mirror of
https://github.com/Gowtham-Darkseid/AutoPentestX.git
synced 2026-03-31 08:39:05 +02:00
377 lines
12 KiB
Markdown
377 lines
12 KiB
Markdown
```
|
|
██╗ ██╗ █████╗ ██████╗██╗ ██╗██╗███╗ ██╗ ██████╗
|
|
██║ ██║██╔══██╗██╔════╝██║ ██╔╝██║████╗ ██║██╔════╝
|
|
███████║███████║██║ █████╔╝ ██║██╔██╗ ██║██║ ███╗
|
|
██╔══██║██╔══██║██║ ██╔═██╗ ██║██║╚██╗██║██║ ██║
|
|
██║ ██║██║ ██║╚██████╗██║ ██╗██║██║ ╚████║╚██████╔╝
|
|
╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝╚═╝ ╚═══╝ ╚═════╝
|
|
|
|
A U T O P E N T E S T X Q U I C K S T A R T
|
|
```
|
|
|
|
> ⚡ **SYSTEM STATUS**: OPERATIONAL | **SECURITY LEVEL**: MAXIMUM
|
|
> 🎯 **MISSION**: Penetrate. Exploit. Dominate.
|
|
|
|
---
|
|
|
|
## ⚡ [PHASE 1] DEPLOYMENT SEQUENCE
|
|
|
|
### [1.1] System Initialization
|
|
|
|
```bash
|
|
# >> ENTERING SYSTEM DIRECTORY...
|
|
cd AutoPentestX
|
|
|
|
# >> EXECUTING DEPLOYMENT PROTOCOL...
|
|
chmod +x install.sh
|
|
./install.sh
|
|
```
|
|
|
|
**INSTALLER SEQUENCE:**
|
|
```
|
|
[▓▓▓▓▓▓▓▓▓▓] Installing Nmap, Nikto, SQLMap...
|
|
[▓▓▓▓▓▓▓▓▓▓] Configuring Python virtual environment...
|
|
[▓▓▓▓▓▓▓▓▓▓] Loading Python dependencies...
|
|
[▓▓▓▓▓▓▓▓▓▓] Creating system directories...
|
|
[▓▓▓▓▓▓▓▓▓▓] Running system diagnostics...
