Files
AutoPentestX/QUICKSTART.md
gowtham-darkseid 1eda662772 commit
2025-11-30 15:05:59 +05:30

12 KiB

██╗  ██╗ █████╗  ██████╗██╗  ██╗██╗███╗   ██╗ ██████╗ 
██║  ██║██╔══██╗██╔════╝██║ ██╔╝██║████╗  ██║██╔════╝ 
███████║███████║██║     █████╔╝ ██║██╔██╗ ██║██║  ███╗
██╔══██║██╔══██║██║     ██╔═██╗ ██║██║╚██╗██║██║   ██║
██║  ██║██║  ██║╚██████╗██║  ██╗██║██║ ╚████║╚██████╔╝
╚═╝  ╚═╝╚═╝  ╚═╝ ╚═════╝╚═╝  ╚═╝╚═╝╚═╝  ╚═══╝ ╚═════╝ 
                                                        
     A U T O P E N T E S T X   Q U I C K S T A R T

SYSTEM STATUS: OPERATIONAL | SECURITY LEVEL: MAXIMUM
🎯 MISSION: Penetrate. Exploit. Dominate.


[PHASE 1] DEPLOYMENT SEQUENCE

[1.1] System Initialization

# >> ENTERING SYSTEM DIRECTORY...
cd AutoPentestX

# >> EXECUTING DEPLOYMENT PROTOCOL...
chmod +x install.sh
./install.sh

INSTALLER SEQUENCE:

[▓▓▓▓▓▓▓▓▓▓] Installing Nmap, Nikto, SQLMap...
[▓▓▓▓▓▓▓▓▓▓] Configuring Python virtual environment...
[▓▓▓▓▓▓▓▓▓▓] Loading Python dependencies...
[▓▓▓▓▓▓▓▓▓▓] Creating system directories...
[▓▓▓▓▓▓▓▓▓▓] Running system diagnostics...
[✓] DEPLOYMENT COMPLETE

[PHASE 2] ATTACK INITIATION

[2.1] System Activation

# >> ACTIVATING VIRTUAL ENVIRONMENT...
source venv/bin/activate

# >> LAUNCHING ATTACK VECTOR (authorized targets only)
python3 main.py -t 127.0.0.1

# >> ALTERNATIVE: RAPID DEPLOYMENT
./autopentestx.sh 127.0.0.1
╔═══════════════════════════════════════════════════════╗
║  [ATTACK STATUS]                                      ║
║  → Target Acquired: 127.0.0.1                        ║
║  → Systems: ONLINE                                    ║
║  → Exploit Engine: ARMED                              ║
║  → Stealth Mode: ACTIVE                               ║
╚═══════════════════════════════════════════════════════╝

[PHASE 3] INTEL EXTRACTION

[3.1] Access Report Data

# >> ACCESSING CLASSIFIED REPORTS...
ls -lh reports/

# >> DECRYPTING VULNERABILITY REPORT...
xdg-open reports/AutoPentestX_Report_*.pdf

🎮 [COMMAND ARSENAL]

[CMD-001] Full Spectrum Attack

# >> INITIATING COMPLETE PENETRATION SEQUENCE
python3 main.py -t 192.168.1.100

[CMD-002] Rapid Recon Mode

# >> STEALTH SCAN - WEB PAYLOADS DISABLED
python3 main.py -t 192.168.1.100 --skip-web

[CMD-003] Lightning Strike

# >> SPEED MODE - RECON ONLY
python3 main.py -t 192.168.1.100 --skip-web --skip-exploit

[CMD-004] Custom Operator ID

# >> REGISTERING OPERATOR CREDENTIALS
python3 main.py -t 192.168.1.100 -n "Your Name"

[CMD-HELP] System Manual

# >> ACCESSING SYSTEM DOCUMENTATION
python3 main.py --help

💾 [DATA EXTRACTION COMPLETE]

┌─────────────────────────────────────────────────────────┐
│ [CLASSIFIED] - INTELLIGENCE PACKAGE GENERATED           │
└─────────────────────────────────────────────────────────┘

[OUTPUT-001] 📄 Vulnerability Dossier (reports/)

⚠ CLASSIFIED DOCUMENT ⚠
├─ Executive Threat Summary
├─ Vulnerability Database
├─ Risk Matrix Analysis  
└─ Remediation Protocols

[OUTPUT-002] 🗄️ Intel Database (database/)

⚡ PERSISTENT STORAGE ACTIVE
├─ Complete scan data in SQLite
├─ Historical attack patterns
└─ Query interface enabled

[OUTPUT-003] 📊 Operation Logs (logs/)

📡 REAL-TIME MONITORING
├─ Execution timestamps
├─ System diagnostics
└─ Debug traces

[OUTPUT-004] 💣 Exploit Arsenal (exploits/)

⚔️ WEAPONIZED PAYLOADS
├─ Metasploit RC scripts
├─ Manual exploitation tools
└─ Attack vector documentation

🚀 [PERFORMANCE OPTIMIZATION]

╔══════════════════════════════════════════════════════╗
║           ATTACK SPEED CONFIGURATIONS                ║
╚══════════════════════════════════════════════════════╝

[MODE-01] LIGHTNING STRIKE (5-10 min)

# >> RECON ONLY - MAXIMUM SPEED
python3 main.py -t TARGET --skip-web --skip-exploit

STATUS: Rapid reconnaissance | Minimal footprint

[MODE-02] 🔥 TACTICAL ASSAULT (10-20 min)

