AutoSploit
AutoSploit copied to clipboard
Modules Suggestion
- Criminal IP is a specialized Cyber Threat Intelligence (CTI) search engine that allows users to search for various security-related information such as malicious IP addresses, domains, banners, etc. It can be widely integrated
Best Practice details how to use Criminalip. https://www.criminalip.io/developer/best-practice
It is also provided by Filter, tags, API, etc. https://www.criminalip.io/developer/filters-and-tags/filters https://www.criminalip.io/developer/filters-and-tags/tags https://www.criminalip.io/developer/api/post-user-me
If you use Asset Search in CriminalIP, you can obtain various information by referring to filter URLs such as IP or tag, and if you use Domain Search, you can determine the presence or absence of malicious/phishing sites.
It is a wide range of CTI platforms such as shodan and censys, so please check it.
Running information
- What branch did you download?
- Clone, or docker run?
- What OS are you running? It's a SaaS method, and you can use any platform.
Exploit module information
- What exploit was deployed?
- Was a session generated for the target?
- What version of metasploit are you running? It provides CVE information about vulnerable IPs or Domains, and can attempt an attack through the CVE provided. Compared to other Cyber Threat Intelligence, it has an intuitive UI and usability.
Program information
- Python version number?
- AutoSploit version number?
- Any console output that is relevant to the issue:
- Traceback (error) if any: