A modular Python-based tool for automated adversarial emulation, designed for offensive security training and thesis research.
- Agentless: No pre-installed agents required on targets.
- Automated Attack Tree:
- Recon: Port scanning via Nmap.
- Path A (SMB): MS17-010 (EternalBlue) exploitation via Metasploit RPC.
- Path B (FTP): Anonymous FTP authentication checks.
- Modular: extensible design for adding new attack vectors.
- OS: Kali Linux (Recommended) or Linux with Nmap installed.
- Metasploit:
msfconsoleandmsfrpcdmust be installed. - Python: 3.x
-
Install Dependencies:
pip install -r requirements.txt
-
Start Metasploit RPC Server: You must start the MSF RPC daemon before running the tool for exploit functionality.
msfrpcd -P password -S -f
Run the main tool with a target IP:
python main.py <TARGET_IP> --msf-pass <YOUR_MSF_PASSWORD> --lhost <YOUR_IP>Example:
python main.py 192.168.1.105 --msf-pass mypassword --lhost 192.168.1.5src/: Core modules (Recon, MSF Client, FTP Client, Engine).config/: Configuration files.tests/: Unit tests.
For educational and authorized testing purposes only.