# >> STANDARD PENETRATION - BALANCED APPROACH
python3 main.py -t TARGET --skip-exploit

STATUS: Full scan + web vulnerabilities | No exploitation

[MODE-03] 💥 TOTAL ANNIHILATION (20-30 min)

# >> FULL SPECTRUM ATTACK - ALL SYSTEMS ENGAGED
python3 main.py -t TARGET

STATUS: Complete penetration testing | All modules active


⚠️ [SYSTEM DIAGNOSTICS]

┌─────────────────────────────────────────────────┐
│  [ERROR HANDLER] - Common System Failures       │
└─────────────────────────────────────────────────┘

[ERROR-001] 🔐 ACCESS DENIED

# >> ELEVATING PRIVILEGES...
sudo python3 main.py -t TARGET

FIX: Root access required for deep system penetration

[ERROR-002] 🔌 MODULE FAILURE

# >> REACTIVATING VIRTUAL ENVIRONMENT...
source venv/bin/activate

# >> REINSTALLING CORE MODULES...
pip install -r requirements.txt

FIX: Environment not properly initialized

[ERROR-003] 🛠️ MISSING WEAPONS

# >> DOWNLOADING ATTACK TOOLS...
sudo apt-get install nikto sqlmap nmap

FIX: Essential penetration tools not found

[ERROR-004] 📄 REPORT GENERATION FAILURE

# >> REPAIRING DOCUMENT GENERATOR...
pip install --upgrade reportlab pillow

FIX: PDF library corruption detected


🎯 [COMPLETE OPERATION SEQUENCE]

# ┌─────────────────────────────────────────────────────┐
# │  [OPERATION PROTOCOL] - Full Attack Chain           │
# └─────────────────────────────────────────────────────┘

# [STEP 1] >> ENTERING SYSTEM...
cd AutoPentestX

# [STEP 2] >> POWERING UP SYSTEMS...
source venv/bin/activate

# [STEP 3] >> LAUNCHING ATTACK SEQUENCE...
python3 main.py -t 192.168.1.100 -n "Security Auditor"

# [STEP 4] >> ATTACK IN PROGRESS...
# ▓▓▓▓▓▓▓░░░ 60% | ETA: 15 minutes
# [SCANNING] [EXPLOITING] [REPORTING]

# [STEP 5] >> EXTRACTING INTELLIGENCE...
ls reports/
sqlite3 database/autopentestx.db

# [STEP 6] >> DECRYPTING REPORT...
xdg-open reports/AutoPentestX_Report_*.pdf

# [STEP 7] >> SHUTTING DOWN SYSTEMS...
deactivate

# [✓] OPERATION COMPLETE - ALL SYSTEMS NOMINAL

⚠️ Important Reminders

Before Scanning

Obtain written authorization
Document the scope
Verify you have permission
Read DISCLAIMER.md

During Scanning

Monitor progress
Be aware of network impact
Respect time windows
Keep logs for documentation

After Scanning

Review the PDF report
Validate findings
Share with authorized parties only
Follow up on remediation


🎓 Learning Path

Beginner

  1. Run basic scans on local systems
  2. Understand the PDF report
  3. Learn about common vulnerabilities
  4. Practice in lab environments

Intermediate

  1. Customize scan parameters
  2. Interpret CVE data
  3. Understand risk scoring
  4. Use Metasploit RC scripts

Advanced

  1. Integrate with CI/CD pipelines
  2. Build custom vulnerability checks
  3. Develop exploit modules
  4. Contribute to the project

📞 Need Help?


⚔️ [SYSTEM ARMED AND READY]

╔═══════════════════════════════════════════════════════╗
║                                                       ║
║     ██╗   ██╗ ██████╗ ██╗   ██╗██████╗               ║
║     ╚██╗ ██╔╝██╔═══██╗██║   ██║██╔══██╗              ║
║      ╚████╔╝ ██║   ██║██║   ██║██████╔╝              ║
║       ╚██╔╝  ██║   ██║██║   ██║██╔══██╗              ║
║        ██║   ╚██████╔╝╚██████╔╝██║  ██║              ║
║        ╚═╝    ╚═════╝  ╚═════╝ ╚═╝  ╚═╝              ║
║                                                       ║
║     W E A P O N  I S  N O W  O P E R A T I O N A L   ║
║                                                       ║
╚═══════════════════════════════════════════════════════╝

⚠️ OPERATOR PROTOCOLS:

[✓] Authorization: MANDATORY before engagement
[✓] Ethics: White-hat operations ONLY
[✓] Knowledge: Continuous learning required
[✓] Responsibility: Handle intel with care

🎯 MISSION STATUS: Ready for deployment
💀 WARNING: Unauthorized access = Federal crime
🔓 MOTTO: Hack the planet... legally.


📟 [QUICK REFERENCE TERMINAL]

┌──────────────────────────────────────────────────────┐
│ [CHEAT CODES] - Rapid Command Access                 │
└──────────────────────────────────────────────────────┘

# >> SYSTEM DEPLOYMENT
./install.sh

# >> LAUNCH ATTACK
python3 main.py -t <target>

# >> ADVANCED OPTIONS
python3 main.py -t <target> -n "Your Name" --skip-web

# >> ACCESS REPORTS
ls reports/

# >> QUERY DATABASE
sqlite3 database/autopentestx.db "SELECT * FROM scans;"

# >> HELP SYSTEM
python3 main.py --help

┌──────────────────────────────────────────────────────┐
│ [STATUS] System ready | Awaiting orders...           │
└──────────────────────────────────────────────────────┘