Skip to content

๐Ÿ‘ถ BabySploit Beginner Pentesting Toolkit/Framework Written in Python ๐Ÿ

License

Notifications You must be signed in to change notification settings

M4cs/BabySploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

Forks Issues License Python 3.6+ Twitter

Made For Kali Linux. No Support For Other Distros If There Are Problems.
Developed by @maxbridgland
Donate

Forks

BabySploit is a penetration testing toolkit aimed at making it easy to learn how to use bigger,
more complicated frameworks like Metasploit. With a very easy to use UI and toolkit, anybody
from any experience level will find use out of BabySploit. Below are some screenshots of the framework.


Video Demonstration

Installation Instructions:

Using Pip

sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0 
pip3 install babysploit
babysploit

In order to use search command you must follow steps here to install the searchsploit binary!

Building From Source

sudo apt-get update
sudo apt-get upgrade
sudo apt-get install exploitdb netcat nmap perl php7.0
git clone https://github.com/M4cs/BabySploit.git
cd BabySploit/
python3 setup.py install
babysploit

Docker Run Command

docker run --rm -idt --name babysploit xshuden/babysploit    # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit

Changelog:

Types of Updates:

  • Updates: Framework has been updated with new features or major fixes.
  • Releases: Stable release milestone.
  • Hotfix: Quick hotfix. Minor bug fix or minor change.

0.1.11 Hotfix:

  • Fix nmap logging

0.1.10 Hotfix:

  • Bug Fixes

0.1.9 Hotfix:

  • Fix Installer
  • Fix Updater

0.1.8 Update:

  • Switch To Virtual Env Installation

0.1.7 Update:

  • Added Installer Script
  • Fixed Updater

0.1.6 Update:

  • Added Cloudflare Bypasser
  • Added WPSeku WP Vuln Scan

0.1.4 & 0.1.5 Hotfixes:

  • Fix updater

0.1.3 Hotfix:

  • Fix Method of grabbing default gateway

0.1.2 Hotfix:

  • Bug fixes

0.1.1 Hotfix:

  • Fix Requirements.txt

0.1.0 Release:

  • Basic Release

0.0.9 Hotfix:

  • Fix Updater

0.0.8 Update:

  • Fix Updater
  • Add Raccoon Vuln Scan
  • Fix PDFMeta
  • Update Display

0.0.7 Hotfix:

  • Fix some bugs

0.0.6 Update:

  • Fix updater script
  • Remove tcpdump
  • Add ftpvulnscan and pdfmeta

Getting Started:

Setting Configuration Values:

BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically generated and located at ./babysploit/config/config.cfg. You can manually change configuration settings by opening up the file and editing with a text editor or you can use the set command to set a new value for a key. Use the set command like so:

set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!

If before running this command the rhost key had a value of 80, the rhost key after running this command has a value of 10. You can also add configuration variables to the config by using the set command with a new key after it like so:

set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!

Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config until you use the reset command which resets the saved configuration.

Running A Tool

In order to run a tool all you have to do is enter the name of the tool into BabySploit. You can use the tools command to display a menu with all the currently availble tools. If we run tools we get the depiction:

Tools

*this depiction may be outdated*

This menu will display the tools available and the description of each tool. To run a tool simply enter the tool name into BabySploit. Ex: ftpbruteforce - runs the ftpbruteforce tool.

Features (Current, In The Works, Planned):

Visit project board for tools.

  • Information Gathering
  • Exploitation
  • Post Exploitation
  • Bruteforcing
  • Phishing
  • Cryptography/Stenography

Information Gathering:

  • Nmap
  • IP Info
  • Tcpdump (In The Works)
  • Datasploit (In The Works)
  • Censys Lookup
  • DNS Lookup
  • Raccoon
  • Cloudflare Bypasser

Exploitation:

  • Searchsploit
  • ReverseShell Wizard
  • FTP Buffer Overflow Scan
  • WPSeku WordPress Vuln Scanner

Post Exploitation:

  • In The Works

Bruteforcing:

  • FTP Bruteforcer
  • WPSeku WordPress Login Bruteforce

Phishing:

  • BlackEye Python

Crypto/Stegano:

  • MetaKiller
  • PDFMeta

Contributing

Feel free to contribute by making plugins or fixing bugs with a Pull Request. All contributions are helpful and will help make this a great tool.

Licensed Under MIT.

Copyright (c) 2018 Syndicated Intelligence