Changelog RC-Exploiter v1.1.7:
The author does not hold any responsibility about the bad use of this script, remmenber that attacking targets without prior concent its ilegal and punish by law, this script as build to show how msf resource files can automate tasks.
Scanning WAN networks in search of targets may take 10 to 15 minutes depending of your network connection, and will search in 1024 random hosts for the selected port, also the file ‘user-names.txt’ may be edited to insert new entrys, or we can provide the FULL PATH to another dicionary file to be used in bruteforce services.’user-names.txt’ dicionary as usernames ‘one-per-line’ [example => root] ‘user-passw.txt’ dicionary as usernames and passwords [example => root:pass] the tool also have the habillity to exploit multiple targets (RHOSTS) for that just separate the ip address by a blank space [example: 127.0.0.1 192.168.1.68] in the target selection windows [input RHOSTS]…
– Additional tool settings can be configurated just by editing the ‘settings’ file
– before running the tool, settings like: use decoys [scanning WAN networks] or
– spoof mac addr [change mac addr+ip addr] among other toolkit default settings.
Dependencies: nmap, metasploit, macchanger, zenity
[DOWNLOAD/INSTALL] -> open terminal and write:
git clone git://git.code.sf.net/p/rcexploiter/RC-exploiter RC-exploiter
cd RC-exploiter && chmod +x *.sh
nano settings && sudo ./rc-exploiter.sh
git pull orgin master
Source: https://sourceforge.net/p/rcexploiter/ | Our Post Before