A command-line toolkit for pentesters and security researchers, designed to streamline common tasks in Kali Linux.
Features • Getting Started • Usage • Contributing • License
| Feature | Description |
|---|---|
| Transfile | Generate one-liners for transferring files to Windows or Linux targets using wget, PowerShell, certutil, netcat, and scp. |
| Proxify | Quickly set up reverse proxy connections using ligolo or chisel. Provides commands for both the attacker and target machines. |
| Autorecon Init | Automate the initial setup for autorecon. Creates a dedicated directory, sets up a CherryTree template, and starts the scan. |
| gMSA Cracker | Crack the NTLM hash from a Group Managed Service Account's msDS-ManagedPassword data blob, ready for Pass-the-Hash attacks. |
- Kali Linux or a similar Debian-based distribution.
tputfor text formatting (usually pre-installed).autoreconfor the Autorecon Init feature.ligoloandchiselbinaries for the Proxify feature.python3andpipfor the gMSA Hash Cracker.impacketandpycryptodomexPython libraries. Install them with:pip install impacket pycryptodomex
-
Clone the repository:
git clone https://github.com/ravisairockey/RSV-TOOLKIT.git cd RSV-TOOLKIT -
Make the scripts executable:
chmod +x rsv-toolkit.sh gmsa_hash_cracker.py
To launch the toolkit, run the script from your terminal:
./rsv-toolkit.shYou will be presented with a menu of options to choose from.
Contributions are welcome! If you have ideas for new features, improvements, or bug fixes, feel free to open an issue or submit a pull request.
- Fork the Project
- Create your Feature Branch (
git checkout -b feature/AmazingFeature) - Commit your Changes (
git commit -m 'Add some AmazingFeature') - Push to the Branch (
git push origin feature/AmazingFeature) - Open a Pull Request
This project is licensed under the MIT License. See the LICENSE file for details.