Metadata-Version: 2.1
Name: babysploit
Version: 1.3.1
Summary: Beginner Pentesting Toolkit/Framework
Home-page: https://github.com/M4cs/BabySploit
Author: Max Bridgland
Author-email: mabridgland@protonmail.com
License: GNU General Public License v3 (GPLv3) (GPL)
Project-URL: Wiki, https://github.com/M4cs/BabySploit/wiki
Project-URL: Discord Server, https://discordapp.com/invite/7VN9VZe
Description: # Installation Instructions:
        
        ## Using Pip
        
        ```
        sudo apt-get update
        sudo apt-get upgrade
        sudo apt-get install exploitdb netcat nmap perl php7.0 
        pip3 install babysploit
        babysploit
        ```
        
        In order to use `search` command you must follow steps [here](https://www.exploit-db.com/searchsploit/#install) to install the searchsploit binary!
        
        ## Building From Source
        ```
        sudo apt-get update
        sudo apt-get upgrade
        sudo apt-get install exploitdb netcat nmap perl php7.0
        git clone https://github.com/M4cs/BabySploit.git
        cd BabySploit/
        python3 setup.py install
        babysploit
        ```
        
        ## Docker Run Command
        
        ```
        docker run --rm -idt --name babysploit xshuden/babysploit    # container is deleted when you're done
        OR
        docker run -idt --name babysploit xshuden/babysploit
        ```
        
        # Getting Started:
        
        #### Setting Configuration Values:
        
        BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically
        generated and located at `./babysploit/config/config.cfg`. You can manually change configuration settings
        by opening up the file and editing with a text editor or you can use the set command to set a new value for
        a key. Use the set command like so:
        ```
        set rhost
        >> Enter Value For rhost: 10
        >> Config Key Saved!
        ```
        
        If before running this command the rhost key had a value of 80, the rhost key after running this command has a
        value of 10. You can also add configuration variables to the config by using the set command with a new key after it
        like so:
        ```
        set newkey
        >> Enter Value For newkey: hello
        >> Config Key Saved!
        ```
        
        Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config
        until you use the `reset` command which resets the saved configuration.
        
        #### Running A Tool
        
        In order to run a tool all you have to do is enter the name of the tool into BabySploit. You can use the `tools` command
        to display a menu with all the currently availble tools. If we run tools we get the depiction:
        <p align="center">
          <img src="https://image.prntscr.com/image/dMlUOjFnQk_KSyru1gTQ2A.png" alt="Tools"/>
        </p>
        *this depiction may be outdated*
        
        This menu will display the tools available and the description of each tool. To run a tool simply enter the tool name
        into BabySploit. Ex: `ftpbruteforce` - runs the ftpbruteforce tool.
        
        # Features (Current, In The Works, Planned):
        
        [Visit](https://github.com/M4cs/BabySploit/projects/1) project board for tools.
        
          - Information Gathering
          - Exploitation
          - Post Exploitation
          - Bruteforcing
          - Phishing
          - Cryptography/Stenography
         
        ### Information Gathering:
        
          - Nmap
          - IP Info
          - Tcpdump (In The Works)
          - Datasploit (In The Works)
          - Censys Lookup
          - DNS Lookup
          - Raccoon
          - Cloudflare Bypasser
          
        ### Exploitation:
          
          - Searchsploit
          - ReverseShell Wizard
          - FTP Buffer Overflow Scan
          - WPSeku WordPress Vuln Scanner
          
        ### Post Exploitation:
        
          - In The Works
          
        ### Bruteforcing:
        
          - FTP Bruteforcer
          - WPSeku WordPress Login Bruteforce
          
        ### Phishing:
        
          - BlackEye Python
          
        ### Crypto/Stegano:
        
          - MetaKiller
          - PDFMeta
          
        # Contributing
        
        Feel free to contribute by making plugins or fixing bugs with a Pull Request. All contributions are helpful and will help make this a great tool.
        
        Licensed Under [MIT](https://github.com/M4cs/BabySploit/blob/master/LICENSE.md).
        
        Copyright (c) 2018 Syndicated Intelligence
Platform: UNKNOWN
Classifier: Development Status :: 4 - Beta
Classifier: Environment :: Console
Classifier: License :: OSI Approved :: GNU General Public License v3 (GPLv3)
Classifier: Programming Language :: Python
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: Implementation :: CPython
Classifier: Programming Language :: Python :: Implementation :: PyPy
Classifier: Programming Language :: Python :: Implementation :: IronPython
Classifier: Programming Language :: Python :: Implementation :: Jython
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: System Administrators
Classifier: Intended Audience :: Information Technology
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Classifier: Topic :: Software Development :: Libraries
Classifier: Topic :: System :: Systems Administration
Classifier: Topic :: System :: Networking
Classifier: Topic :: Utilities
Description-Content-Type: text/markdown
