As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the either the Shodan, Censys, ZoomEye, or all of the API's. The program allows the user to enter their platform specific search query such as;
IIS, etc, upon which a list of candidates will be retrieved.
After this operation has been completed the
exploit component of the program will go about the business of attempting to exploit these targets by running a series of Metasploit modules against them. Which Metasploit modules will be employed in this manner is determined by programmatically comparing the name of the module to the initial search query. However, I have added functionality to run all available modules against the targets in a 'Hail Mary' type of attack as well.
The available Metasploit modules have been selected to facilitate Remote Code Execution and to attempt to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host and local port for MSF facilitated back connections are configured through the dialog that comes up before the
exploit component is started.
Note: You will need to configure your own server to run the sessions. Running sessions on your localhost is probably not a very good idea