<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pentesting Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/pentesting/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/pentesting/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Fri, 25 Jul 2025 20:45:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>Pentesting Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/pentesting/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>AutoSploit: Automated Mass Exploiter</title>
		<link>http://kostacipo.stream/autosploit-automated-mass-exploiter/</link>
					<comments>http://kostacipo.stream/autosploit-automated-mass-exploiter/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 20:43:36 +0000</pubDate>
				<category><![CDATA[Exploitation Tools]]></category>
		<category><![CDATA[Exploit]]></category>
		<category><![CDATA[metasploit]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[python]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2219</guid>

					<description><![CDATA[<p>AutoSploit is a powerful hacking tool that has the ability to automate exploitation operations on remote hosts. This tool enables you to perform mass exploitations on the system being targeted by utilizing the services offered by Shodan, Censys, Zoomeye and Metasploit. This tool is developed using Python. Autosploit: Advanced Remote Host Mass Exploitation With this tool, [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/autosploit-automated-mass-exploiter/">AutoSploit: Automated Mass Exploiter</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="text-justify">AutoSploit is a powerful hacking tool that has the ability to automate exploitation operations on remote hosts. This tool enables you to perform mass exploitations on the system being targeted by utilizing the services offered by <a href="https://www.shodan.io/">Shodan</a>, <a href="https://censys.io/">Censys</a>, <a href="https://www.zoomeye.org/">Zoomeye </a>and Metasploit. This tool is developed using Python.</p>
<figure class="wp-block-image size-large img-fluid text-center"><img decoding="async" class="wp-image-11728 lazyloaded" src="https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo.jpg" sizes="(max-width: 1000px) 100vw, 1000px" srcset="https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo.jpg 1000w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-300x54.jpg 300w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-768x138.jpg 768w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-350x63.jpg 350w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-500x90.jpg 500w" alt="AutoSploit: Automated Mass Exploiter Logo/Banner" data-srcset="https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo.jpg 1000w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-300x54.jpg 300w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-768x138.jpg 768w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-350x63.jpg 350w, https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo-500x90.jpg 500w" data-src="https://cdn.cyberpunk.rs/wp-content/uploads/2020/01/autosploit_banner_logo.jpg" data-sizes="(max-width: 1000px) 100vw, 1000px" /></figure>
<h2>Autosploit: Advanced Remote Host Mass Exploitation</h2>
<p class="text-justify">With this tool, you can easily launch an attack on a remote host within a fairly short time. This is made possible due to the availability of Shodan, a powerful search engine that allows you to automatically fish out targets that are connected to a particular network service. Alternatively, you can also use target seeking tools such as Zoomeye and Censys to search out intended targets.</p>
<p class="text-justify">Apart from the automated host searching and collection, AutoSploit also gives you the option of creating your own customized target list. With this option in place, you can effectively launch attack-intended searches on hosts of your choice by manually adding them to your list.</p>
<h3>Metasploit Modules and How They Work Together</h3>
<div class="alert alert-secondary">The available powerful Metasploit modules are responsible for handling the rest of the work after the targets have been collected. By default, Metasploit comes with a long list of attack modules but you can manually add other modules of your liking to make the tool more powerful. The module deployed will depend on the platform search query that was used when an attack was launched. The Metasploit modules can help a pentester to gain access to services such as Meterpreter sessions and also be able to make remote code executions and many other attacks.</div>
<div class="alert alert-secondary">The combination of Shodan and Metasploit makes it very easy to use autosploit especially since the whole process is automated. The inclusion of Metasploit makes autosploit very effective tool when it comes to launching attacks on Apache-based projects.</div>
<h3>AutoSploit Features:</h3>
<ul>
<li>Automated Target Collection</li>
<li>Customized Target List (allows you to add your own list of targets)</li>
<li>Metasploit Modules</li>
<li>Custom user-agent</li>
<li>Mass exploitations</li>
</ul>
<h3>Supported Platforms:</h3>
<ul>
<li>Linux</li>
<li>OS X (must be within virtual environments to properly function)</li>
</ul>
<h3>Dependencies:</h3>
<p>This tool relies on the below <code>Python 2.7</code> modules:</p>
<ul>
<li>requests</li>
<li>psutil</li>
</ul>
<p>The required dependencies should all be in place after performing an installation with the recommended method, but you can easily install them using <code>pip</code>:</p>
<pre class="wp-block-preformatted">$ pip install -r requirements.txt</pre>
<p>Alternatively:</p>
<pre class="wp-block-preformatted">$ pip install requests psutil</pre>
<h2>Autosploit Install</h2>
<h3>Install AutoSploit via Docker Compose:</h3>
<p>Clone the repo:</p>
<pre class="wp-block-preformatted">$ git clone https://github.com/NullArray/AutoSploit.git</pre>
<p>Navigate to the Autosploit directory and run:</p>
<pre class="wp-block-preformatted">$ cd Autosploit/Docker
$ docker-compose run --rm autosploit</pre>
<h3>Install AutoSploit on Linux (via cloning)</h3>
<p>Clone:</p>
<pre class="wp-block-preformatted">$ git clone https://github.com/NullArray/AutoSploit</pre>
<p>Navigate to the AutoSploit directory, make the install script executable and install:</p>
<pre class="wp-block-preformatted">$ cd AutoSploit
$ chmod +x install.sh
$ ./install.sh</pre>
<h2>Usage</h2>
<p>To start AutoSploit run:</p>
<pre class="wp-block-preformatted">$ python autosploit.py</pre>
<p>This will take you to the available user options that you can choose from.</p>
<pre class="wp-block-preformatted">usage: python autosploit.py -[c|z|s|a] -[q] QUERY
                            [-C] WORKSPACE LHOST LPORT [-e] [--whitewash] PATH
                            [--ruby-exec] [--msf-path] PATH [-E] EXPLOIT-FILE-PATH
                            [--rand-agent] [--proxy] PROTO://IP:PORT [-P] AGENT