|
|
[✓] DEPLOYMENT COMPLETE
|
|
```
|
|
|
|
## ⚡ [PHASE 2] ATTACK INITIATION
|
|
|
|
### [2.1] System Activation
|
|
|
|
```bash
|
|
# >> ACTIVATING VIRTUAL ENVIRONMENT...
|
|
source venv/bin/activate
|
|
|
|
# >> LAUNCHING ATTACK VECTOR (authorized targets only)
|
|
python3 main.py -t 127.0.0.1
|
|
|
|
# >> ALTERNATIVE: RAPID DEPLOYMENT
|
|
./autopentestx.sh 127.0.0.1
|
|
```
|
|
|
|
```
|
|
╔═══════════════════════════════════════════════════════╗
|
|
║ [ATTACK STATUS] ║
|
|
║ → Target Acquired: 127.0.0.1 ║
|
|
║ → Systems: ONLINE ║
|
|
║ → Exploit Engine: ARMED ║
|
|
║ → Stealth Mode: ACTIVE ║
|
|
╚═══════════════════════════════════════════════════════╝
|
|
```
|
|
|
|
## ⚡ [PHASE 3] INTEL EXTRACTION
|
|
|
|
### [3.1] Access Report Data
|
|
|
|
```bash
|
|
# >> ACCESSING CLASSIFIED REPORTS...
|
|
ls -lh reports/
|
|
|
|
# >> DECRYPTING VULNERABILITY REPORT...
|
|
xdg-open reports/AutoPentestX_Report_*.pdf
|
|
```
|
|
|
|
---
|
|
|
|
## 🎮 [COMMAND ARSENAL]
|
|
|
|
### [CMD-001] Full Spectrum Attack
|
|
```bash
|
|
# >> INITIATING COMPLETE PENETRATION SEQUENCE
|
|
python3 main.py -t 192.168.1.100
|
|
```
|
|
|
|
### [CMD-002] Rapid Recon Mode
|
|
```bash
|
|
# >> STEALTH SCAN - WEB PAYLOADS DISABLED
|
|
python3 main.py -t 192.168.1.100 --skip-web
|
|
```
|
|
|
|
### [CMD-003] Lightning Strike
|
|
```bash
|
|
# >> SPEED MODE - RECON ONLY
|
|
python3 main.py -t 192.168.1.100 --skip-web --skip-exploit
|
|
```
|
|
|
|
### [CMD-004] Custom Operator ID
|
|
```bash
|
|
# >> REGISTERING OPERATOR CREDENTIALS
|
|
python3 main.py -t 192.168.1.100 -n "Your Name"
