ExploitPack (cracked) is an offensive penetration tool that includes 0day and a large number of undetectable exploit programs.

0 19
(。・∀・)ノ゙Hi everyone, I am fhoenixExploit Pack is a multi-platform vulnerability...

(。・∀・)ノ゙Hi everyone, I am fhoenix

Exploit Pack is a multi-platform vulnerability exploitation framework, containing more than 39,000 vulnerabilities, implants, and proxies that cannot be detected. It can help you plant the next target at any time. Like any such tool, it requires some basic knowledge and professional expertise. Exploit Pack is intended for use by actual security professionals to support their testing process.

ExploitPack (cracked) is an offensive penetration tool that includes 0day and a large number of undetectable exploit programs.


Crack tutorial

Declaration:
I was not happy to use your md kali, but there is a problem with this thing in blackarch. Including the trouble of running https in blackarch. I don't know if you will use blackarch
So it's still using kali. This software is cracked by pwn3rzs.
Channel @Pwn3rzs big shot: @PNP6666
But there is a problem with this thing. First, it's a java problem that causes it to fail to start. Second, you need to set up an https exploitpack official website locally... I'll teach you how to do it below
First install kali-linux-everything. Beware of java errors later on!!!!!
Set the /etc/hosts file and add
127.0.0.1 exploitpack.com
127.0.0.1 www.exploitpack.com


Execute the command
mkdir /var/www/html/changelog
touch /var/www/html/changelog/public
echo "17.07" >> /var/www/html/changelog/appversion
cd /var/www/html/
openssl req -new -x509 -noenc -subj "/CN=exploitpack.com/L=San Francisco/ST=California/C=US" -keyout key.pem -out crt.pem -days 365


Next, configure apache2 to prepare for HTTPS
Add the following code at the end of /etc/apache2/apache.conf

<VirtualHost *:443>
  ServerName exploitpack.com
  DocumentRoot /var/www/html

  SSLEngine on
  SSLCertificateFile /var/www/html/crt.pem
  SSLCertificateKeyFile /var/www/html/key.pem
</VirtualHost>

Then configure /etc/apache2/ports.conf


Listen 80

<IfModule ssl_module>
      Listen 443
</IfModule>

<IfModule mod_gnutls.c>
      Listen 443
</IfModule>


         


Execute the command
cd /usr/lib/jvm/java-1.17.0-openjdk-amd64/lib/security
cp cacerts cacerts.bak
keytool -import -alias exploitpack -keystore cacerts -file /var/www/html/crt.pem
Enter library key password: changeit (default password)
Then press Enter after typing Y
Done, now get ready to start!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
source /etc/apache2/envvars to import apache environment variables

###########################################################################
###########################################################################

sudo service apache2 start
sudo java -jar ExploitPack.jar

Features of Exploit Pack

① Developer

The Exploit Pack is designed by a team of experienced software developers and exploit writers to automate processes, so that security professionals can focus on what is truly important.PwnAs if there is no tomorrow.

② Attack detection and vulnerability mitigation:

Use Exploit Pack to make quick responses to offensive and defensive security integration, objectively measure threats, vulnerabilities, impacts, and risks related to specific network security incidents.

③ Easy to use

Exploit Pack uses an easy-to-use advanced software-defined interface, supports quick reconfiguration, so that exploit code, payloads, and utilities can adapt to the evolving threat environment.

④ 0day available

Most importantly, as an advanced package user, once our research team discovers these vulnerabilities and updates, we can access all our zero-day exploits and updates.

⑤ Many exploits

Contains more than 39,000 vulnerabilities, exploits, and proxies

Let me vent my frustration

This is cracked by pwn3 (your awvs, bs, cs are also done by them)

But it didn't work a few days after it was released

I chatted with them in the communication group for a long time, and it took a lot of time to fix it

What problems did I encounter?

At first, it was a java version, I tried various methods, jdk11, 7 could not be opened, always reported an error

Later, I successfully used Kali everything。。。。。。。。。。。。。。。。。。。

Then this software will access its official website every time it starts. What to do? Set up a local copy of its official website. Add to the hosts file

Then I encountered a problem, it is https

I saw the things they posted in the group, using python to set up https, but the problem is that when accessing files, they are not displayed in the browser but directly downloaded。。。。。。。。。。。。。。。。。。

Later, I went to the school library on Wednesday and spent 40 minutes looking for related https materials, but the garbage library had no such materials。。。。

In the end, I still chose apache, but encountered this problem, the conf file was modified and could not be started. I started to find out why it reported an error. Later, I refreshed the variables. Then it still didn't work, so I modified the ports file and changed the port to 80. Later, I was so frustrated that I was in a hurry. Shit.

Finally successful. Of course, during this period, I tried various operating systems and used various py https servers。。。。

Anyway, I折腾 for more than ten days, finally got it done. I decided in advance that if I can fix the exploit pack, I will confess to my junior high school girlfriend as soon as her college entrance examination is over!!!!!!! Everyone wish me good luck!!!!!!!!!

I put the link below, why not use Baidu Netdisk? qtmd, Ali Drive is so fast!

Next, let's see the image!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Image



Download link

https://www.aliyundrive.com/s/upK2aDSfLsi by FhoeniX42S~

你可能想看:

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Article 2 of the Cryptography Law clearly defines the term 'cryptography', which does not include commonly known terms such as 'bank card password', 'login password', as well as facial recognition, fi

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

最后修改时间:
admin
上一篇 2025年03月28日 21:25
下一篇 2025年03月28日 21:48

评论已关闭