optional arguments:
  -h, --help            show this help message and exit

search engines:
  possible search engines to use

  -c, --censys          use censys.io as the search engine to gather hosts
  -z, --zoomeye         use zoomeye.org as the search engine to gather hosts
  -s, --shodan          use shodan.io as the search engine to gather hosts
  -a, --all             search all available search engines to gather hosts

requests:
  arguments to edit your requests

  --proxy PROTO://IP:PORT
                        run behind a proxy while performing the searches
  --random-agent        use a random HTTP User-Agent header
  -P USER-AGENT, --personal-agent USER-AGENT
                        pass a personal User-Agent to use for HTTP requests
  -q QUERY, --query QUERY
                        pass your search query

exploits:
  arguments to edit your exploits

  -E PATH, --exploit-file PATH
                        provide a text file to convert into JSON and save for
                        later use
  -C WORKSPACE LHOST LPORT, --config WORKSPACE LHOST LPORT
                        set the configuration for MSF (IE -C default 127.0.0.1
                        8080)
  -e, --exploit         start exploiting the already gathered hosts

misc arguments:
  arguments that don't fit anywhere else

  --ruby-exec           if you need to run the Ruby executable with MSF use
                        this
  --msf-path MSF-PATH   pass the path to your framework if it is not in your
                        ENV PATH
  --whitelist PATH      only exploit hosts listed in the whitelist file</pre>
<div class="row justify-content-center mb-3">
<div class="col-lg-4"><a href="https://github.com/NullArray/AutoSploit/wiki">Documentation</a></div>
<div><a href="https://github.com/NullArray/AutoSploit">Download</a></div>
</div>
<div class="row justify-content-center mb-3">
<div class="col-lg-4"></div>
</div>
<p>The post <a href="http://kostacipo.stream/autosploit-automated-mass-exploiter/">AutoSploit: Automated Mass Exploiter</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/autosploit-automated-mass-exploiter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hacktronian: All in One Hacking Tool for Linux</title>
		<link>http://kostacipo.stream/hacktronian-all-in-one-hacking-tool-for-linux/</link>
					<comments>http://kostacipo.stream/hacktronian-all-in-one-hacking-tool-for-linux/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sun, 22 Aug 2021 19:05:06 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Hacker Tools]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[linux]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2099</guid>

