This Python script is designed to automate the process of launching exploits against vulnerable targets. It leverages the socket, subprocess, and os modules to scan targets, generate payloads, and launch exploits.
- Exploit Database: Includes a predefined dictionary of exploits with details such as vulnerability, target OS, architecture, and payload.
- Target Scanning: Checks if the target is vulnerable to a specific exploit.
- Payload Generation: Automatically generates payloads based on the selected exploit.
- Exploit Launching: Executes the generated payload to launch the selected exploit against the target.
-
Clone the repository to your local machine:
git clone https://github.com/sftp-nik/ExploitEclipse.git
-
Navigate to the project directory:
cd ExploitEclipse -
Run the script:
python main.py
-
Follow the on-screen prompts to enter the target IP address and port.
-
MS17-010
- Vulnerability: EternalBlue
- Target OS: Windows
- Architecture: x86
- Payload: windows/meterpreter/reverse_tcp
-
CVE-2020-1234
- Vulnerability: Apache Struts
- Target OS: Linux
- Architecture: x64
- Payload: linux/x64/meterpreter/reverse_tcp
- Ensure you have the necessary permissions and legal authorization before using this script against any target.
- Customize the payload generation logic (
generate_payloadfunction) as per your requirements.