addack

command module
v0.17.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Sep 29, 2023 License: MIT Imports: 15 Imported by: 0

README

Addack

Addack is a tool to run exploits to multiple targets.

Addack

Installation

Use a linux distribution or WSL.

Download

Download the binary from the release page

Make an exploits directory in the same directory as the binary. Add a script called flagger.py in the exploits directory. This script will be called when a flag is found.

The command to run the exploit is in the FlaggerCommand variable. The directory used for this command is the ExploitsPath variable.

Run the binary. A database.db file will be created in the same directory.

Default configuration:

database_path = "./database.db"
flagger_command = "python3 flagger.py"
exploits_path = "./exploits"
tick_time = 10000 # in ms
flag_regex = "FLAG{.*?}"
timezone = "Europe/Bucharest"
time_format = "2006-01-02 15:04:05"
listening_addr = "127.0.0.1:8080"

You can edit the configuration by editing the config.toml file.

Upload scripts and set the command to run. The IP of the target will be set in the TARGET environment variable when the script is run.

Development

Requirements
  • Go 1.16 or newer
  • npm for tailwind
Development environment
# Compile the css
npx tailwindcss -i ./assets/css/index.css -o ./assets/css/output.css --watch
# Run the server using air for auto reload
air

You can change main.go to use the real file system instead of the embedded one.

Build
# Compile the css
npm install
npx tailwindcss -i ./assets/css/index.css -o ./assets/css/output.css
# Build the binary
go build -o addack
./addack

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis
src

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL