Welcome to Exploitation-Module, an easy-to-use terminal-based tool designed to help cybersecurity professionals and ethical hackers automate the process of discovering and exploiting vulnerabilities.
This project is perfect for those new to cybersecurity and penetration testing, offering a real-world experience in automating the exploitation workflow using scanning, exploit fetching, and logging.
- Service Scanning: Automatically scan a target for open ports and running services using Nmap, and gather version information that could be vulnerable.
- Exploit Lookup: Search popular databases like Exploit-DB to find known exploits based on the detected service versions.
- Exploit Logging: Log each exploit attempt, recording the service targeted, the exploit used, and whether the attempt was successful or not.
- Modular Design: Each feature is implemented as a separate script, making it easy to extend the tool with additional functionality.
- Scan Services: Start by scanning a target IP to identify running services and their versions using Nmap.
- Fetch Exploits: Search for exploits related to the detected services on Exploit-DB.
- Log Exploits: Record each exploit attempt, including the target service, exploit name, and the result (success/failure).
- Clone the repository:
git clone https://github.com/webpro255/Exploitation-Module.git cd Exploitation-Module - Install necessary dependencies (if required):
pip3 install -r requirements.txt
- Run the tool using Python 3:
python3 main.py
Once you run the main.py file, you will see the following menu:
`Welcome to Exploitation-Module!
- Scan for services
- Fetch exploits for a service
- Launch an exploit and log the attempt
- Exit`
Option 1: Scans a target IP for services using Nmap. Option 2: Fetches exploits related to a given service from Exploit-DB. Option 3: Logs the details of an exploit attempt. Option 4: Exits the tool.
python3 main.py- Select option
1to scan for services. - Select option
2to fetch exploits for services likeApacheorvsftpd. - Select option
3to log your exploit attempts.
All exploit attempts are logged in the logs/exploit_attempts.log file. The logs contain timestamps and details about each exploit attempt for future analysis.
Feel free to open issues or submit pull requests for new features or improvements! This project is intended to grow and become a comprehensive tool for vulnerability exploitation and penetration testing.
This tool is intended for educational and ethical hacking purposes only. Please ensure you have proper authorization before testing any systems.