There are no reviews yet. Be the first to send feedback to the community and the maintainers!
============================================================================= Armitage - Cyber Attack Management for Metasploit ============================================================================= *** http://www.fastandeasyhacking.com *** 1. What is Armitage? ----------------- Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Advanced users will find Armitage valuable for managing remote Metasploit instances and collaboration. Armitage's red team collaboration features allow your team to use the same sessions, share data, and communicate through one Metasploit instance. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you. (c) 2010-2015 Raphael Mudge. This project is licensed under the BSD license. See license.txt for more information. 2. Documentation ------------- The documentation for Armitage is located on the Armitage website at: http://www.fastandeasyhacking.com. Read the FAQ and the Manual for information on connecting Armitage to Metasploit and using it. 3. Install and Update ---------- To get started, see the manual at http://www.fastandeasyhacking.com 4. Source Code ----------- This projected is hosted on <s>Google Code</s> GitHub at: https://github.com/rsmudge/armitage 5. Disclaimer ---------- Use this code for your development and don't hack systems that you don't have permission to hack. The existence of this software does not reflect the opinions or beliefs of my current employers, past employers, future employers, or any small animals I come into contact with. Enjoy this software with my blessing. I hope it helps you learn and become a better security professional. 6. Contact ------- Report bugs in the issue tracker at: https://github.com/rsmudge/armitage/issues E-mail [email protected] with other questions/concerns. Make sure you peruse the FAQ and Manual first. You may also visit us on irc.freenode.net in #armitage 7. Credits for Third-Party Components ------- Draggable Tabbed Pane - (c) Tom Martin (Creative Commons 3.0 Share-Alike [Attribution Required] License) http://stackoverflow.com/questions/60269/how-to-implement-draggable-tab-using-java-swing Javassist 3.15 - (c) Shigeru Chiba 1999-2015 (Apache 2.0 License) https://github.com/jboss-javassist/javassist (dependency for MsgPack for Java) JGraphX - (c) JGraph Ltd 2006-2012 (BSD License) http://www.jgraphx.com/ Metasploit Framework - (c) Rapid7 Inc. 2012 (BSD License) http://www.metasploit.com/ msfgui - (c) Matt Weeks 2010-2012 (BSD License) http://www.metasploit.com/ MsgPack for Java - (c) F. Sadayuki and M. Nishizawa (Apache 2.0 License) https://github.com/msgpack/msgpack-java PostgreSQL JDBC Connector - (c) 1997-2010, PostgreSQL Global Development Group (BSD License) http://jdbc.postgresql.org/ Sleep 2.1 - (c) 2002-2009, Raphael Mudge (LGPL) http://sleep.dashnine.org/
Malleable-C2-Profiles
Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable C2 profiles that you may use. These profiles work with Cobalt Strike 3.x.ElevateKit
The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.cortana-scripts
A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Strike 3.x. Cobalt Strike 3.x uses a variant of Cortana called Aggressor Script.unhook-bof
Remove API hooks from a Beacon process.metasploit-loader
A client compatible with Metasploit's staging protocolvncdll
Stand-alone VNC server compiled as a Reflective DLLZeroLogon-BOF
Layer2-Pivoting-Client
A simple client to demonstrate Layer-2 pivoting. Compatible with the simpletun.c server written by Davide Brini.CVE-2020-0796-BOF
Love Open Source and this site? Check out how you can help us