					<description><![CDATA[<p>Hacktronian is an all in one hacking suite for Linux and Android. It contains tools for different phases from information gathering to post exploitation. This makes it a handy tool for any penetration tester. Hackronian contains a diverse range of tools which allow the user to gain information, attack targets, perform sniffing and snooping on [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/hacktronian-all-in-one-hacking-tool-for-linux/">Hacktronian: All in One Hacking Tool for Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hacktronian is an all in one hacking suite for Linux and Android. It contains tools for different phases from information gathering to post exploitation. This makes it a handy tool for any penetration tester.</p>
<p>Hackronian contains a diverse range of tools which allow the user to gain information, attack targets, perform sniffing and snooping on targets and perform post exploitation operations on the target. This main benefit of this suite is that all these different tools are available in one place and the user can experiment with different tools within the same terminal. The secondary benefit of this tool is that it can be installed on Android with all the same features.</p>
<h3 class="accent-green">Features:</h3>
<ul>
<li>Contains more than 50 different tools</li>
<li>Modules range from information gathering to post exploitation</li>
<li>Available for both Android and Linux</li>
<li>Perfect for creating a penetration testing workflow</li>
</ul>
<h2>HACKTRONIAN Menu :</h2>
<ul>
<li>Information Gathering</li>
<li>Password Attacks</li>
<li>Wireless Testing</li>
<li>Exploitation Tools</li>
<li>Sniffing &amp; Spoofing</li>
<li>Web Hacking</li>
<li>Private Web Hacking</li>
<li>Post Exploitation</li>
<li>Install The HACKTRONIAN</li>
</ul>
<h3>Information Gathering:</h3>
<ul>
<li>Nmap</li>
<li>Setoolkit</li>
<li>Port Scanning</li>
<li>Host To IP</li>
<li>wordpress user</li>
<li>CMS scanner</li>
<li>XSStrike</li>
<li>Dork &#8211; Google Dorks Passive Vulnerability Auditor</li>
<li>Scan A server&#8217;s Users</li>
<li>Crips</li>
</ul>
<h3>Password Attacks:</h3>
<ul>
<li>Cupp</li>
<li>Ncrack</li>
</ul>
<h3></h3>
<h3>Wireless Testing:</h3>
<ul>
<li>reaver</li>
<li>pixiewps</li>
<li>Fluxion</li>
</ul>
<h3>Exploitation Tools:</h3>
<ul>
<li>ATSCAN</li>
<li>sqlmap</li>
<li>Shellnoob</li>
<li>commix</li>
<li>FTP Auto Bypass</li>
<li>jboss-autopwn</li>
</ul>
<h3>Sniffing &amp; Spoofing:</h3>
<ul>
<li>Setoolkit</li>
<li>SSLtrip</li>
<li>pyPISHER</li>
<li>SMTP Mailer</li>
</ul>
<h3>Web Hacking:</h3>
<ul>
<li>Drupal Hacking</li>
<li>Inurlbr</li>
<li>WordPress &amp; Joomla Scanner</li>
<li>Gravity Form Scanner</li>
<li>File Upload Checker</li>
<li>WordPress Exploit Scanner</li>
<li>WordPress Plugins Scanner</li>
<li>Shell and Directory Finder</li>
<li>Joomla! 1.5 &#8211; 3.4.5 remote code execution</li>
<li>Vbulletin 5.X remote code execution</li>