|
|
```
|
|
|
|
### [CMD-HELP] System Manual
|
|
```bash
|
|
# >> ACCESSING SYSTEM DOCUMENTATION
|
|
python3 main.py --help
|
|
```
|
|
|
|
---
|
|
|
|
## 💾 [DATA EXTRACTION COMPLETE]
|
|
|
|
```
|
|
┌─────────────────────────────────────────────────────────┐
|
|
│ [CLASSIFIED] - INTELLIGENCE PACKAGE GENERATED │
|
|
└─────────────────────────────────────────────────────────┘
|
|
```
|
|
|
|
### [OUTPUT-001] 📄 Vulnerability Dossier (`reports/`)
|
|
```
|
|
⚠ CLASSIFIED DOCUMENT ⚠
|
|
├─ Executive Threat Summary
|
|
├─ Vulnerability Database
|
|
├─ Risk Matrix Analysis
|
|
└─ Remediation Protocols
|
|
```
|
|
|
|
### [OUTPUT-002] 🗄️ Intel Database (`database/`)
|
|
```
|
|
⚡ PERSISTENT STORAGE ACTIVE
|
|
├─ Complete scan data in SQLite
|
|
├─ Historical attack patterns
|
|
└─ Query interface enabled
|
|
```
|
|
|
|
### [OUTPUT-003] 📊 Operation Logs (`logs/`)
|
|
```
|
|
📡 REAL-TIME MONITORING
|
|
├─ Execution timestamps
|
|
├─ System diagnostics
|
|
└─ Debug traces
|
|
```
|
|
|
|
### [OUTPUT-004] 💣 Exploit Arsenal (`exploits/`)
|
|
```
|
|
⚔️ WEAPONIZED PAYLOADS
|
|
├─ Metasploit RC scripts
|
|
├─ Manual exploitation tools
|
|
└─ Attack vector documentation
|
|
```
|
|
|
|
---
|
|
|
|
## 🚀 [PERFORMANCE OPTIMIZATION]
|
|
|
|
```
|
|
╔══════════════════════════════════════════════════════╗
|
|
║ ATTACK SPEED CONFIGURATIONS ║
|
|
╚══════════════════════════════════════════════════════╝
|
|
```
|
|
|
|
### [MODE-01] ⚡ LIGHTNING STRIKE (5-10 min)
|
|
```bash
|
|
# >> RECON ONLY - MAXIMUM SPEED
|
|
python3 main.py -t TARGET --skip-web --skip-exploit
|
|
```
|
|
**STATUS**: Rapid reconnaissance | Minimal footprint
|
|
|
|
### [MODE-02] 🔥 TACTICAL ASSAULT (10-20 min)
|
|
```bash
|
|
# >> STANDARD PENETRATION - BALANCED APPROACH
|
|
python3 main.py -t TARGET --skip-exploit
|
|
```
|
|
**STATUS**: Full scan + web vulnerabilities | No exploitation
|
|
|
|
### [MODE-03] 💥 TOTAL ANNIHILATION (20-30 min)
|
|
```bash
|
|
# >> FULL SPECTRUM ATTACK - ALL SYSTEMS ENGAGED
|
|
python3 main.py -t TARGET
|
|
```
|
|
**STATUS**: Complete penetration testing | All modules active
|
|
|
|
---
|
|
|
|
## ⚠️ [SYSTEM DIAGNOSTICS]
|
|
|
|
```
|
|
┌─────────────────────────────────────────────────┐
|
|
│ [ERROR HANDLER] - Common System Failures │
|
|
└─────────────────────────────────────────────────┘
|
|
```
|
|
|
|
### [ERROR-001] 🔐 ACCESS DENIED
|
|
```bash
|
|
# >> ELEVATING PRIVILEGES...
|
|
sudo python3 main.py -t TARGET
|
|
```
|
|
**FIX**: Root access required for deep system penetration
|
|
|
|
### [ERROR-002] 🔌 MODULE FAILURE
|
|
```bash
|
|
# >> REACTIVATING VIRTUAL ENVIRONMENT...
|
|
source venv/bin/activate
|
|
|
|
# >> REINSTALLING CORE MODULES...
|
|
pip install -r requirements.txt
|
|
```
|
|
**FIX**: Environment not properly initialized
|
|
|
|
### [ERROR-003] 🛠️ MISSING WEAPONS
|
|
```bash
|
|
# >> DOWNLOADING ATTACK TOOLS...
|
|
sudo apt-get install nikto sqlmap nmap
|
|
```
|
|
**FIX**: Essential penetration tools not found
|
|
|
|
### [ERROR-004] 📄 REPORT GENERATION FAILURE
|
|
```bash
|
|
# >> REPAIRING DOCUMENT GENERATOR...
|
|
pip install --upgrade reportlab pillow
|
|
```
|
|
**FIX**: PDF library corruption detected
|
|
|
|
---
|
|
|
|
## 🎯 [COMPLETE OPERATION SEQUENCE]
|
|
|
|
```bash
|
|
# ┌─────────────────────────────────────────────────────┐
|
|
# │ [OPERATION PROTOCOL] - Full Attack Chain │
|
|
# └─────────────────────────────────────────────────────┘
|
|
|
|
# [STEP 1] >> ENTERING SYSTEM...
|
|
cd AutoPentestX
|
|
|
|
# [STEP 2] >> POWERING UP SYSTEMS...
|
|
source venv/bin/activate
|
|
|
|
# [STEP 3] >> LAUNCHING ATTACK SEQUENCE...
|
|
python3 main.py -t 192.168.1.100 -n "Security Auditor"
