Skip to content

Ansible Playbook to update Kali with various personalisations

License

Notifications You must be signed in to change notification settings

richardschwabe/kaliexpress

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

77 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

KaliExpress

My personalised Kali setup automated via ansible playbook & roles.

Table Of Contents

Overview

Adjust Kali to my liking, incl:

  • Custom Oh My Zsh with Powerlevel10K
  • Pipx some applications
  • Wordlists
  • Exa and colorful outputs
  • Bookmarks
  • Preferred Apps

How to use

Make sure you have ansible installed

sudo apt install ansible

Simply clone the repo and run make

git clone https://github.com/richardschwabe/kaliexpress.git

cd kaliexpress && make

Details

The playbook consists of the following Roles

base

This role will add the following applications:

  • bat - a colorful cat alternative
  • exa - a colorful ls alternative
  • dbeaver - a great database management tool
  • vscode - my IDE of choice
  • chrome - my preferred browser
  • golang - GO programming language for nuclei

For personalisation it will install my personal .zshrc with various settings, such as aliases for ls and cat. Furthermore with Oh-my-zsh it will also configure the Powerlevel10k theme, and its fonts.

There is also a collection of bookmarks that are copied into the home directory. At the moment they need to be imported manually into Chrome/Firefox.

Lastly, it also makes sure that pipx is installed and used to install some tools, such as CrackMapExec. The corresponding ~/.local/bin folder is added to the $PATH enviornment.

This is the current list of pentest tools added via pipx:

  • CrackMapExec
  • pwncat-cs
  • wesng.git
  • impacket
  • bbot
  • enum4linux-ng
  • ssh-audit
  • mitm6

docker

Installs docker from the official docker debian repo and makes sure that the docker compose plugin is installed.

This means, that there is no docker-compose command, but instead the new docker compose syntax.

Furthermore it installs portainer-ce locally.

tools

Further pentest tools are added in the tools section.

These include various installation mediums, such as apt, go installer or simple Github clones.

In the files/share folder we have common executables, scripts for Academy, CTF and learning environments (non of these are obfuscated). So only really used on environments with no AV running.

Often used with

xfreerdp /v:10.10.10.10 /u:USER /p:PASS /drive:linux,~/pentest-tools +clipboard /dynamic-resolution

Pentest tools installed include:

License

MIT