` in example and choose a search engine. After doing so the collected hosts will be saved to be used in the `Exploit` component. + +As of version 2.0 AutoSploit can be started with a number of command line arguments/flags as well. Type `python autosploit.py -h` +to display all the options available to you. I've posted the options below as well for reference. + +``` +usage: python autosploit.py -[c|z|s|a] -[q] QUERY + [-C] WORKSPACE LHOST LPORT [-e] + [--ruby-exec] [--msf-path] PATH [-E] EXPLOIT-FILE-PATH + [--rand-agent] [--proxy] PROTO://IP:PORT [-P] AGENT + +optional arguments: + -h, --help show this help message and exit + +search engines: + possible search engines to use + + -c, --censys use censys.io as the search engine to gather hosts + -z, --zoomeye use zoomeye.org as the search engine to gather hosts + -s, --shodan use shodan.io as the search engine to gather hosts + -a, --all search all available search engines to gather hosts + +requests: + arguments to edit your requests + + --proxy PROTO://IP:PORT + run behind a proxy while performing the searches + --random-agent use a random HTTP User-Agent header + -P USER-AGENT, --personal-agent USER-AGENT + pass a personal User-Agent to use for HTTP requests + -q QUERY, --query QUERY + pass your search query + +exploits: + arguments to edit your exploits + + -E PATH, --exploit-file PATH + provide a text file to convert into JSON and save for + later use + -C WORKSPACE LHOST LPORT, --config WORKSPACE LHOST LPORT + set the configuration for MSF (IE -C default 127.0.0.1 + 8080) + -e, --exploit start exploiting the already gathered hosts + +misc arguments: + arguments that don't fit anywhere else + + --ruby-exec if you need to run the Ruby executable with MSF use + this + --msf-path MSF-PATH pass the path to your framework if it is not in your + ENV PATH +``` + + +## Dependencies + +AutoSploit depends on the following Python2.7 modules. + +``` +requests +psutil +``` + +Should you find you do not have these installed get them with pip like so. + +```bash +pip install requests psutil +``` + +or + +```bash +pip install -r requirements.txt +``` + +Since the program invokes functionality from the Metasploit Framework you need to have this installed also. Get it from Rapid7 by clicking [here](https://www.rapid7.com/products/metasploit/). + +## Acknowledgements + +Special thanks to [Ekultek](https://github.com/Ekultek) without whoms contributions to the project version 2.0 would have been a lot less spectacular. + +And thanks to [Khast3x](https://github.com/khast3x) for setting up Docker support. + + +### Active Development + +While this isn't exactly a Beta release, AutoSploit 2.0 is an early release nonetheless as such the tool might be subject to changes in the future. + +I've been working on the new version of the tool in an open source capacity with the help of a number of developers +that have expressed an interest in doing so. If you would like to keep up to date on all the most recent developments be sure to check out the [Development Branch](https://github.com/NullArray/AutoSploit/tree/dev-beta). + +If you would like to contribute to the development of this project please be sure to read [CONTRIBUTING.md](https://github.com/NullArray/AutoSploit/blob/master/CONTRIBUTING.md) as it contains our contribution guidelines. + +Please, also, be sure to read our [contribution standards](https://github.com/NullArray/AutoSploit/wiki/Development-information#contribution-standards) before sending pull requests + +If you need some help understanding the code, or want to chat with some other AutoSploit community members, feel free to join our [Discord server](https://discord.gg/9BeeZQk). + +### Note + +If you happen to encounter a bug please feel free to [Open a Ticket](https://github.com/NullArray/AutoSploit/issues). + +Thanks in advance. From 996db765a302ce3f4877d10dcaf25a97a4da0da2 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Camille=20Eyri=C3=A8s?= Date: Sun, 4 Mar 2018 23:56:01 +0100 Subject: [PATCH 11/12] I'll get it ! --- autosploit/main.py | 7 ------- 1 file changed, 7 deletions(-) diff --git a/autosploit/main.py b/autosploit/main.py index 5badba7..58e7694 100644 --- a/autosploit/main.py +++ b/autosploit/main.py @@ -29,13 +29,6 @@ def main(): logo() info("welcome to autosploit, give us a little bit while we configure") - - # verify if we are running python 2.X - misc_info("checking python version") - if not sys.version_info[0] == 2: # if we are not running a python version 2.X - error("Your Python installation seems to be incompatible with AutoSploit. You should try using Python 2.x") - exit() - misc_info("checking for disabled services") # according to ps aux, postgre and apache2 are the names of the services service_names = ("postgres", "apache2") From 0eb5578262fe27fcef38a9ca43fb0460d7f061e9 Mon Sep 17 00:00:00 2001 From: jesuiscamille Date: Mon, 5 Mar 2018 19:04:48 +0100 Subject: [PATCH 12/12] fixed line 18 --- README-fr.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README-fr.md b/README-fr.md index 37e677e..05e28e1 100644 --- a/README-fr.md +++ b/README-fr.md @@ -15,7 +15,7 @@ La nouvelle version d'AutoSploit permet néanmoins de définir un proxy et un Us - [Installation](https://github.com/NullArray/AutoSploit/README-fr.md#Installation) - [Dépendances](https://github.com/NullArray/AutoSploit/README-fr.md#Dépendances)) - [Wiki](https://github.com/NullArray/AutoSploit/wiki) - - [Extensive usage breakdown](https://github.com/NullArray/AutoSploit/wiki/Usage#usage-options) + - [Options d'usage extensif](https://github.com/NullArray/AutoSploit/wiki/Usage#usage-options) - [Captures d'écran](https://github.com/NullArray/AutoSploit/wiki/Examples-and-images) - [Rapporter un bug, donner une idée](https://github.com/NullArray/AutoSploit/wiki/Bugs-and-ideas#bugs) - [Lignes directrices du développement](https://github.com/NullArray/AutoSploit/wiki/Development-information#development-of-autosploit)