|
|
|
|
# [STEP 4] >> ATTACK IN PROGRESS...
|
|
# ▓▓▓▓▓▓▓░░░ 60% | ETA: 15 minutes
|
|
# [SCANNING] [EXPLOITING] [REPORTING]
|
|
|
|
# [STEP 5] >> EXTRACTING INTELLIGENCE...
|
|
ls reports/
|
|
sqlite3 database/autopentestx.db
|
|
|
|
# [STEP 6] >> DECRYPTING REPORT...
|
|
xdg-open reports/AutoPentestX_Report_*.pdf
|
|
|
|
# [STEP 7] >> SHUTTING DOWN SYSTEMS...
|
|
deactivate
|
|
|
|
# [✓] OPERATION COMPLETE - ALL SYSTEMS NOMINAL
|
|
```
|
|
|
|
---
|
|
|
|
## ⚠️ Important Reminders
|
|
|
|
### Before Scanning
|
|
✅ Obtain written authorization
|
|
✅ Document the scope
|
|
✅ Verify you have permission
|
|
✅ Read DISCLAIMER.md
|
|
|
|
### During Scanning
|
|
✅ Monitor progress
|
|
✅ Be aware of network impact
|
|
✅ Respect time windows
|
|
✅ Keep logs for documentation
|
|
|
|
### After Scanning
|
|
✅ Review the PDF report
|
|
✅ Validate findings
|
|
✅ Share with authorized parties only
|
|
✅ Follow up on remediation
|
|
|
|
---
|
|
|
|
## 🎓 Learning Path
|
|
|
|
### Beginner
|
|
1. Run basic scans on local systems
|
|
2. Understand the PDF report
|
|
3. Learn about common vulnerabilities
|
|
4. Practice in lab environments
|
|
|
|
### Intermediate
|
|
1. Customize scan parameters
|
|
2. Interpret CVE data
|
|
3. Understand risk scoring
|
|
4. Use Metasploit RC scripts
|
|
|
|
### Advanced
|
|
1. Integrate with CI/CD pipelines
|
|
2. Build custom vulnerability checks
|
|
3. Develop exploit modules
|
|
4. Contribute to the project
|
|
|
|
---
|
|
|
|
## 📞 Need Help?
|
|
|
|
- 📖 Read the full [README.md](README.md)
|
|
- ⚖️ Review [DISCLAIMER.md](DISCLAIMER.md)
|
|
- 📋 Check [SAMPLE_OUTPUT.md](SAMPLE_OUTPUT.md)
|
|
- 🐛 Open an issue on GitHub
|
|
- 💬 Join the community discussions
|
|
|
|
---
|
|
|
|
## ⚔️ [SYSTEM ARMED AND READY]
|
|
|
|
```
|
|
╔═══════════════════════════════════════════════════════╗
|
|
║ ║
|
|
║ ██╗ ██╗ ██████╗ ██╗ ██╗██████╗ ║
|
|
║ ╚██╗ ██╔╝██╔═══██╗██║ ██║██╔══██╗ ║
|
|
║ ╚████╔╝ ██║ ██║██║ ██║██████╔╝ ║
|
|
║ ╚██╔╝ ██║ ██║██║ ██║██╔══██╗ ║
|
|
║ ██║ ╚██████╔╝╚██████╔╝██║ ██║ ║
|
|
║ ╚═╝ ╚═════╝ ╚═════╝ ╚═╝ ╚═╝ ║
|
|
║ ║
|
|
║ W E A P O N I S N O W O P E R A T I O N A L ║
|
|
║ ║
|
|
╚═══════════════════════════════════════════════════════╝
|
|
```
|
|
|
|
**⚠️ OPERATOR PROTOCOLS:**
|
|
```
|
|
[✓] Authorization: MANDATORY before engagement
|
|
[✓] Ethics: White-hat operations ONLY
|
|
[✓] Knowledge: Continuous learning required
|
|
[✓] Responsibility: Handle intel with care
|
|
```
|
|
|
|
> 🎯 **MISSION STATUS**: Ready for deployment
|
|
> 💀 **WARNING**: Unauthorized access = Federal crime
|
|
> 🔓 **MOTTO**: Hack the planet... legally.
|
|
|
|
---
|
|
|
|
## 📟 [QUICK REFERENCE TERMINAL]
|
|
|
|
```bash
|
|
┌──────────────────────────────────────────────────────┐
|
|
│ [CHEAT CODES] - Rapid Command Access │
|
|
└──────────────────────────────────────────────────────┘
|
|
|
|
# >> SYSTEM DEPLOYMENT
|
|
./install.sh
|
|
|
|
# >> LAUNCH ATTACK
|
|
python3 main.py -t <target>
|
|
|
|
# >> ADVANCED OPTIONS
|
|
python3 main.py -t <target> -n "Your Name" --skip-web
|
|
|
|
# >> ACCESS REPORTS
|
|
ls reports/
|
|
|
|
# >> QUERY DATABASE
|
|
sqlite3 database/autopentestx.db "SELECT * FROM scans;"
|
|
|
|
# >> HELP SYSTEM
|
|
python3 main.py --help
|
|
|
|
┌──────────────────────────────────────────────────────┐
|
|
│ [STATUS] System ready | Awaiting orders... │
|
|
└──────────────────────────────────────────────────────┘
|
|
```
|