<li>BruteX &#8211; Automatically brute force all services running on a target</li>
<li>Arachni &#8211; Web Application Security Scanner Framework</li>
</ul>
<h3>Private Web Hacking:</h3>
<ul>
<li>Get all websites</li>
<li>Get joomla websites</li>
<li>Get wordpress websites</li>
<li>Control Panel Finder</li>
<li>Zip Files Finder</li>
<li>Upload File Finder</li>
<li>Get server users</li>
<li>SQli Scanner</li>
<li>Ports Scan (range of ports)</li>
<li>ports Scan (common ports)</li>
<li>Get server Info</li>
<li>Bypass Cloudflare</li>
</ul>
<h3>Post Exploitation:</h3>
<ul>
<li>Shell Checker</li>
<li>POET</li>
<li>Weeman</li>
</ul>
<h3 class="accent-green">Supported Platforms:</h3>
<ul>
<li>Linux</li>
<li>Android (Termux)</li>
</ul>
<h2>Installation in Linux :</h2>
<p>This Tool Must Run As ROOT !!!</p>
<p><code>git clone https://github.com/thehackingsage/hacktronian.git</code></p>
<p><code>cd hacktronian</code></p>
<p><code>chmod +x install.sh</code></p>
<p><code>./install.sh</code></p>
<p>That&#8217;s it.. you can execute tool by typing <strong>hacktronian</strong></p>
<h2>Installation in Android :</h2>
<p>Open <a href="https://play.google.com/store/apps/details?id=com.termux" rel="nofollow">Termux</a></p>
<p><code>pkg install git</code></p>
<p><code>pkg install python</code></p>
<p><code>git clone https://github.com/thehackingsage/hacktronian.git</code></p>
<p><code>cd hacktronian</code></p>
<p><code>chmod +x hacktronian.py</code></p>
<p><code>python2 hacktronian.py</code></p>
<h2>Video Tutorial :</h2>
<p>YouTube : <a href="https://www.youtube.com/watch?v=1LJlyQAQby4" rel="nofollow">https://www.youtube.com/watch?v=1LJlyQAQby4</a></p>
<h2>Hacktronian Usage</h2>
<p>To execute Hacktronian, run:</p>
<pre class="wp-block-preformatted">$ hacktronian</pre>
<pre class="wp-block-preformatted"> _   _    _    ____ _  _______ ____   ___  _   _ ___    _    _   _ 
| | | |  / \  / ___| |/ /_   _|  _ \ / _ \| \ | |_ _|  / \  | \ | |
| |_| | / _ \| |   | ' /  | | | |_) | | | |  \| || |  / _ \ |  \| |
|  _  |/ ___ \ |___| . \  | | |  _ &lt;| |_| | |\  || | / ___ \| |\  |
|_| |_/_/   \_\____|_|\_\ |_| |_| \_\_ __/|_| \_|___/_/   \_\_| \_|
 
[!] This Tool Must Run As ROOT [!] https://linktr.ee/thehackingsage
 
   {1}--Information Gathering
   {2}--Password Attacks
   {3}--Wireless Testing
   {4}--Exploitation Tools
   {5}--Sniffing &amp; Spoofing
   {6}--Web Hacking
   {7}--Private Web Hacking
   {8}--Post Exploitation
   {0}--Install The HACKTRONIAN
   {99}-Exit
 
hacktronian~#</pre>
<p><strong>Download</strong>: <a href="https://github.com/thehackingsage/hacktronian">https://github.com/thehackingsage/hacktronian</a></p>
<div class="row justify-content-center mb-3">
<div class="col-lg-4"></div>
</div>
<p>The post <a href="http://kostacipo.stream/hacktronian-all-in-one-hacking-tool-for-linux/">Hacktronian: All in One Hacking Tool for Linux</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/hacktronian-all-in-one-hacking-tool-for-linux/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
