Version release : v4.6
Author : pedro ubuntu [ r00t-3xp10it ]
Distros Supported : Linux Ubuntu, Kali, Mint, Parrot OS
Suspicious-Shell-Activity (SSA) RedTeam develop @2016
The author does not hold any responsibility about the bad use of this script,
remmenber that attacking targets without prior concent its ilegal and punish
by law, However you are allowed to protect yourselfe from any intruder by any
meens necessary (using this tool the ethical way) please read the license.
netool.sh toolkit provides a fast and easy way For new arrivals to IT security
pentesting and also to experience users to use allmost all features that the
Man-In-The-Middle can provide under local lan, since scanning, sniffing and
social engeneering attacks (metasploit & veil needs to be manually installed)
netool toolkit its 'divided' in 3 diferent categories, the first stage it will
be scanning/gathering-information using Nmap framework, the second stage it will
be sniffing/manipulation-of-tcp-packets using Ettercap framework and the last stage
it will be using 'rootsector' module to deliver a payload to target (mitm+dns_spoof)
Additional tool settings can be configurated just by editing the 'toolkit_config'
file befor running the tool, settings like: config paths to frameworks installed,
and some internal toolkit settings.
Toolkit Dependencies : zenity, Nmap, Ettercap, Macchanger, Metasploit, Driftnet, Apache2, sslstrip
INURLBR Dependencies : curl, libcurl3, libcurl3-dev, php5, php5-cli, php5-curl
1º - Download framework from github
tar.gz OR zip OR git clone
2º - Install dependencies
cd opensource
sudo chmod +x INSTALL.sh && ./INSTALL.sh
3º - Run main tool
sudo ./netool.sh
Fyodor (nmap) | Alor & Naga (ettercap) | HD Moore (metasploit)
Moxie M (sslstrip) | Chris L (driftnet) | j0rgan (cupp.py)
ReL1K (unicorn.py) | Cleiton P (inurlbr.php) | KyRecon (shellter)
Chris Tyler (zenity) and Rob McCool (apache).
_EOF