diff options
-rw-r--r-- | system/routersploit/README | 10 | ||||
-rw-r--r-- | system/routersploit/routersploit.SlackBuild | 91 | ||||
-rw-r--r-- | system/routersploit/routersploit.info | 10 | ||||
-rw-r--r-- | system/routersploit/setup.py | 12 | ||||
-rw-r--r-- | system/routersploit/slack-desc | 19 |
5 files changed, 142 insertions, 0 deletions
diff --git a/system/routersploit/README b/system/routersploit/README new file mode 100644 index 0000000000000..427ac153ff3df --- /dev/null +++ b/system/routersploit/README @@ -0,0 +1,10 @@ +The RouterSploit Framework is an open-source exploitation framework +dedicated to embedded devices. + +It consists of various modules that aid penetration testing operations: + +exploits - modules that take advantage of identified vulnerabilities +creds - modules designed to test credentials against network services +scanners - modules that check if a target is vulnerable to any exploit + +Optional dependency: python3 diff --git a/system/routersploit/routersploit.SlackBuild b/system/routersploit/routersploit.SlackBuild new file mode 100644 index 0000000000000..61938785dab68 --- /dev/null +++ b/system/routersploit/routersploit.SlackBuild @@ -0,0 +1,91 @@ +#!/bin/sh + +# Slackware build script for routersploit + +# Copyright 2017 Fernando Lopez Jr. <fernando.lopezjr@gmail.com> +# All rights reserved. +# +# Redistribution and use of this script, with or without modification, is +# permitted provided that the following conditions are met: +# +# 1. Redistributions of this script must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR "AS IS" AND ANY EXPRESS OR IMPLIED +# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO +# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +PRGNAM=routersploit +VERSION=${VERSION:-2.2.1} +BUILD=${BUILD:-1} +TAG=${TAG:-_SBo} + +if [ -z "$ARCH" ]; then + case "$( uname -m )" in + i?86) ARCH=i586 ;; + arm*) ARCH=arm ;; + *) ARCH=$( uname -m ) ;; + esac +fi + +CWD=$(pwd) +TMP=${TMP:-/tmp/SBo} +PKG=$TMP/package-$PRGNAM +OUTPUT=${OUTPUT:-/tmp} + +if [ "$ARCH" = "i586" ]; then + SLKCFLAGS="-O2 -march=i586 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "i686" ]; then + SLKCFLAGS="-O2 -march=i686 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "x86_64" ]; then + SLKCFLAGS="-O2 -fPIC" + LIBDIRSUFFIX="64" +else + SLKCFLAGS="-O2" + LIBDIRSUFFIX="" +fi + +set -e + +rm -rf $PKG +mkdir -p $TMP $PKG $OUTPUT +cd $TMP +rm -rf $PRGNAM-$VERSION +tar xvf $CWD/$PRGNAM-$VERSION.tar.gz +cd $PRGNAM-$VERSION +chown -R root:root . +find -L . \ + \( -perm 777 -o -perm 775 -o -perm 750 -o -perm 711 -o -perm 555 \ + -o -perm 511 \) -exec chmod 755 {} \; -o \ + \( -perm 666 -o -perm 664 -o -perm 640 -o -perm 600 -o -perm 444 \ + -o -perm 440 -o -perm 400 \) -exec chmod 644 {} \; + +rm requirements.txt +cp $CWD/setup.py . +python setup.py install --root=$PKG + +# Python 3 support. +if $(python3 -c 'import sys' 2>/dev/null); then + python3 setup.py install --root=$PKG +fi + +mkdir -p $PKG/usr/doc/$PRGNAM-$VERSION +cp -a \ + README.md LICENSE \ + $PKG/usr/doc/$PRGNAM-$VERSION +cat $CWD/$PRGNAM.SlackBuild > $PKG/usr/doc/$PRGNAM-$VERSION/$PRGNAM.SlackBuild + +mkdir -p $PKG/install +cat $CWD/slack-desc > $PKG/install/slack-desc + +cd $PKG +/sbin/makepkg -l y -c n $OUTPUT/$PRGNAM-$VERSION-$ARCH-$BUILD$TAG.${PKGTYPE:-tgz} diff --git a/system/routersploit/routersploit.info b/system/routersploit/routersploit.info new file mode 100644 index 0000000000000..f06bc5ff1634a --- /dev/null +++ b/system/routersploit/routersploit.info @@ -0,0 +1,10 @@ +PRGNAM="routersploit" +VERSION="2.2.1" +HOMEPAGE="https://github.com/reverse-shell/routersploit" +DOWNLOAD="https://github.com/reverse-shell/routersploit/archive/v2.2.1/routersploit-2.2.1.tar.gz" +MD5SUM="62143935b564edbdd1703f6caa531296" +DOWNLOAD_x86_64="" +MD5SUM_x86_64="" +REQUIRES="python-requests paramiko BeautifulSoup4 pysnmp" +MAINTAINER="Fernando Lopez Jr." +EMAIL="fernando.lopezjr@gmail.com" diff --git a/system/routersploit/setup.py b/system/routersploit/setup.py new file mode 100644 index 0000000000000..e039fa075870e --- /dev/null +++ b/system/routersploit/setup.py @@ -0,0 +1,12 @@ +from setuptools import setup + +setup( + name='routersploit', + version='2.2.1', + author='Reverse Shell Security', + packages=['routersploit','routersploit.modules','routersploit.templates','routersploit.test','routersploit.wordlists',], + scripts=['rsf.py',], + license='BSD-3-clause', + long_description=open('README.md').read(), + install_requires=['requests','paramiko','beautifulsoup4','pysnmp'], +) diff --git a/system/routersploit/slack-desc b/system/routersploit/slack-desc new file mode 100644 index 0000000000000..1ed0983c0dcb3 --- /dev/null +++ b/system/routersploit/slack-desc @@ -0,0 +1,19 @@ +# HOW TO EDIT THIS FILE: +# The "handy ruler" below makes it easier to edit a package description. +# Line up the first '|' above the ':' following the base package name, and +# the '|' on the right side marks the last column you can put a character in. +# You must make exactly 11 lines for the formatting to be correct. It's also +# customary to leave one space after the ':' except on otherwise blank lines. + + |-----handy-ruler------------------------------------------------------| +routersploit: routersploit (exploitation framework) +routersploit: +routersploit: The RouterSploit Framework is an open-source exploitation framework +routersploit: dedicated to embedded devices. +routersploit: +routersploit: It consists of three modules that aid penetration testing operations: +routersploit: +routersploit: exploits - modules that take advantage of identified vulnerabilities +routersploit: creds - modules designed to test credentials against network services +routersploit: scanners - modules that check if a target is vulnerable to any exploit +routersploit: |